首页 > 最新文献

Acta Informatica最新文献

英文 中文
On minimum t-claw deletion in split graphs
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-26 DOI: 10.1007/s00236-025-00482-2
Sounaka Mishra

For (tge 3), (K_{1, t}) is called t-claw. A graph (G=(V, E)) is t-claw free if it does not contain t-claw as a vertex-induced subgraph. In minimum t-claw deletion problem (Min-t-Claw-Del), given a graph (G=(V, E)), it is required to find a vertex set S of minimum size such that (G[Vsetminus S]) is t-claw free. In a split graph, the vertex set is partitioned into two sets such that one forms a clique and the other forms an independent set. Every t-claw in a split graph has a center vertex in the clique partition. This observation motivates us to consider the minimum one-sided bipartite t-claw deletion problem (Min-t-OSBCD). Given a bipartite graph (G=(A cup B, E)), in Min-t-OSBCD it is asked to find a vertex set S of minimum size such that (G[(A cup B) {setminus } S]) has no t-claw with the center vertex in A. A primal-dual algorithm approximates Min-t-OSBCD within a factor of t. We prove that it is ({textsf{UGC}})-hard to approximate with a factor better than t. We also prove it is approximable within a factor of 2 for dense bipartite graphs. By using these results on Min-t-OSBCD, we prove that Min-t-Claw-Del is ({textsf{UGC}})-hard to approximate within a factor better than t, for split graphs. We also consider their complementary maximization problems and prove that they are ({textsf{APX}})-complete.

{"title":"On minimum t-claw deletion in split graphs","authors":"Sounaka Mishra","doi":"10.1007/s00236-025-00482-2","DOIUrl":"10.1007/s00236-025-00482-2","url":null,"abstract":"<div><p>For <span>(tge 3)</span>, <span>(K_{1, t})</span> is called <i>t</i>-claw. A graph <span>(G=(V, E))</span> is <i>t</i>-claw free if it does not contain <i>t</i>-claw as a vertex-induced subgraph. In minimum <i>t</i>-claw deletion problem (<span>Min-</span><i>t</i>-<span>Claw-Del</span>), given a graph <span>(G=(V, E))</span>, it is required to find a vertex set <i>S</i> of minimum size such that <span>(G[Vsetminus S])</span> is <i>t</i>-claw free. In a split graph, the vertex set is partitioned into two sets such that one forms a clique and the other forms an independent set. Every <i>t</i>-claw in a split graph has a center vertex in the clique partition. This observation motivates us to consider the minimum one-sided bipartite <i>t</i>-claw deletion problem (<span>Min-</span><i>t</i><span>-OSBCD</span>). Given a bipartite graph <span>(G=(A cup B, E))</span>, in <span>Min-</span><i>t</i><span>-OSBCD</span> it is asked to find a vertex set <i>S</i> of minimum size such that <span>(G[(A cup B) {setminus } S])</span> has no <i>t</i>-claw with the center vertex in <i>A</i>. A primal-dual algorithm approximates <span>Min-</span><i>t</i><span>-OSBCD</span> within a factor of <i>t</i>. We prove that it is <span>({textsf{UGC}})</span>-hard to approximate with a factor better than <i>t</i>. We also prove it is approximable within a factor of 2 for dense bipartite graphs. By using these results on <span>Min-</span><i>t</i><span>-OSBCD</span>, we prove that <span>Min-</span><i>t</i>-<span>Claw-Del</span> is <span>({textsf{UGC}})</span>-hard to approximate within a factor better than <i>t</i>, for split graphs. We also consider their complementary maximization problems and prove that they are <span>({textsf{APX}})</span>-complete.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143489619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the piecewise complexity of words
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-18 DOI: 10.1007/s00236-025-00480-4
Philippe Schnoebelen, Isa Vialard

The piecewise complexity h(u) of a word is the minimal length of subwords needed to exactly characterise u. Its piecewise minimality index (rho (u)) is the smallest length k such that u is minimal among its order-k class ([u]_k) in Simon’s congruence. We initiate a study of these two descriptive complexity measures. Among other results, we provide efficient algorithms for computing h(u) and (rho (u)) for a given word u.

{"title":"On the piecewise complexity of words","authors":"Philippe Schnoebelen,&nbsp;Isa Vialard","doi":"10.1007/s00236-025-00480-4","DOIUrl":"10.1007/s00236-025-00480-4","url":null,"abstract":"<div><p>The piecewise complexity <i>h</i>(<i>u</i>) of a word is the minimal length of subwords needed to exactly characterise <i>u</i>. Its piecewise minimality index <span>(rho (u))</span> is the smallest length <i>k</i> such that <i>u</i> is minimal among its order-<i>k</i> class <span>([u]_k)</span> in Simon’s congruence. We initiate a study of these two descriptive complexity measures. Among other results, we provide efficient algorithms for computing <i>h</i>(<i>u</i>) and <span>(rho (u))</span> for a given word <i>u</i>.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143431058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized straight-line programs
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-13 DOI: 10.1007/s00236-025-00481-3
Gonzalo Navarro, Francisco Olivares, Cristian Urbina

It was recently proved that any straight-line program (SLP) generating a given string can be transformed in linear time into an equivalent balanced SLP of the same asymptotic size. We generalize this proof to a general class of grammars we call generalized SLPs (GSLPs), which allow rules of the form (A rightarrow x) where x is any Turing-complete representation (of size |x|) of a sequence of symbols (potentially much longer than |x|). We then specialize GSLPs to so-called Iterated SLPs (ISLPs), which allow rules of the form (A rightarrow Pi _{i=k_1}^{k_2} B_1^{i^{c_1}}cdots B_t^{i^{c_t}}) of size (mathcal {O}(t)). We prove that ISLPs break, for some text families, the measure (delta ) based on substring complexity, a lower bound for most measures and compressors exploiting repetitiveness. Further, ISLPs can extract any substring of length (lambda ), from the represented text (T[1mathinner {.,.}n]), in time (mathcal {O}(lambda + log ^2 nlog log n)). This is the first compressed representation for repetitive texts breaking (delta ) while, at the same time, supporting direct access to arbitrary text symbols in polylogarithmic time. We also show how to compute some substring queries, like range minima and next/previous smaller value, in time (mathcal {O}(log ^2 n log log n)). Finally, we further specialize the grammars to run-length SLPs (RLSLPs), which restrict the rules allowed by ISLPs to the form (A rightarrow B^t). Apart from inheriting all the previous results with the term (log ^2 n log log n) reduced to the near-optimal (log n), we show that RLSLPs can exploit balancedness to efficiently compute a wide class of substring queries we call “composable”—i.e., (f(X cdot Y)) can be obtained from f(X) and f(Y). As an example, we show how to compute Karp-Rabin fingerprints of texts substrings in (mathcal {O}(log n)) time. While the results on RLSLPs were already known, ours are much simpler and require little precomputation time and extra data associated with the grammar.

{"title":"Generalized straight-line programs","authors":"Gonzalo Navarro,&nbsp;Francisco Olivares,&nbsp;Cristian Urbina","doi":"10.1007/s00236-025-00481-3","DOIUrl":"10.1007/s00236-025-00481-3","url":null,"abstract":"<div><p>It was recently proved that any straight-line program (SLP) generating a given string can be transformed in linear time into an equivalent balanced SLP of the same asymptotic size. We generalize this proof to a general class of grammars we call generalized SLPs (GSLPs), which allow rules of the form <span>(A rightarrow x)</span> where <i>x</i> is any Turing-complete representation (of size |<i>x</i>|) of a sequence of symbols (potentially much longer than |<i>x</i>|). We then specialize GSLPs to so-called Iterated SLPs (ISLPs), which allow rules of the form <span>(A rightarrow Pi _{i=k_1}^{k_2} B_1^{i^{c_1}}cdots B_t^{i^{c_t}})</span> of size <span>(mathcal {O}(t))</span>. We prove that ISLPs break, for some text families, the measure <span>(delta )</span> based on substring complexity, a lower bound for most measures and compressors exploiting repetitiveness. Further, ISLPs can extract any substring of length <span>(lambda )</span>, from the represented text <span>(T[1mathinner {.,.}n])</span>, in time <span>(mathcal {O}(lambda + log ^2 nlog log n))</span>. This is the first compressed representation for repetitive texts breaking <span>(delta )</span> while, at the same time, supporting direct access to arbitrary text symbols in polylogarithmic time. We also show how to compute some substring queries, like range minima and next/previous smaller value, in time <span>(mathcal {O}(log ^2 n log log n))</span>. Finally, we further specialize the grammars to run-length SLPs (RLSLPs), which restrict the rules allowed by ISLPs to the form <span>(A rightarrow B^t)</span>. Apart from inheriting all the previous results with the term <span>(log ^2 n log log n)</span> reduced to the near-optimal <span>(log n)</span>, we show that RLSLPs can exploit balancedness to efficiently compute a wide class of substring queries we call “composable”—i.e., <span>(f(X cdot Y))</span> can be obtained from <i>f</i>(<i>X</i>) and <i>f</i>(<i>Y</i>). As an example, we show how to compute Karp-Rabin fingerprints of texts substrings in <span>(mathcal {O}(log n))</span> time. While the results on RLSLPs were already known, ours are much simpler and require little precomputation time and extra data associated with the grammar.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143404243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tight bounds for the sensitivity of CDAWGs with left-end edits
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-04 DOI: 10.1007/s00236-025-00478-y
Hiroto Fujimaru, Yuto Nakashima, Shunsuke Inenaga

Compact directed acyclic word graphs (CDAWGs) (Blumer et al. in J ACM 34(3):578–595, 1987) are a fundamental data structure on strings with applications in text pattern searching, data compression, and pattern discovery. Intuitively, the CDAWG of a string T is obtained by merging isomorphic subtrees of the suffix tree (Weiner, in: Proceedings of the 14th annual symposium on switching and automata theory, pp 1–11, 1973) of the same string T, thus CDAWGs are a compact indexing structure. In this paper, we investigate the sensitivity of CDAWGs when a single character edit operation (insertion, deletion, or substitution) is performed at the left-end of the input string T, namely, we are interested in the worst-case increase in the size of the CDAWG after a left-end edit operation. We prove that if (textsf{e}) is the number of edges of the CDAWG for string T, then the number of new edges added to the CDAWG after a left-end edit operation on T does not exceed (textsf{e}). Further, we present a matching lower bound on the sensitivity of CDAWGs for left-end insertions, and almost matching lower bounds for left-end deletions and substitutions. We then generalize our lower-bound instance for left-end insertions to leftward online construction of the CDAWG, and show that it requires (Omega (n^2)) time for some string of length n.

{"title":"Tight bounds for the sensitivity of CDAWGs with left-end edits","authors":"Hiroto Fujimaru,&nbsp;Yuto Nakashima,&nbsp;Shunsuke Inenaga","doi":"10.1007/s00236-025-00478-y","DOIUrl":"10.1007/s00236-025-00478-y","url":null,"abstract":"<div><p><i>Compact directed acyclic word graphs</i> (<i>CDAWGs</i>) (Blumer et al. in J ACM 34(3):578–595, 1987) are a fundamental data structure on strings with applications in text pattern searching, data compression, and pattern discovery. Intuitively, the CDAWG of a string <i>T</i> is obtained by merging isomorphic subtrees of the suffix tree (Weiner, in: Proceedings of the 14th annual symposium on switching and automata theory, pp 1–11, 1973) of the same string <i>T</i>, thus CDAWGs are a compact indexing structure. In this paper, we investigate the sensitivity of CDAWGs when a single character edit operation (insertion, deletion, or substitution) is performed at the left-end of the input string <i>T</i>, namely, we are interested in the worst-case increase in the size of the CDAWG after a left-end edit operation. We prove that if <span>(textsf{e})</span> is the number of edges of the CDAWG for string <i>T</i>, then the number of new edges added to the CDAWG after a left-end edit operation on <i>T</i> does not exceed <span>(textsf{e})</span>. Further, we present a matching lower bound on the sensitivity of CDAWGs for left-end insertions, and almost matching lower bounds for left-end deletions and substitutions. We then generalize our lower-bound instance for left-end insertions to <i>leftward online construction</i> of the CDAWG, and show that it requires <span>(Omega (n^2))</span> time for some string of length <i>n</i>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143108330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving LSH via tensorized random projection
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-04 DOI: 10.1007/s00236-025-00479-x
Bhisham Dev Verma, Rameshwar Pratap

Locality-sensitive hashing (LSH) is a fundamental algorithmic toolkit used by data scientists for approximate nearest neighbour search problems that have been used extensively in many large-scale data processing applications such as near-duplicate detection, nearest-neighbour search, clustering, etc. In this work, we aim to propose faster and space-efficient locality-sensitive hash functions for Euclidean distance and cosine similarity for tensor data. Typically, the naive approach for obtaining LSH for tensor data involves first reshaping the tensor into vectors, followed by applying existing LSH methods for vector data. However, this approach becomes impractical for higher-order tensors because the size of the reshaped vector becomes exponential in the order of the tensor. Consequently, the size of LSH’s parameters increases exponentially. To address this problem, we suggest two methods for LSH for Euclidean distance and cosine similarity, namely CP-E2LSH, TT-E2LSH, and CP-SRP, TT-SRP, respectively, building on CP and tensor train (TT) decompositions techniques. Our approaches are space-efficient and can be efficiently applied to low-rank CP or TT tensors. We provide a rigorous theoretical analysis of our proposal on their correctness and efficacy.

{"title":"Improving LSH via tensorized random projection","authors":"Bhisham Dev Verma,&nbsp;Rameshwar Pratap","doi":"10.1007/s00236-025-00479-x","DOIUrl":"10.1007/s00236-025-00479-x","url":null,"abstract":"<div><p>Locality-sensitive hashing (LSH) is a fundamental algorithmic toolkit used by data scientists for approximate nearest neighbour search problems that have been used extensively in many large-scale data processing applications such as near-duplicate detection, nearest-neighbour search, clustering, etc. In this work, we aim to propose faster and space-efficient locality-sensitive hash functions for Euclidean distance and cosine similarity for tensor data. Typically, the naive approach for obtaining LSH for tensor data involves first reshaping the tensor into vectors, followed by applying existing LSH methods for vector data. However, this approach becomes impractical for higher-order tensors because the size of the reshaped vector becomes exponential in the order of the tensor. Consequently, the size of LSH’s parameters increases exponentially. To address this problem, we suggest two methods for LSH for Euclidean distance and cosine similarity, namely CP-E2LSH, TT-E2LSH, and CP-SRP, TT-SRP, respectively, building on CP and tensor train (TT) decompositions techniques. Our approaches are space-efficient and can be efficiently applied to low-rank CP or TT tensors. We provide a rigorous theoretical analysis of our proposal on their correctness and efficacy.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143108328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: Birkhoff-von Neumann quantum logic enriched with entanglement quantifiers: coincidence theorem and semantic consequence
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-29 DOI: 10.1007/s00236-025-00477-z
Shengyang Zhong
{"title":"Correction: Birkhoff-von Neumann quantum logic enriched with entanglement quantifiers: coincidence theorem and semantic consequence","authors":"Shengyang Zhong","doi":"10.1007/s00236-025-00477-z","DOIUrl":"10.1007/s00236-025-00477-z","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Directed capacity-preserving subgraphs: hardness and exact polynomial algorithms
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-28 DOI: 10.1007/s00236-024-00475-7
Markus Chimani, Max Ilsen

We introduce and discuss the Minimum Capacity-Preserving Subgraph (MCPS) problem: given a directed graph with edge capacities (textit{cap} ) and a retention ratio (alpha in (0,1)), find the smallest subgraph that, for each pair of vertices (uv), preserves at least a fraction (alpha ) of a maximum u-v-flow’s value. This problem originates from the practical setting of reducing the power consumption in a computer network: it models turning off as many links as possible, while retaining the ability to transmit at least (alpha ) times the traffic compared to the original network. First we prove that MCPS is NP-hard already on a restricted set of directed acyclic graphs (DAGs) with unit edge capacities. Our reduction also shows that a closely related problem (which only considers the arguably most complicated core of the problem in the objective function) is NP-hard to approximate within a sublogarithmic factor already on DAGs. In terms of positive results, we present two algorithms that solve MCPS optimally on directed series-parallel graphs (DSPs): a simple linear-time algorithm for the special case of unit edge capacities and a cubic-time dynamic programming algorithm for the general case of non-uniform edge capacities. Further, we introduce the family of laminar series-parallel graphs (LSPs), a generalization of DSPs that also includes cyclic and very dense graphs. Their properties allow us to solve MCPS on LSPs by employing our DSP-algorithms as subroutines. In addition, we give a separate quadratic-time algorithm for MCPS on LSPs with unit edge capacities that also yields straightforward quadratic time algorithms for several related problems such as Minimum Equivalent Digraph and Directed Hamiltonian Cycle on LSPs.

{"title":"Directed capacity-preserving subgraphs: hardness and exact polynomial algorithms","authors":"Markus Chimani,&nbsp;Max Ilsen","doi":"10.1007/s00236-024-00475-7","DOIUrl":"10.1007/s00236-024-00475-7","url":null,"abstract":"<div><p>We introduce and discuss the <span>Minimum Capacity-Preserving Subgraph (MCPS)</span> problem: given a directed graph with edge capacities <span>(textit{cap} )</span> and a retention ratio <span>(alpha in (0,1))</span>, find the smallest subgraph that, for each pair of vertices (<i>u</i>, <i>v</i>), preserves at least a fraction <span>(alpha )</span> of a maximum <i>u</i>-<i>v</i>-flow’s value. This problem originates from the practical setting of reducing the power consumption in a computer network: it models turning off as many links as possible, while retaining the ability to transmit at least <span>(alpha )</span> times the traffic compared to the original network. First we prove that <span>MCPS</span> is NP-hard already on a restricted set of directed acyclic graphs (DAGs) with unit edge capacities. Our reduction also shows that a closely related problem (which only considers the arguably most complicated core of the problem in the objective function) is NP-hard to approximate within a sublogarithmic factor already on DAGs. In terms of positive results, we present two algorithms that solve <span>MCPS</span> optimally on directed series-parallel graphs (DSPs): a simple linear-time algorithm for the special case of unit edge capacities and a cubic-time dynamic programming algorithm for the general case of non-uniform edge capacities. Further, we introduce the family of laminar series-parallel graphs (LSPs), a generalization of DSPs that also includes cyclic and very dense graphs. Their properties allow us to solve <span>MCPS</span> on LSPs by employing our DSP-algorithms as subroutines. In addition, we give a separate quadratic-time algorithm for <span>MCPS</span> on LSPs with unit edge capacities that also yields straightforward quadratic time algorithms for several related problems such as <span>Minimum Equivalent Digraph</span> and <span>Directed Hamiltonian Cycle</span> on LSPs.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-024-00475-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143109963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-tolerance in distance-edge-monitoring sets 距离边缘监测装置的容错性
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-29 DOI: 10.1007/s00236-024-00476-6
Chenxu Yang, Yaping Mao, Ralf Klasing, Gang Yang, Yuzhi Xiao, Xiaoyan Zhang

Let G be a connected graph. For an edge (e=xy in E(G)), e is monitored by a vertex v if (d_G(v, y)ne d_{G-e}(v, y)) or (d_G(v, x)ne d_{G-e}(v, x)). A set M of vertices of a graph G is distance-edge-monitoring (DEM for short) set if every edge e of G is monitored by some vertex of M. A DEM set X for a graph G is called fault-tolerant DEM set if (Xsetminus {v}) is also DEM set for each v in X. Denote (operatorname {dem}(G)) and (operatorname {Fdem}(G)) the smallest size of DEM set and fault-tolerant DEM sets, respectively. In this paper, we first study the relation between (operatorname {Fdem}(G)) and (operatorname {dem}(G)) for a graph G. Next, we show that (2 le operatorname {Fdem}(G) le n) for any graph G with order n. Furthermore, the extremal graphs attaining lower and upper bounds are characterized. In the end, the exact values for some networks are given. Furthermore, it is shown that for (2le s<tle n), there exists a graph G of order n such that (operatorname {dem}(G)=s) and (operatorname {Fdem}(G)=t).

设G是连通图。对于边(e=xy in E(G)),如果(d_G(v, y)ne d_{G-e}(v, y))或(d_G(v, x)ne d_{G-e}(v, x)), e由顶点v监视。如果图G的每条边e都受到M的某个顶点的监视,则图G的M个顶点集称为距离边监测集(distance-edge-monitoring,简称DEM)。如果(Xsetminus {v})也是X中每个v的DEM集,则图G的DEM集X称为容错DEM集,分别取DEM集和容错DEM集的最小大小(operatorname {dem}(G))和(operatorname {Fdem}(G))。本文首先研究了图G的(operatorname {Fdem}(G))与(operatorname {dem}(G))之间的关系,然后证明了任意n阶图G的(2 le operatorname {Fdem}(G) le n)与之间的关系,并进一步刻画了达到下界和上界的极值图。最后,给出了某些网络的精确值。进一步证明,对于(2le s<tle n),存在一个n阶的图G,使得(operatorname {dem}(G)=s)和(operatorname {Fdem}(G)=t)。
{"title":"Fault-tolerance in distance-edge-monitoring sets","authors":"Chenxu Yang,&nbsp;Yaping Mao,&nbsp;Ralf Klasing,&nbsp;Gang Yang,&nbsp;Yuzhi Xiao,&nbsp;Xiaoyan Zhang","doi":"10.1007/s00236-024-00476-6","DOIUrl":"10.1007/s00236-024-00476-6","url":null,"abstract":"<div><p>Let <i>G</i> be a connected graph. For an edge <span>(e=xy in E(G))</span>, <i>e</i> is monitored by a vertex <i>v</i> if <span>(d_G(v, y)ne d_{G-e}(v, y))</span> or <span>(d_G(v, x)ne d_{G-e}(v, x))</span>. A set <i>M</i> of vertices of a graph <i>G</i> is distance-edge-monitoring (DEM for short) set if every edge <i>e</i> of <i>G</i> is monitored by some vertex of <i>M</i>. A DEM set <i>X</i> for a graph <i>G</i> is called fault-tolerant DEM set if <span>(Xsetminus {v})</span> is also DEM set for each <i>v</i> in <i>X</i>. Denote <span>(operatorname {dem}(G))</span> and <span>(operatorname {Fdem}(G))</span> the smallest size of DEM set and fault-tolerant DEM sets, respectively. In this paper, we first study the relation between <span>(operatorname {Fdem}(G))</span> and <span>(operatorname {dem}(G))</span> for a graph <i>G</i>. Next, we show that <span>(2 le operatorname {Fdem}(G) le n)</span> for any graph <i>G</i> with order <i>n</i>. Furthermore, the extremal graphs attaining lower and upper bounds are characterized. In the end, the exact values for some networks are given. Furthermore, it is shown that for <span>(2le s&lt;tle n)</span>, there exists a graph <i>G</i> of order <i>n</i> such that <span>(operatorname {dem}(G)=s)</span> and <span>(operatorname {Fdem}(G)=t)</span>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142889663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dense non-binary Fibonacci codes 密集非二进制斐波那契码
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-18 DOI: 10.1007/s00236-024-00473-9
Shmuel T. Klein, Dana Shapira

The current study advances prior research on non-binary Fibonacci codes by introducing new families of universal codes. These codes demonstrate the advantage of accommodating a larger number of codewords for sufficiently large lengths. They retain the properties of instantaneous decipherability and robustness against transmission errors. This work presents these dense codes as a promising alternative for compressing extensive lists of very large integers, commonly encountered in cryptographic applications.

目前的研究通过引入新的通用码族来推进非二进制斐波那契码的先前研究。这些代码展示了在足够大的长度下容纳大量码字的优点。它们保留了瞬时可译性和对传输错误的鲁棒性。这项工作将这些密集代码作为一种有希望的替代方案,用于压缩在密码学应用程序中经常遇到的非常大的整数的广泛列表。
{"title":"Dense non-binary Fibonacci codes","authors":"Shmuel T. Klein,&nbsp;Dana Shapira","doi":"10.1007/s00236-024-00473-9","DOIUrl":"10.1007/s00236-024-00473-9","url":null,"abstract":"<div><p>The current study advances prior research on non-binary Fibonacci codes by introducing new families of universal codes. These codes demonstrate the advantage of accommodating a larger number of codewords for sufficiently large lengths. They retain the properties of instantaneous decipherability and robustness against transmission errors. This work presents these dense codes as a promising alternative for compressing extensive lists of very large integers, commonly encountered in cryptographic applications. \u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142844846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Birkhoff-von Neumann quantum logic as an assertion language for quantum programs 伯克霍夫-冯·诺依曼量子逻辑作为量子程序的断言语言
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-12 DOI: 10.1007/s00236-024-00472-w
Shengyang Zhong

In this paper, we investigate a slightly simplified version of Birkhoff–von Neumann quantum logic enriched with entanglement quantifiers which is proposed in Ying (Birkhoff–von Neumann quantum logic as an assertion language for quantum programs, 2022. arXiv:2205.01959). The main result is a coincidence theorem, which says that every formula is interpreted by a closed subspace in the Hilbert space corresponding to the free variables of the formula. We also prove that many instances of semantic consequence, which are used in the proof of the prenex normal form theorem in first-order logic, also hold in this logic. The technical work is about the interplay among the three operations on density operators, namely, tensor product, support and partial trace.

在本文中,我们研究了在Ying (Birkhoff-von Neumann量子逻辑作为量子程序的断言语言,2022)中提出的带有纠缠量词的Birkhoff-von Neumann量子逻辑的稍微简化版本。arXiv: 2205.01959)。主要的结果是一个巧合定理,它说每个公式都是由希尔伯特空间中的一个封闭子空间来解释的,这个空间对应于公式的自由变量。我们还证明了在一阶逻辑中用于证明前范式定理的许多语义推论实例在该逻辑中也成立。技术工作是关于密度算子的张量积、支持和偏迹三种运算之间的相互作用。
{"title":"Birkhoff-von Neumann quantum logic as an assertion language for quantum programs","authors":"Shengyang Zhong","doi":"10.1007/s00236-024-00472-w","DOIUrl":"10.1007/s00236-024-00472-w","url":null,"abstract":"<div><p>In this paper, we investigate a slightly simplified version of Birkhoff–von Neumann quantum logic enriched with entanglement quantifiers which is proposed in Ying (Birkhoff–von Neumann quantum logic as an assertion language for quantum programs, 2022. arXiv:2205.01959). The main result is a coincidence theorem, which says that every formula is interpreted by a closed subspace in the Hilbert space corresponding to the free variables of the formula. We also prove that many instances of semantic consequence, which are used in the proof of the prenex normal form theorem in first-order logic, also hold in this logic. The technical work is about the interplay among the three operations on density operators, namely, tensor product, support and partial trace.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142811099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1