首页 > 最新文献

Acta Informatica最新文献

英文 中文
Reachability analysis of linear systems 线性系统的可达性分析
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-09 DOI: 10.1007/s00236-024-00458-8
Shiping Chen, Xinyu Ge

In this paper, we propose a decision procedure of reachability for a linear system (xi '=Axi +u), where the matrix (A's) eigenvalues can be arbitrary algebraic number and the input u is a vector of trigonometric-exponential polynomials. If the initial set contains only one point, the reachability problem under consideration is reduced to the decidability of the sign of trigonometric-exponential polynomial and then achieved by being reduced to verification of a series of univariate polynomial inequalities through Taylor expansions of the related exponential functions and trigonometric functions. If the initial set is open semi-algebraic, we will propose a decision procedure based on OpenCAD and an algorithm of real root isolation derived from the sign-deciding procedure for the trigonometric-exponential polynomials. The experimental results indicate the efficiency of our approach. Under the assumption of Schanuel’s Conjecture, the above procedures are complete for bounded time except for several cases.

本文提出了线性系统 (xi '=Axi +u/)的可达性决策程序,其中矩阵 (A's/)特征值可以是任意代数数,输入 u 是三角-指数多项式的向量。如果初始集只包含一个点,那么所考虑的可达性问题就简化为三角-指数多项式符号的可判定性,然后通过相关指数函数和三角函数的泰勒展开,简化为一系列单变量多项式不等式的验证。如果初始集合是开放的半代数,我们将提出一种基于 OpenCAD 的判定程序,以及一种从三角-指数多项式的符号判定程序中衍生出来的实根隔离算法。实验结果表明我们的方法非常有效。在Schanuel猜想的假设下,除了几种情况外,上述程序都能在有界时间内完成。
{"title":"Reachability analysis of linear systems","authors":"Shiping Chen,&nbsp;Xinyu Ge","doi":"10.1007/s00236-024-00458-8","DOIUrl":"10.1007/s00236-024-00458-8","url":null,"abstract":"<div><p>In this paper, we propose a decision procedure of reachability for a linear system <span>(xi '=Axi +u)</span>, where the matrix <span>(A's)</span> eigenvalues can be arbitrary algebraic number and the input <i>u</i> is a vector of trigonometric-exponential polynomials. If the initial set contains only one point, the reachability problem under consideration is reduced to the decidability of the sign of trigonometric-exponential polynomial and then achieved by being reduced to verification of a series of univariate polynomial inequalities through Taylor expansions of the related exponential functions and trigonometric functions. If the initial set is open semi-algebraic, we will propose a decision procedure based on OpenCAD and an algorithm of real root isolation derived from the sign-deciding procedure for the trigonometric-exponential polynomials. The experimental results indicate the efficiency of our approach. Under the assumption of Schanuel’s Conjecture, the above procedures are complete for bounded time except for several cases.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 3","pages":"231 - 260"},"PeriodicalIF":0.4,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140568440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting 2–3 red–black trees with a pedagogically sound yet efficient deletion algorithm: parity-seeking 用一种教学合理而高效的删除算法重新审视 2-3 红黑树:奇偶性搜索
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-29 DOI: 10.1007/s00236-023-00452-6
Kamaledin Ghiasi-Shirazi, Taraneh Ghandi, Ali Taghizadeh, Ali Rahimi-Baigi

Red–black (RB) trees are one of the most efficient variants of balanced binary search trees. However, they have often been criticized for being too complicated, hard to explain, and unsuitable for pedagogical purposes, particularly their delete operation. Sedgewick (in: Dagstuhl Workshop on Data Structures, 2008. https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf) identified the length of code as the root of the problems and introduced left-leaning red–black (LLRB) trees. The delete operation of LLRB trees has a compact recursive code. Unfortunately, it may perform many unnecessary operations. The crux of the deletion algorithm is dealing with a “deficient” subtree, that is one whose black-height has become one less than that of its sibling subtree. In this paper, we revisit 2–3 red–black trees and propose a parity-seeking delete algorithm with the basic idea of making a deficient subtree on a par with its sibling: either by fixing the deficient subtree or by turning the sibling deficient as well, ascending deficiency to the parent node. Interestingly, the proposed parity-seeking delete algorithm also works for 2–3–4 RB trees. Our experiments show that the proposed parity-seeking delete algorithm is as efficient as the best preceding RB trees. The proposed parity-seeking delete algorithm is easily understandable and suitable for pedagogical and practical purposes.

红黑(RB)树是平衡二叉搜索树中最有效的变种之一。然而,它们经常被批评过于复杂、难以解释,而且不适合教学目的,尤其是删除操作。Sedgewick (in:达格施图尔数据结构研讨会,2008 年。https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf)认为代码长度是问题的根源,并引入了左倾红黑树(LLRB)。LLRB 树的删除操作具有紧凑的递归代码。遗憾的是,它可能会执行许多不必要的操作。删除算法的关键在于处理 "缺失 "子树,即其黑色高度比同级子树的黑色高度少一个的子树。在本文中,我们重新审视了 2-3 个红黑树,并提出了一种奇偶性搜索删除算法,其基本思想是使有缺陷的子树与其同胞子树处于同等位置:要么修复有缺陷的子树,要么将同胞子树也变成有缺陷的,缺陷程度依次递增至父节点。有趣的是,所提出的奇偶性搜索删除算法也适用于 2-3-4 RB 树。我们的实验表明,所提出的奇偶校验搜索删除算法的效率不亚于之前的最佳 RB 树。所提出的奇偶校验寻求删除算法易于理解,适合教学和实际应用。
{"title":"Revisiting 2–3 red–black trees with a pedagogically sound yet efficient deletion algorithm: parity-seeking","authors":"Kamaledin Ghiasi-Shirazi,&nbsp;Taraneh Ghandi,&nbsp;Ali Taghizadeh,&nbsp;Ali Rahimi-Baigi","doi":"10.1007/s00236-023-00452-6","DOIUrl":"10.1007/s00236-023-00452-6","url":null,"abstract":"<div><p>Red–black (RB) trees are one of the most efficient variants of balanced binary search trees. However, they have often been criticized for being too complicated, hard to explain, and unsuitable for pedagogical purposes, particularly their delete operation. Sedgewick (in: Dagstuhl Workshop on Data Structures, 2008. https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf) identified the length of code as the root of the problems and introduced left-leaning red–black (LLRB) trees. The delete operation of LLRB trees has a compact recursive code. Unfortunately, it may perform many unnecessary operations. The crux of the deletion algorithm is dealing with a “deficient” subtree, that is one whose black-height has become one less than that of its sibling subtree. In this paper, we revisit 2–3 red–black trees and propose a parity-seeking delete algorithm with the basic idea of making a deficient subtree on a par with its sibling: either by fixing the deficient subtree or by turning the sibling deficient as well, ascending deficiency to the parent node. Interestingly, the proposed parity-seeking <i>delete</i> algorithm also works for 2–3–4 RB trees. Our experiments show that the proposed parity-seeking delete algorithm is as efficient as the best preceding RB trees. The proposed parity-seeking delete algorithm is easily understandable and suitable for pedagogical and practical purposes.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 3","pages":"199 - 229"},"PeriodicalIF":0.4,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140325649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distance-edge-monitoring sets of networks 网络的距离边缘监测集
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-19 DOI: 10.1007/s00236-024-00453-z
Gang Yang, Jiannan Zhou, Changxiang He, Yaping Mao

It is important to be able to monitor the network and detect this failure when a connection (an edge) fails. For a vertex set M and an edge e of the graph G, let P(Me) be the set of pairs (xy) with a vertex x of M and a vertex y of V(G) such that e belongs to all shortest paths between x and y. A vertex set M of the graph G is distance-edge-monitoring set if every edge e of G is monitored by some vertex of M, that is, the set P(Me) is nonempty. The distance-edge-monitoring number of a graph G, recently introduced by Foucaud, Kao, Klasing, Miller, and Ryan, is defined as the smallest size of distance-edge-monitoring sets of G. In this paper, we determine the bounds of the distance-edge-monitoring number of grid-based pyramids and the exact value of distance-edge-monitoring number for M(t)-graph and Sierpiński-type graphs. We also compare the distance-edge-monitoring set with average degree, the size of edge set and the size of vertex set of G, where G is M(t)-graph or Sierpiński-type graphs.

重要的是能够监控网络,并在连接(边)失效时检测到这种故障。对于图 G 的顶点集 M 和边 e,让 P(M,e)成为具有 M 的顶点 x 和 V(G)的顶点 y,且 e 属于 x 和 y 之间所有最短路径的对 (x, y) 的集合。如果图 G 的每条边 e 都受到 M 的某个顶点的监控,即集合 P(M, e) 非空,那么图 G 的顶点集 M 就是距离-边监控集。Foucaud, Kao, Klasing, Miller 和 Ryan 最近提出了图 G 的距离边监控数,它被定义为 G 的距离边监控集的最小大小。在本文中,我们确定了基于网格的金字塔的距离边监控数的边界,以及 M(t)-graph 和 Sierpiński-type 图的距离边监控数的精确值。我们还比较了距离边监控集与 G 的平均度、边集大小和顶点集大小(其中 G 为 M(t)-graph 或 Sierpiński-type 图)。
{"title":"Distance-edge-monitoring sets of networks","authors":"Gang Yang,&nbsp;Jiannan Zhou,&nbsp;Changxiang He,&nbsp;Yaping Mao","doi":"10.1007/s00236-024-00453-z","DOIUrl":"10.1007/s00236-024-00453-z","url":null,"abstract":"<div><p>It is important to be able to monitor the network and detect this failure when a connection (an edge) fails. For a vertex set <i>M</i> and an edge <i>e</i> of the graph <i>G</i>, let <i>P</i>(<i>M</i>, <i>e</i>) be the set of pairs (<i>x</i>, <i>y</i>) with a vertex <i>x</i> of <i>M</i> and a vertex <i>y</i> of <i>V</i>(<i>G</i>) such that <i>e</i> belongs to all shortest paths between <i>x</i> and <i>y</i>. A vertex set <i>M</i> of the graph <i>G</i> is <i>distance-edge-monitoring set</i> if every edge <i>e</i> of <i>G</i> is monitored by some vertex of <i>M</i>, that is, the set <i>P</i>(<i>M</i>, <i>e</i>) is nonempty. The distance-edge-monitoring number of a graph <i>G</i>, recently introduced by Foucaud, Kao, Klasing, Miller, and Ryan, is defined as the smallest size of distance-edge-monitoring sets of <i>G</i>. In this paper, we determine the bounds of the distance-edge-monitoring number of grid-based pyramids and the exact value of distance-edge-monitoring number for <i>M</i>(<i>t</i>)-graph and Sierpiński-type graphs. We also compare the distance-edge-monitoring set with average degree, the size of edge set and the size of vertex set of <i>G</i>, where <i>G</i> is <i>M</i>(<i>t</i>)-graph or Sierpiński-type graphs.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"183 - 198"},"PeriodicalIF":0.4,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140197909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An encoding of the (lambda )-calculus in the String MultiSet Rewriting calculus 字符串多集重写微积分中 $$lambda $$ 微积分的编码
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1007/s00236-024-00456-w
Attila Bagossy, Péter Battyányi

In this paper, we present an encoding of the (lambda )-calculus in a multiset rewriting system and provide a few applications of the construction. For this purpose, we choose the calculus named String MultiSet Rewriting, which was introduced in Barbuti et al. (Electron Notes Theor Comput Sci 194:19–34, 2008) by Barbuti et al. With the help of our encoding, we give alternative proofs for the standardization and the finiteness of developments theorems in the (lambda )-calculus.

摘要 在本文中,我们提出了在(lambda )多集重写系统中对(lambda )微积分的编码,并提供了该构造的一些应用。为此,我们选择了名为 "字符串多集重写 "的微积分,它是 Barbuti 等人在《Electron Notes Theor Comput Sci 194:19-34, 2008》一书中介绍的。 在我们的编码的帮助下,我们给出了 (lambda ) - 微积分中标准化和有限性发展定理的替代证明。
{"title":"An encoding of the (lambda )-calculus in the String MultiSet Rewriting calculus","authors":"Attila Bagossy,&nbsp;Péter Battyányi","doi":"10.1007/s00236-024-00456-w","DOIUrl":"10.1007/s00236-024-00456-w","url":null,"abstract":"<div><p>In this paper, we present an encoding of the <span>(lambda )</span>-calculus in a multiset rewriting system and provide a few applications of the construction. For this purpose, we choose the calculus named String MultiSet Rewriting, which was introduced in Barbuti et al. (Electron Notes Theor Comput Sci 194:19–34, 2008) by Barbuti et al. With the help of our encoding, we give alternative proofs for the standardization and the finiteness of developments theorems in the <span>(lambda )</span>-calculus.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"161 - 181"},"PeriodicalIF":0.4,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-024-00456-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140126198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact distributed quantum algorithm for generalized Simon’s problem 广义西蒙问题的精确分布式量子算法
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-10 DOI: 10.1007/s00236-024-00455-x
Hao Li, Daowen Qiu, Le Luo, Paulo Mateus

Simon’s problem is one of the most important problems demonstrating the power of quantum algorithms, as it greatly inspired the proposal of Shor’s algorithm. The generalized Simon’s problem is a natural extension of Simon’s problem and also a special hidden subgroup problem: Given a function (f:{0,1}^n rightarrow {0,1}^m), it is promised that there exists a hidden subgroup (Sle mathbb {Z}_2^n) of rank k such that for any (x, yin {{0, 1}}^n), (f(x) = f(y)) iff (x oplus y in S). The goal of generalized Simon’s problem is to find the hidden subgroup S. In this paper, we present two key contributions. Firstly, we characterize the structure of the generalized Simon’s problem in distributed scenario and introduce a corresponding distributed quantum algorithm. Secondly, we refine the algorithm to ensure exactness due to the application of quantum amplitude amplification technique. Our algorithm offers exponential speedup compared to the distributed classical algorithm. When contrasted with the quantum algorithm for the generalized Simon’s problem, our algorithm’s oracle requires fewer qubits, thus making it easier to be physically implemented. Particularly, the exact distributed quantum algorithm we develop for the generalized Simon’s problem outperforms the best previously proposed distributed quantum algorithm for Simon’s problem in terms of generalizability and exactness.

西蒙问题是展示量子算法威力的最重要问题之一,因为它极大地启发了肖尔算法的提出。广义西蒙问题是西蒙问题的自然延伸,也是一个特殊的隐藏子群问题:给定一个函数 (f:秩为k的隐藏子群(Sle mathbb {Z}_2^n) ,这样对于任意的(x, yin {0, 1}^n), (f(x) = f(y)) iff (x oplus y in S).广义西蒙问题的目标是找到隐藏子群 S。首先,我们描述了分布式场景下广义西蒙问题的结构,并引入了相应的分布式量子算法。其次,我们对算法进行了改进,以确保量子振幅放大技术的精确性。与分布式经典算法相比,我们的算法具有指数级的速度提升。与广义西蒙问题的量子算法相比,我们算法的神谕所需的量子比特更少,因此更易于物理实现。特别是,我们为广义西蒙问题开发的精确分布式量子算法在普适性和精确性方面都优于之前为西蒙问题提出的最佳分布式量子算法。
{"title":"Exact distributed quantum algorithm for generalized Simon’s problem","authors":"Hao Li,&nbsp;Daowen Qiu,&nbsp;Le Luo,&nbsp;Paulo Mateus","doi":"10.1007/s00236-024-00455-x","DOIUrl":"10.1007/s00236-024-00455-x","url":null,"abstract":"<div><p>Simon’s problem is one of the most important problems demonstrating the power of quantum algorithms, as it greatly inspired the proposal of Shor’s algorithm. The generalized Simon’s problem is a natural extension of Simon’s problem and also a special hidden subgroup problem: Given a function <span>(f:{0,1}^n rightarrow {0,1}^m)</span>, it is promised that there exists a hidden subgroup <span>(Sle mathbb {Z}_2^n)</span> of rank <i>k</i> such that for any <span>(x, yin {{0, 1}}^n)</span>, <span>(f(x) = f(y))</span> iff <span>(x oplus y in S)</span>. The goal of generalized Simon’s problem is to find the hidden subgroup <i>S</i>. In this paper, we present two key contributions. Firstly, we characterize the structure of the generalized Simon’s problem in distributed scenario and introduce a corresponding distributed quantum algorithm. Secondly, we refine the algorithm to ensure exactness due to the application of quantum amplitude amplification technique. Our algorithm offers exponential speedup compared to the distributed classical algorithm. When contrasted with the quantum algorithm for the generalized Simon’s problem, our algorithm’s oracle requires fewer qubits, thus making it easier to be physically implemented. Particularly, the exact distributed quantum algorithm we develop for the generalized Simon’s problem outperforms the best previously proposed distributed quantum algorithm for Simon’s problem in terms of generalizability and exactness.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"131 - 159"},"PeriodicalIF":0.4,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140100125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New families of Laplacian borderenergetic graphs 拉普拉斯边能图新族
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-26 DOI: 10.1007/s00236-024-00454-y
Cahit Dede

Laplacian matrix and its spectrum are commonly used for giving a measure in networks in order to analyse its topological properties. In this paper, Laplacian matrix of graphs and their spectrum are studied. Laplacian energy of a graph G of order n is defined as ( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|), where (lambda _i(L)) is the i-th eigenvalue of Laplacian matrix of G, and ({bar{d}}) is their average. If (mathrm{{LE}}(G) = mathrm{{LE}}(K_n)) for the complete graph (K_n) of order n, then G is known as L-borderenergetic graph. In the first part of this paper, we construct three infinite families of non-complete disconnected L-borderenergetic graphs: (Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+}), ( Lambda _2 = {G_{2,b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ }), ( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6} | bin {{mathbb {Z}}}^+ }), where (nabla ) is join operator and (times ) is direct product operator on graphs. Then, in the second part of this work, we construct new infinite families of non-complete connected L-borderenergetic graphs (Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+}), (Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ }) and (Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ }), where ({overline{G}}) is the complement operator on G.

拉普拉斯矩阵及其频谱通常用于给出网络的度量,以分析其拓扑特性。本文研究了图的拉普拉斯矩阵及其谱。阶数为 n 的图 G 的拉普拉卡能量定义为 ( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|), 其中 (lambda _i(L)) 是 G 的拉普拉卡矩阵的第 i 个特征值,({bar{d}}) 是它们的平均值。如果对于阶数为 n 的完整图 (K_n/),(mathrm{{LE}}(G) = mathrm{{LE}}(K_n)),则 G 被称为 L 边能图。在本文的第一部分,我们构建了三个无穷族的非完全互不连接的 L-borderenergetic 图:(Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+}), ( Lambda _2 = {G_{2、b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ }),( ( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6}| bin {{mathbb {Z}}^+ }),其中 (nabla )是连接算子,(times )是图上的直接积算子。然后,在这项工作的第二部分,我们构建了新的无穷族非完全连通 L 边能图 (Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+})、(Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ }) and(Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ })、其中 ({overline{G}}) 是 G 上的补算子。
{"title":"New families of Laplacian borderenergetic graphs","authors":"Cahit Dede","doi":"10.1007/s00236-024-00454-y","DOIUrl":"10.1007/s00236-024-00454-y","url":null,"abstract":"<div><p>Laplacian matrix and its spectrum are commonly used for giving a measure in networks in order to analyse its topological properties. In this paper, Laplacian matrix of graphs and their spectrum are studied. Laplacian energy of a graph <i>G</i> of order <i>n</i> is defined as <span>( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|)</span>, where <span>(lambda _i(L))</span> is the <i>i</i>-th eigenvalue of Laplacian matrix of <i>G</i>, and <span>({bar{d}})</span> is their average. If <span>(mathrm{{LE}}(G) = mathrm{{LE}}(K_n))</span> for the complete graph <span>(K_n)</span> of order <i>n</i>, then <i>G</i> is known as <i>L</i>-borderenergetic graph. In the first part of this paper, we construct three infinite families of non-complete disconnected <i>L</i>-borderenergetic graphs: <span>(Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+})</span>, <span>( Lambda _2 = {G_{2,b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ })</span>, <span>( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6} | bin {{mathbb {Z}}}^+ })</span>, where <span>(nabla )</span> is join operator and <span>(times )</span> is direct product operator on graphs. Then, in the second part of this work, we construct new infinite families of non-complete connected <i>L</i>-borderenergetic graphs <span>(Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+})</span>, <span>(Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ })</span> and <span>(Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ })</span>, where <span>({overline{G}})</span> is the complement operator on <i>G</i>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"115 - 129"},"PeriodicalIF":0.4,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating subset sum ratio via partition computations 通过分区计算逼近子集和比率
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-12 DOI: 10.1007/s00236-023-00451-7
Giannis Alonistiotis, Antonis Antonopoulos, Nikolaos Melissinos, Aris Pagourtzis, Stavros Petsalakis, Manolis Vasilakis

We present a new FPTAS for the Subset Sum Ratio problem, which, given a set of integers, asks for two disjoint subsets such that the ratio of their sums is as close to 1 as possible. Our scheme makes use of exact and approximate algorithms for Partition, and clearly showcases the close relationship between the two algorithmic problems. Depending on the relationship between the size of the input set n and the error margin (varepsilon ), we improve upon the best currently known algorithm of Melissinos and Pagourtzis [COCOON 2018] of complexity (mathcal {O} (n^4 / varepsilon )). In particular, the exponent of n in our proposed scheme may decrease down to 2, depending on the Partition algorithm used.

我们针对子集和比问题提出了一种新的 FPTAS,在给定一个整数集合的情况下,要求找出两个不相交的子集,使它们的和之比尽可能接近 1。我们的方案利用了分治的精确算法和近似算法,清楚地展示了这两个算法问题之间的密切关系。根据输入集 n 的大小与误差幅度 (varepsilon )之间的关系,我们改进了 Melissinos 和 Pagourtzis [COCOON 2018] 目前已知的最佳算法,其复杂度为 (mathcal {O} (n^4 / varepsilon ))。特别是,在我们提出的方案中,n 的指数可能会下降到 2,这取决于所使用的 Partition 算法。
{"title":"Approximating subset sum ratio via partition computations","authors":"Giannis Alonistiotis,&nbsp;Antonis Antonopoulos,&nbsp;Nikolaos Melissinos,&nbsp;Aris Pagourtzis,&nbsp;Stavros Petsalakis,&nbsp;Manolis Vasilakis","doi":"10.1007/s00236-023-00451-7","DOIUrl":"10.1007/s00236-023-00451-7","url":null,"abstract":"<div><p>We present a new FPTAS for the <span>Subset Sum Ratio</span> problem, which, given a set of integers, asks for two disjoint subsets such that the ratio of their sums is as close to 1 as possible. Our scheme makes use of exact and approximate algorithms for <span>Partition</span>, and clearly showcases the close relationship between the two algorithmic problems. Depending on the relationship between the size of the input set <i>n</i> and the error margin <span>(varepsilon )</span>, we improve upon the best currently known algorithm of Melissinos and Pagourtzis [COCOON 2018] of complexity <span>(mathcal {O} (n^4 / varepsilon ))</span>. In particular, the exponent of <i>n</i> in our proposed scheme may decrease down to 2, depending on the <span>Partition</span> algorithm used.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"101 - 113"},"PeriodicalIF":0.4,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00451-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139459074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neighborhood mutual remainder: self-stabilizing distributed implementation and applications 邻域互余:自稳定分布式实现与应用
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-18 DOI: 10.1007/s00236-023-00450-8
Shlomi Dolev, Sayaka Kamei, Yoshiaki Katayama, Fukuhito Ooshita, Koichi Wada

Motivated by the need to convert move-atomic assumption in LOOK-COMPUTE-MOVE (LCM) robot algorithms to be implemented in existing distributed systems, we define a new distributed fundamental task, the neighborhood mutual remainder (NMR). Consider a situation where each process has a set of operations (O_p) and executes each operation in (O_p) infinitely often in distributed systems. Then, let (O_esubset O_p) be a subset of operations, which a process cannot execute, while its closed neighborhood executes operations in (O_psetminus O_e). The NMR is defined for such a situation. A distributed algorithm that satisfies the NMR requirement should satisfy the following two properties: (1) Liveness is satisfied if a process executes each operation in (O_p) infinitely often and (2) safety is satisfied if, when each process executes operations in (O_e), no process in its closed neighborhood executes operations in (O_psetminus O_e). We formalize the concept of NMR and give a simple self-stabilizing algorithm using the pigeon-hole principle to demonstrate the design paradigm to achieve NMR. A self-stabilizing algorithm tolerates transient faults (e.g., message loss, memory corruption, etc.) by its ability to converge from an arbitrary configuration to the legitimate one. In addition, we present an application of NMR to an LCM robot system for implementing a move-atomic property, where robots possess an independent clock that is advanced at the same speed. It is the first self-stabilizing implementation of the LCM synchronization for environments where each robot can have limited visibility and lights.

摘要 由于需要将 LOOK-COMPUTE-MOVE(LCM)机器人算法中的移动原子假设在现有分布式系统中实现,我们定义了一种新的分布式基本任务--邻域互余(NMR)。考虑这样一种情况:在分布式系统中,每个进程都有一组操作 (O_p),并且无限频繁地执行 (O_p)中的每个操作。那么,让 (O_esubset O_p) 是一个操作子集,进程不能执行它,而它的封闭邻域执行 (O_psetminus O_e) 中的操作。NMR 就是针对这种情况定义的。满足NMR要求的分布式算法应该满足以下两个特性:(1)如果一个进程无限频繁地执行(O_p )中的每一个操作,则满足有效性;(2)如果当每个进程执行(O_e )中的操作时,其封闭邻域中没有进程执行(O_psetminus O_e )中的操作,则满足安全性。我们正式提出了 NMR 概念,并利用鸽子洞原理给出了一个简单的自稳定算法,以演示实现 NMR 的设计范式。自稳定算法通过从任意配置收敛到合法配置的能力来容忍瞬时故障(如信息丢失、内存损坏等)。此外,我们还介绍了 NMR 在 LCM 机器人系统中的应用,该系统可实现移动原子特性,即机器人拥有以相同速度前进的独立时钟。这是 LCM 同步的首次自稳定实现,适用于每个机器人的能见度和灯光都有限的环境。
{"title":"Neighborhood mutual remainder: self-stabilizing distributed implementation and applications","authors":"Shlomi Dolev,&nbsp;Sayaka Kamei,&nbsp;Yoshiaki Katayama,&nbsp;Fukuhito Ooshita,&nbsp;Koichi Wada","doi":"10.1007/s00236-023-00450-8","DOIUrl":"10.1007/s00236-023-00450-8","url":null,"abstract":"<div><p>Motivated by the need to convert move-atomic assumption in <i>LOOK-COMPUTE-MOVE</i> (LCM) robot algorithms to be implemented in existing distributed systems, we define a new distributed fundamental task, the neighborhood mutual remainder (NMR). Consider a situation where each process has a set of operations <span>(O_p)</span> and executes each operation in <span>(O_p)</span> infinitely often in distributed systems. Then, let <span>(O_esubset O_p)</span> be a subset of operations, which a process cannot execute, while its closed neighborhood executes operations in <span>(O_psetminus O_e)</span>. The NMR is defined for such a situation. A distributed algorithm that satisfies the NMR requirement should satisfy the following two properties: (1) Liveness is satisfied if a process executes each operation in <span>(O_p)</span> infinitely often and (2) safety is satisfied if, when each process executes operations in <span>(O_e)</span>, no process in its closed neighborhood executes operations in <span>(O_psetminus O_e)</span>. We formalize the concept of NMR and give a simple self-stabilizing algorithm using the pigeon-hole principle to demonstrate the design paradigm to achieve NMR. A self-stabilizing algorithm tolerates transient faults (e.g., message loss, memory corruption, etc.) by its ability to converge from an arbitrary configuration to the legitimate one. In addition, we present an application of NMR to an LCM robot system for implementing a move-atomic property, where robots possess an independent clock that is advanced at the same speed. It is the first self-stabilizing implementation of the LCM synchronization for environments where each robot can have limited visibility and lights.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"83 - 100"},"PeriodicalIF":0.4,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138745976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
n-PS-codes, 2-infix-outfix codes and some related classes of codes n-PS 码、2-后缀码和一些相关的码类
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-15 DOI: 10.1007/s00236-023-00449-1
Haiyan Liu, Rongdong Cui, Tianjie Zhang

In this paper, n-PS-codes, 2-infix-outfix codes and some related classes of codes are investigated where (nge 1). The classes of n-PS-codes and 2-infix-outfix codes are generalizations of classes of prefix codes and suffix codes, and infix codes and outfix codes, respectively. The closure properties of n-PS-codes and g-3-PS-codes under composition are discussed where (nge 1), and the condition under which the class of 2-infix-outfix codes is closed under composition is provided.

摘要 本文研究了n-PS码、2-前缀-后缀码和一些相关的码类,其中 (nge 1) .n-PS码和2-后缀-后缀码分别是前缀码和后缀码、后缀码和后缀码的一般化。讨论了n-PS编码和g-3-PS编码在组成条件下的闭合性质,其中(nge 1) ,并提供了2-后缀-后缀编码类在组成条件下闭合的条件。
{"title":"n-PS-codes, 2-infix-outfix codes and some related classes of codes","authors":"Haiyan Liu,&nbsp;Rongdong Cui,&nbsp;Tianjie Zhang","doi":"10.1007/s00236-023-00449-1","DOIUrl":"10.1007/s00236-023-00449-1","url":null,"abstract":"<div><p>In this paper, <i>n</i>-PS-codes, 2-infix-outfix codes and some related classes of codes are investigated where <span>(nge 1)</span>. The classes of <i>n</i>-PS-codes and 2-infix-outfix codes are generalizations of classes of prefix codes and suffix codes, and infix codes and outfix codes, respectively. The closure properties of <i>n</i>-PS-codes and <i>g</i>-3-PS-codes under composition are discussed where <span>(nge 1)</span>, and the condition under which the class of 2-infix-outfix codes is closed under composition is provided.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"67 - 81"},"PeriodicalIF":0.4,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balancing m-ary search trees with compressions on the fringe 用边缘压缩平衡 mary 搜索树
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-15 DOI: 10.1007/s00236-023-00448-2
Shuyang Gao, Leen Hatem, Hosam Mahmoud

We investigate the performance of random m-ary trees grown under an algorithm that perfectly balances k levels, whenever the opportunity arises in a fringe subtree. The average-case analysis shows that considerable saving in space and search time is achieved by such a fringe balancing algorithm.

我们研究了在一种算法下生长的随机 mary 树的性能,这种算法能在边缘子树出现机会时完美地平衡 k 层。平均情况分析表明,这种边缘平衡算法大大节省了空间和搜索时间。
{"title":"Balancing m-ary search trees with compressions on the fringe","authors":"Shuyang Gao,&nbsp;Leen Hatem,&nbsp;Hosam Mahmoud","doi":"10.1007/s00236-023-00448-2","DOIUrl":"10.1007/s00236-023-00448-2","url":null,"abstract":"<div><p>We investigate the performance of random <i>m</i>-ary trees grown under an algorithm that perfectly balances <i>k</i> levels, whenever the opportunity arises in a fringe subtree. The average-case analysis shows that considerable saving in space and search time is achieved by such <b>a</b> fringe balancing algorithm.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"53 - 66"},"PeriodicalIF":0.4,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1