Let G be a connected graph. For an edge (e=xy in E(G)), e is monitored by a vertex v if (d_G(v, y)ne d_{G-e}(v, y)) or (d_G(v, x)ne d_{G-e}(v, x)). A set M of vertices of a graph G is distance-edge-monitoring (DEM for short) set if every edge e of G is monitored by some vertex of M. A DEM set X for a graph G is called fault-tolerant DEM set if (Xsetminus {v}) is also DEM set for each v in X. Denote (operatorname {dem}(G)) and (operatorname {Fdem}(G)) the smallest size of DEM set and fault-tolerant DEM sets, respectively. In this paper, we first study the relation between (operatorname {Fdem}(G)) and (operatorname {dem}(G)) for a graph G. Next, we show that (2 le operatorname {Fdem}(G) le n) for any graph G with order n. Furthermore, the extremal graphs attaining lower and upper bounds are characterized. In the end, the exact values for some networks are given. Furthermore, it is shown that for (2le s<tle n), there exists a graph G of order n such that (operatorname {dem}(G)=s) and (operatorname {Fdem}(G)=t).
设G是连通图。对于边(e=xy in E(G)),如果(d_G(v, y)ne d_{G-e}(v, y))或(d_G(v, x)ne d_{G-e}(v, x)), e由顶点v监视。如果图G的每条边e都受到M的某个顶点的监视,则图G的M个顶点集称为距离边监测集(distance-edge-monitoring,简称DEM)。如果(Xsetminus {v})也是X中每个v的DEM集,则图G的DEM集X称为容错DEM集,分别取DEM集和容错DEM集的最小大小(operatorname {dem}(G))和(operatorname {Fdem}(G))。本文首先研究了图G的(operatorname {Fdem}(G))与(operatorname {dem}(G))之间的关系,然后证明了任意n阶图G的(2 le operatorname {Fdem}(G) le n)与之间的关系,并进一步刻画了达到下界和上界的极值图。最后,给出了某些网络的精确值。进一步证明,对于(2le s<tle n),存在一个n阶的图G,使得(operatorname {dem}(G)=s)和(operatorname {Fdem}(G)=t)。
{"title":"Fault-tolerance in distance-edge-monitoring sets","authors":"Chenxu Yang, Yaping Mao, Ralf Klasing, Gang Yang, Yuzhi Xiao, Xiaoyan Zhang","doi":"10.1007/s00236-024-00476-6","DOIUrl":"10.1007/s00236-024-00476-6","url":null,"abstract":"<div><p>Let <i>G</i> be a connected graph. For an edge <span>(e=xy in E(G))</span>, <i>e</i> is monitored by a vertex <i>v</i> if <span>(d_G(v, y)ne d_{G-e}(v, y))</span> or <span>(d_G(v, x)ne d_{G-e}(v, x))</span>. A set <i>M</i> of vertices of a graph <i>G</i> is distance-edge-monitoring (DEM for short) set if every edge <i>e</i> of <i>G</i> is monitored by some vertex of <i>M</i>. A DEM set <i>X</i> for a graph <i>G</i> is called fault-tolerant DEM set if <span>(Xsetminus {v})</span> is also DEM set for each <i>v</i> in <i>X</i>. Denote <span>(operatorname {dem}(G))</span> and <span>(operatorname {Fdem}(G))</span> the smallest size of DEM set and fault-tolerant DEM sets, respectively. In this paper, we first study the relation between <span>(operatorname {Fdem}(G))</span> and <span>(operatorname {dem}(G))</span> for a graph <i>G</i>. Next, we show that <span>(2 le operatorname {Fdem}(G) le n)</span> for any graph <i>G</i> with order <i>n</i>. Furthermore, the extremal graphs attaining lower and upper bounds are characterized. In the end, the exact values for some networks are given. Furthermore, it is shown that for <span>(2le s<tle n)</span>, there exists a graph <i>G</i> of order <i>n</i> such that <span>(operatorname {dem}(G)=s)</span> and <span>(operatorname {Fdem}(G)=t)</span>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142889663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-18DOI: 10.1007/s00236-024-00473-9
Shmuel T. Klein, Dana Shapira
The current study advances prior research on non-binary Fibonacci codes by introducing new families of universal codes. These codes demonstrate the advantage of accommodating a larger number of codewords for sufficiently large lengths. They retain the properties of instantaneous decipherability and robustness against transmission errors. This work presents these dense codes as a promising alternative for compressing extensive lists of very large integers, commonly encountered in cryptographic applications.
{"title":"Dense non-binary Fibonacci codes","authors":"Shmuel T. Klein, Dana Shapira","doi":"10.1007/s00236-024-00473-9","DOIUrl":"10.1007/s00236-024-00473-9","url":null,"abstract":"<div><p>The current study advances prior research on non-binary Fibonacci codes by introducing new families of universal codes. These codes demonstrate the advantage of accommodating a larger number of codewords for sufficiently large lengths. They retain the properties of instantaneous decipherability and robustness against transmission errors. This work presents these dense codes as a promising alternative for compressing extensive lists of very large integers, commonly encountered in cryptographic applications. \u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142844846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-12DOI: 10.1007/s00236-024-00472-w
Shengyang Zhong
In this paper, we investigate a slightly simplified version of Birkhoff–von Neumann quantum logic enriched with entanglement quantifiers which is proposed in Ying (Birkhoff–von Neumann quantum logic as an assertion language for quantum programs, 2022. arXiv:2205.01959). The main result is a coincidence theorem, which says that every formula is interpreted by a closed subspace in the Hilbert space corresponding to the free variables of the formula. We also prove that many instances of semantic consequence, which are used in the proof of the prenex normal form theorem in first-order logic, also hold in this logic. The technical work is about the interplay among the three operations on density operators, namely, tensor product, support and partial trace.
{"title":"Birkhoff-von Neumann quantum logic as an assertion language for quantum programs","authors":"Shengyang Zhong","doi":"10.1007/s00236-024-00472-w","DOIUrl":"10.1007/s00236-024-00472-w","url":null,"abstract":"<div><p>In this paper, we investigate a slightly simplified version of Birkhoff–von Neumann quantum logic enriched with entanglement quantifiers which is proposed in Ying (Birkhoff–von Neumann quantum logic as an assertion language for quantum programs, 2022. arXiv:2205.01959). The main result is a coincidence theorem, which says that every formula is interpreted by a closed subspace in the Hilbert space corresponding to the free variables of the formula. We also prove that many instances of semantic consequence, which are used in the proof of the prenex normal form theorem in first-order logic, also hold in this logic. The technical work is about the interplay among the three operations on density operators, namely, tensor product, support and partial trace.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142811099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-07DOI: 10.1007/s00236-024-00474-8
Sugyani Mahapatra, Manikandan Narayanan, N. S. Narayanaswamy
Motivated by a phylogeny reconstruction problem in evolutionary biology, we study the minimum Steiner arborescence problem on directed hypercubes (MSA-DH). Given m, representing the directed hypercube (vec {Q}_m), and a set of terminals (R), the problem asks to find a Steiner arborescence that spans (R) with minimum cost. As (m) implicitly represents (vec {Q}_{m}) comprising (2^{m}) vertices, the running time analyses of traditional Steiner tree algorithms on general graphs does not give a clear understanding of the actual complexity of this problem. We present algorithms that exploit the structure of the hypercube and run in FPT time. We explore the MSA-DH problem on three natural parameters—(|R|), and two above-guarantee parameters, number of Steiner nodes p and penalty q (defined as the extra cost above m incurred by the solution). For above-guarantee parameters, the parameterized MSA-DH problem take (p ge 0) or (qge 0) as input, and outputs a Steiner arborescence with at most (|R|+ p - 1) or (m+ q) edges respectively. We present the following results ((tilde{{mathcal {O}}}) hides the polynomial factors):