Pub Date : 2024-07-30DOI: 10.1007/s00236-024-00460-0
Burkay Sucu, Ebru Aydin Gol
Parametric timed automata (PTA) extend timed automata (TA) with parameters instead of fixed timing constraints, providing the flexibility to accommodate uncertainties during the design phase. Once a parametric model is obtained, the next step is finding the optimal parameters such that the resulting TA satisfies the specifications. This paper introduces a new algorithm for determining parameters from safety specifications for PTA with bounded integer parameters and no nested cycles. The algorithm searches for unsafe paths through a depth-first search and generates parameter constraints. In particular, the realizability of simple and cyclic paths are encoded via mixed integer linear programming and non-linear programming problems. Then, the parameter constraints rendering the path unrealizable are derived via quantifier elimination. The accumulated constraints through the depth-first search guarantee that a parameter valuation satisfying these constraints solves the synthesis problem. The results are illustrated over benchmarks.
{"title":"Cycle encoding-based parameter synthesis for timed automata safety","authors":"Burkay Sucu, Ebru Aydin Gol","doi":"10.1007/s00236-024-00460-0","DOIUrl":"10.1007/s00236-024-00460-0","url":null,"abstract":"<div><p>Parametric timed automata (PTA) extend timed automata (TA) with parameters instead of fixed timing constraints, providing the flexibility to accommodate uncertainties during the design phase. Once a parametric model is obtained, the next step is finding the optimal parameters such that the resulting TA satisfies the specifications. This paper introduces a new algorithm for determining parameters from safety specifications for PTA with bounded integer parameters and no nested cycles. The algorithm searches for unsafe paths through a depth-first search and generates parameter constraints. In particular, the realizability of simple and cyclic paths are encoded via mixed integer linear programming and non-linear programming problems. Then, the parameter constraints rendering the path unrealizable are derived via quantifier elimination. The accumulated constraints through the depth-first search guarantee that a parameter valuation satisfying these constraints solves the synthesis problem. The results are illustrated over benchmarks.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 4","pages":"333 - 356"},"PeriodicalIF":0.4,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1007/s00236-024-00459-7
Wenfeng Lai, Adiesha Liyanage, Binhai Zhu, Peng Zou
Motivated by computing duplication patterns in sequences, a new problem called the longest letter-duplicated subsequence (LLDS) is proposed. Given a sequence S of length n, a letter-duplicated subsequence is a subsequence of S in the form of (x_1^{d_1}x_2^{d_2}ldots x_k^{d_k}) with (x_iin Sigma ), (x_jne x_{j+1}) and (d_ige 2) for all i in [k] and j in ([k-1]). A linear time algorithm for computing a longest letter-duplicated subsequence (LLDS) of S can be easily obtained. In this paper, we focus on two variants of this problem: (1) ‘all-appearance’ version, i.e., all letters in (Sigma ) must appear in the solution, and (2) the weighted version. For the former, we obtain dichotomous results: We prove that, when each letter appears in S at least 4 times, the problem and a relaxed version on feasibility testing (FT) are both NP-hard. The reduction is from ((3^+,1,2^-))-SAT, where all 3-clauses (i.e., containing 3 lals) are monotone (i.e., containing only positive literals) and all 2-clauses contain only negative literals. We then show that when each letter appears in S at most 3 times, then the problem admits an O(n) time algorithm. Finally, we consider the weighted version, where the weight of a block (x_i^{d_i} (d_ige 2)) could be any positive function which might not grow with (d_i). We give a non-trivial (O(n^2)) time dynamic programming algorithm for this version, i.e., computing an LD-subsequence of S whose weight is maximized.
受计算序列中重复模式的启发,我们提出了一个称为最长字母重复子序列(LLDS)的新问题。给定一个长度为 n 的序列 S,对于 [k] 中的所有 i 和 ([k-1]) 中的所有 j,字母重复子序列是 S 的一个子序列,其形式为 (x_1^{d_1}x_2^{d_2}ldots x_k^{d_k}) with (x_iin Sigma ), (x_jne x_{j+1}) and (d_ige 2) 。计算 S 的最长字母重复子序列(LLDS)的线性时间算法很容易得到。在本文中,我们将重点讨论这个问题的两个变体:(1)"全部出现 "版本,即解中必须出现 (Sigma ) 中的所有字母;(2)加权版本。对于前者,我们得到了二分结果:我们证明,当每个字母在 S 中至少出现 4 次时,这个问题和可行性测试(FT)的简化版本都是 NP-困难的。该问题是由((3^+,1,2^-))-SAT 简化而来的,其中所有 3 个分句(即包含 3 个字面量)都是单调的(即只包含正字面量),而所有 2 个分句只包含负字面量。然后我们证明,当每个字母在 S 中最多出现 3 次时,该问题的算法时间为 O(n)。最后,我们考虑了加权版本,其中块 (x_i^{d_i} (d_ige 2))的权重可以是任何正函数,它可能不会随着 (d_i)的增长而增长。对于这个版本,我们给出了一种非微妙的(O(n^2))时间动态编程算法,即计算 S 的 LD 子序列,其权重最大化。
{"title":"The longest letter-duplicated subsequence and related problems","authors":"Wenfeng Lai, Adiesha Liyanage, Binhai Zhu, Peng Zou","doi":"10.1007/s00236-024-00459-7","DOIUrl":"10.1007/s00236-024-00459-7","url":null,"abstract":"<div><p>Motivated by computing duplication patterns in sequences, a new problem called the longest letter-duplicated subsequence (LLDS) is proposed. Given a sequence <i>S</i> of length <i>n</i>, a letter-duplicated subsequence is a subsequence of <i>S</i> in the form of <span>(x_1^{d_1}x_2^{d_2}ldots x_k^{d_k})</span> with <span>(x_iin Sigma )</span>, <span>(x_jne x_{j+1})</span> and <span>(d_ige 2)</span> for all <i>i</i> in [<i>k</i>] and <i>j</i> in <span>([k-1])</span>. A linear time algorithm for computing a longest letter-duplicated subsequence (LLDS) of <i>S</i> can be easily obtained. In this paper, we focus on two variants of this problem: (1) ‘all-appearance’ version, i.e., all letters in <span>(Sigma )</span> must appear in the solution, and (2) the weighted version. For the former, we obtain dichotomous results: We prove that, when each letter appears in <i>S</i> at least 4 times, the problem and a relaxed version on feasibility testing (FT) are both NP-hard. The reduction is from <span>((3^+,1,2^-))</span>-SAT, where all 3-clauses (i.e., containing 3 lals) are monotone (i.e., containing only positive literals) and all 2-clauses contain only negative literals. We then show that when each letter appears in <i>S</i> at most 3 times, then the problem admits an <i>O</i>(<i>n</i>) time algorithm. Finally, we consider the weighted version, where the weight of a block <span>(x_i^{d_i} (d_ige 2))</span> could be any positive function which might not grow with <span>(d_i)</span>. We give a non-trivial <span>(O(n^2))</span> time dynamic programming algorithm for this version, i.e., computing an LD-subsequence of <i>S</i> whose weight is maximized.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 3","pages":"315 - 329"},"PeriodicalIF":0.4,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-024-00459-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141741186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-13DOI: 10.1007/s00236-024-00457-9
Wided Ghardallou, Hessamaldin Mohammadi, Richard C. Linger, Mark Pleszkoch, JiMeng Loh, Ali Mili
Invariant relations are used to analyze while loops; while their primary application is to derive the function of a loop, they can also be used to derive loop invariants, weakest preconditions, strongest postconditions, sufficient conditions of correctness, necessary conditions of correctness, and termination conditions of loops. In this paper we present two generic invariant relations that capture the semantics of loops whose loop body applies affine transformations on numeric variables.
不变量关系用于分析 while 循环;虽然它们的主要应用是推导循环的函数,但也可用于推导循环不变量、最弱前置条件、最强后置条件、正确性充分条件、正确性必要条件和循环终止条件。在本文中,我们提出了两个通用不变式关系,它们捕捉了循环体对数值变量进行仿射变换的循环语义。
{"title":"Invariant relations for affine loops","authors":"Wided Ghardallou, Hessamaldin Mohammadi, Richard C. Linger, Mark Pleszkoch, JiMeng Loh, Ali Mili","doi":"10.1007/s00236-024-00457-9","DOIUrl":"10.1007/s00236-024-00457-9","url":null,"abstract":"<div><p>Invariant relations are used to analyze while loops; while their primary application is to derive the function of a loop, they can also be used to derive loop invariants, weakest preconditions, strongest postconditions, sufficient conditions of correctness, necessary conditions of correctness, and termination conditions of loops. In this paper we present two generic invariant relations that capture the semantics of loops whose loop body applies affine transformations on numeric variables.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 3","pages":"261 - 314"},"PeriodicalIF":0.4,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-024-00457-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140930753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-09DOI: 10.1007/s00236-024-00458-8
Shiping Chen, Xinyu Ge
In this paper, we propose a decision procedure of reachability for a linear system (xi '=Axi +u), where the matrix (A's) eigenvalues can be arbitrary algebraic number and the input u is a vector of trigonometric-exponential polynomials. If the initial set contains only one point, the reachability problem under consideration is reduced to the decidability of the sign of trigonometric-exponential polynomial and then achieved by being reduced to verification of a series of univariate polynomial inequalities through Taylor expansions of the related exponential functions and trigonometric functions. If the initial set is open semi-algebraic, we will propose a decision procedure based on OpenCAD and an algorithm of real root isolation derived from the sign-deciding procedure for the trigonometric-exponential polynomials. The experimental results indicate the efficiency of our approach. Under the assumption of Schanuel’s Conjecture, the above procedures are complete for bounded time except for several cases.
本文提出了线性系统 (xi '=Axi +u/)的可达性决策程序,其中矩阵 (A's/)特征值可以是任意代数数,输入 u 是三角-指数多项式的向量。如果初始集只包含一个点,那么所考虑的可达性问题就简化为三角-指数多项式符号的可判定性,然后通过相关指数函数和三角函数的泰勒展开,简化为一系列单变量多项式不等式的验证。如果初始集合是开放的半代数,我们将提出一种基于 OpenCAD 的判定程序,以及一种从三角-指数多项式的符号判定程序中衍生出来的实根隔离算法。实验结果表明我们的方法非常有效。在Schanuel猜想的假设下,除了几种情况外,上述程序都能在有界时间内完成。
{"title":"Reachability analysis of linear systems","authors":"Shiping Chen, Xinyu Ge","doi":"10.1007/s00236-024-00458-8","DOIUrl":"10.1007/s00236-024-00458-8","url":null,"abstract":"<div><p>In this paper, we propose a decision procedure of reachability for a linear system <span>(xi '=Axi +u)</span>, where the matrix <span>(A's)</span> eigenvalues can be arbitrary algebraic number and the input <i>u</i> is a vector of trigonometric-exponential polynomials. If the initial set contains only one point, the reachability problem under consideration is reduced to the decidability of the sign of trigonometric-exponential polynomial and then achieved by being reduced to verification of a series of univariate polynomial inequalities through Taylor expansions of the related exponential functions and trigonometric functions. If the initial set is open semi-algebraic, we will propose a decision procedure based on OpenCAD and an algorithm of real root isolation derived from the sign-deciding procedure for the trigonometric-exponential polynomials. The experimental results indicate the efficiency of our approach. Under the assumption of Schanuel’s Conjecture, the above procedures are complete for bounded time except for several cases.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 3","pages":"231 - 260"},"PeriodicalIF":0.4,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140568440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-29DOI: 10.1007/s00236-023-00452-6
Kamaledin Ghiasi-Shirazi, Taraneh Ghandi, Ali Taghizadeh, Ali Rahimi-Baigi
Red–black (RB) trees are one of the most efficient variants of balanced binary search trees. However, they have often been criticized for being too complicated, hard to explain, and unsuitable for pedagogical purposes, particularly their delete operation. Sedgewick (in: Dagstuhl Workshop on Data Structures, 2008. https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf) identified the length of code as the root of the problems and introduced left-leaning red–black (LLRB) trees. The delete operation of LLRB trees has a compact recursive code. Unfortunately, it may perform many unnecessary operations. The crux of the deletion algorithm is dealing with a “deficient” subtree, that is one whose black-height has become one less than that of its sibling subtree. In this paper, we revisit 2–3 red–black trees and propose a parity-seeking delete algorithm with the basic idea of making a deficient subtree on a par with its sibling: either by fixing the deficient subtree or by turning the sibling deficient as well, ascending deficiency to the parent node. Interestingly, the proposed parity-seeking delete algorithm also works for 2–3–4 RB trees. Our experiments show that the proposed parity-seeking delete algorithm is as efficient as the best preceding RB trees. The proposed parity-seeking delete algorithm is easily understandable and suitable for pedagogical and practical purposes.
{"title":"Revisiting 2–3 red–black trees with a pedagogically sound yet efficient deletion algorithm: parity-seeking","authors":"Kamaledin Ghiasi-Shirazi, Taraneh Ghandi, Ali Taghizadeh, Ali Rahimi-Baigi","doi":"10.1007/s00236-023-00452-6","DOIUrl":"10.1007/s00236-023-00452-6","url":null,"abstract":"<div><p>Red–black (RB) trees are one of the most efficient variants of balanced binary search trees. However, they have often been criticized for being too complicated, hard to explain, and unsuitable for pedagogical purposes, particularly their delete operation. Sedgewick (in: Dagstuhl Workshop on Data Structures, 2008. https://sedgewick.io/wp-content/themes/sedgewick/papers/2008LLRB.pdf) identified the length of code as the root of the problems and introduced left-leaning red–black (LLRB) trees. The delete operation of LLRB trees has a compact recursive code. Unfortunately, it may perform many unnecessary operations. The crux of the deletion algorithm is dealing with a “deficient” subtree, that is one whose black-height has become one less than that of its sibling subtree. In this paper, we revisit 2–3 red–black trees and propose a parity-seeking delete algorithm with the basic idea of making a deficient subtree on a par with its sibling: either by fixing the deficient subtree or by turning the sibling deficient as well, ascending deficiency to the parent node. Interestingly, the proposed parity-seeking <i>delete</i> algorithm also works for 2–3–4 RB trees. Our experiments show that the proposed parity-seeking delete algorithm is as efficient as the best preceding RB trees. The proposed parity-seeking delete algorithm is easily understandable and suitable for pedagogical and practical purposes.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 3","pages":"199 - 229"},"PeriodicalIF":0.4,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140325649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-19DOI: 10.1007/s00236-024-00453-z
Gang Yang, Jiannan Zhou, Changxiang He, Yaping Mao
It is important to be able to monitor the network and detect this failure when a connection (an edge) fails. For a vertex set M and an edge e of the graph G, let P(M, e) be the set of pairs (x, y) with a vertex x of M and a vertex y of V(G) such that e belongs to all shortest paths between x and y. A vertex set M of the graph G is distance-edge-monitoring set if every edge e of G is monitored by some vertex of M, that is, the set P(M, e) is nonempty. The distance-edge-monitoring number of a graph G, recently introduced by Foucaud, Kao, Klasing, Miller, and Ryan, is defined as the smallest size of distance-edge-monitoring sets of G. In this paper, we determine the bounds of the distance-edge-monitoring number of grid-based pyramids and the exact value of distance-edge-monitoring number for M(t)-graph and Sierpiński-type graphs. We also compare the distance-edge-monitoring set with average degree, the size of edge set and the size of vertex set of G, where G is M(t)-graph or Sierpiński-type graphs.
重要的是能够监控网络,并在连接(边)失效时检测到这种故障。对于图 G 的顶点集 M 和边 e,让 P(M,e)成为具有 M 的顶点 x 和 V(G)的顶点 y,且 e 属于 x 和 y 之间所有最短路径的对 (x, y) 的集合。如果图 G 的每条边 e 都受到 M 的某个顶点的监控,即集合 P(M, e) 非空,那么图 G 的顶点集 M 就是距离-边监控集。Foucaud, Kao, Klasing, Miller 和 Ryan 最近提出了图 G 的距离边监控数,它被定义为 G 的距离边监控集的最小大小。在本文中,我们确定了基于网格的金字塔的距离边监控数的边界,以及 M(t)-graph 和 Sierpiński-type 图的距离边监控数的精确值。我们还比较了距离边监控集与 G 的平均度、边集大小和顶点集大小(其中 G 为 M(t)-graph 或 Sierpiński-type 图)。
{"title":"Distance-edge-monitoring sets of networks","authors":"Gang Yang, Jiannan Zhou, Changxiang He, Yaping Mao","doi":"10.1007/s00236-024-00453-z","DOIUrl":"10.1007/s00236-024-00453-z","url":null,"abstract":"<div><p>It is important to be able to monitor the network and detect this failure when a connection (an edge) fails. For a vertex set <i>M</i> and an edge <i>e</i> of the graph <i>G</i>, let <i>P</i>(<i>M</i>, <i>e</i>) be the set of pairs (<i>x</i>, <i>y</i>) with a vertex <i>x</i> of <i>M</i> and a vertex <i>y</i> of <i>V</i>(<i>G</i>) such that <i>e</i> belongs to all shortest paths between <i>x</i> and <i>y</i>. A vertex set <i>M</i> of the graph <i>G</i> is <i>distance-edge-monitoring set</i> if every edge <i>e</i> of <i>G</i> is monitored by some vertex of <i>M</i>, that is, the set <i>P</i>(<i>M</i>, <i>e</i>) is nonempty. The distance-edge-monitoring number of a graph <i>G</i>, recently introduced by Foucaud, Kao, Klasing, Miller, and Ryan, is defined as the smallest size of distance-edge-monitoring sets of <i>G</i>. In this paper, we determine the bounds of the distance-edge-monitoring number of grid-based pyramids and the exact value of distance-edge-monitoring number for <i>M</i>(<i>t</i>)-graph and Sierpiński-type graphs. We also compare the distance-edge-monitoring set with average degree, the size of edge set and the size of vertex set of <i>G</i>, where <i>G</i> is <i>M</i>(<i>t</i>)-graph or Sierpiński-type graphs.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"183 - 198"},"PeriodicalIF":0.4,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140197909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-13DOI: 10.1007/s00236-024-00456-w
Attila Bagossy, Péter Battyányi
In this paper, we present an encoding of the (lambda )-calculus in a multiset rewriting system and provide a few applications of the construction. For this purpose, we choose the calculus named String MultiSet Rewriting, which was introduced in Barbuti et al. (Electron Notes Theor Comput Sci 194:19–34, 2008) by Barbuti et al. With the help of our encoding, we give alternative proofs for the standardization and the finiteness of developments theorems in the (lambda )-calculus.
{"title":"An encoding of the (lambda )-calculus in the String MultiSet Rewriting calculus","authors":"Attila Bagossy, Péter Battyányi","doi":"10.1007/s00236-024-00456-w","DOIUrl":"10.1007/s00236-024-00456-w","url":null,"abstract":"<div><p>In this paper, we present an encoding of the <span>(lambda )</span>-calculus in a multiset rewriting system and provide a few applications of the construction. For this purpose, we choose the calculus named String MultiSet Rewriting, which was introduced in Barbuti et al. (Electron Notes Theor Comput Sci 194:19–34, 2008) by Barbuti et al. With the help of our encoding, we give alternative proofs for the standardization and the finiteness of developments theorems in the <span>(lambda )</span>-calculus.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"161 - 181"},"PeriodicalIF":0.4,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-024-00456-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140126198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-10DOI: 10.1007/s00236-024-00455-x
Hao Li, Daowen Qiu, Le Luo, Paulo Mateus
Simon’s problem is one of the most important problems demonstrating the power of quantum algorithms, as it greatly inspired the proposal of Shor’s algorithm. The generalized Simon’s problem is a natural extension of Simon’s problem and also a special hidden subgroup problem: Given a function (f:{0,1}^n rightarrow {0,1}^m), it is promised that there exists a hidden subgroup (Sle mathbb {Z}_2^n) of rank k such that for any (x, yin {{0, 1}}^n), (f(x) = f(y)) iff (x oplus y in S). The goal of generalized Simon’s problem is to find the hidden subgroup S. In this paper, we present two key contributions. Firstly, we characterize the structure of the generalized Simon’s problem in distributed scenario and introduce a corresponding distributed quantum algorithm. Secondly, we refine the algorithm to ensure exactness due to the application of quantum amplitude amplification technique. Our algorithm offers exponential speedup compared to the distributed classical algorithm. When contrasted with the quantum algorithm for the generalized Simon’s problem, our algorithm’s oracle requires fewer qubits, thus making it easier to be physically implemented. Particularly, the exact distributed quantum algorithm we develop for the generalized Simon’s problem outperforms the best previously proposed distributed quantum algorithm for Simon’s problem in terms of generalizability and exactness.
西蒙问题是展示量子算法威力的最重要问题之一,因为它极大地启发了肖尔算法的提出。广义西蒙问题是西蒙问题的自然延伸,也是一个特殊的隐藏子群问题:给定一个函数 (f:秩为k的隐藏子群(Sle mathbb {Z}_2^n) ,这样对于任意的(x, yin {0, 1}^n), (f(x) = f(y)) iff (x oplus y in S).广义西蒙问题的目标是找到隐藏子群 S。首先,我们描述了分布式场景下广义西蒙问题的结构,并引入了相应的分布式量子算法。其次,我们对算法进行了改进,以确保量子振幅放大技术的精确性。与分布式经典算法相比,我们的算法具有指数级的速度提升。与广义西蒙问题的量子算法相比,我们算法的神谕所需的量子比特更少,因此更易于物理实现。特别是,我们为广义西蒙问题开发的精确分布式量子算法在普适性和精确性方面都优于之前为西蒙问题提出的最佳分布式量子算法。
{"title":"Exact distributed quantum algorithm for generalized Simon’s problem","authors":"Hao Li, Daowen Qiu, Le Luo, Paulo Mateus","doi":"10.1007/s00236-024-00455-x","DOIUrl":"10.1007/s00236-024-00455-x","url":null,"abstract":"<div><p>Simon’s problem is one of the most important problems demonstrating the power of quantum algorithms, as it greatly inspired the proposal of Shor’s algorithm. The generalized Simon’s problem is a natural extension of Simon’s problem and also a special hidden subgroup problem: Given a function <span>(f:{0,1}^n rightarrow {0,1}^m)</span>, it is promised that there exists a hidden subgroup <span>(Sle mathbb {Z}_2^n)</span> of rank <i>k</i> such that for any <span>(x, yin {{0, 1}}^n)</span>, <span>(f(x) = f(y))</span> iff <span>(x oplus y in S)</span>. The goal of generalized Simon’s problem is to find the hidden subgroup <i>S</i>. In this paper, we present two key contributions. Firstly, we characterize the structure of the generalized Simon’s problem in distributed scenario and introduce a corresponding distributed quantum algorithm. Secondly, we refine the algorithm to ensure exactness due to the application of quantum amplitude amplification technique. Our algorithm offers exponential speedup compared to the distributed classical algorithm. When contrasted with the quantum algorithm for the generalized Simon’s problem, our algorithm’s oracle requires fewer qubits, thus making it easier to be physically implemented. Particularly, the exact distributed quantum algorithm we develop for the generalized Simon’s problem outperforms the best previously proposed distributed quantum algorithm for Simon’s problem in terms of generalizability and exactness.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"131 - 159"},"PeriodicalIF":0.4,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140100125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-26DOI: 10.1007/s00236-024-00454-y
Cahit Dede
Laplacian matrix and its spectrum are commonly used for giving a measure in networks in order to analyse its topological properties. In this paper, Laplacian matrix of graphs and their spectrum are studied. Laplacian energy of a graph G of order n is defined as ( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|), where (lambda _i(L)) is the i-th eigenvalue of Laplacian matrix of G, and ({bar{d}}) is their average. If (mathrm{{LE}}(G) = mathrm{{LE}}(K_n)) for the complete graph (K_n) of order n, then G is known as L-borderenergetic graph. In the first part of this paper, we construct three infinite families of non-complete disconnected L-borderenergetic graphs: (Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+}), ( Lambda _2 = {G_{2,b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ }), ( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6} | bin {{mathbb {Z}}}^+ }), where (nabla ) is join operator and (times ) is direct product operator on graphs. Then, in the second part of this work, we construct new infinite families of non-complete connected L-borderenergetic graphs (Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+}), (Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ }) and (Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ }), where ({overline{G}}) is the complement operator on G.
拉普拉斯矩阵及其频谱通常用于给出网络的度量,以分析其拓扑特性。本文研究了图的拉普拉斯矩阵及其谱。阶数为 n 的图 G 的拉普拉卡能量定义为 ( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|), 其中 (lambda _i(L)) 是 G 的拉普拉卡矩阵的第 i 个特征值,({bar{d}}) 是它们的平均值。如果对于阶数为 n 的完整图 (K_n/),(mathrm{{LE}}(G) = mathrm{{LE}}(K_n)),则 G 被称为 L 边能图。在本文的第一部分,我们构建了三个无穷族的非完全互不连接的 L-borderenergetic 图:(Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+}), ( Lambda _2 = {G_{2、b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ }),( ( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6}| bin {{mathbb {Z}}^+ }),其中 (nabla )是连接算子,(times )是图上的直接积算子。然后,在这项工作的第二部分,我们构建了新的无穷族非完全连通 L 边能图 (Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+})、(Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ }) and(Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ })、其中 ({overline{G}}) 是 G 上的补算子。
{"title":"New families of Laplacian borderenergetic graphs","authors":"Cahit Dede","doi":"10.1007/s00236-024-00454-y","DOIUrl":"10.1007/s00236-024-00454-y","url":null,"abstract":"<div><p>Laplacian matrix and its spectrum are commonly used for giving a measure in networks in order to analyse its topological properties. In this paper, Laplacian matrix of graphs and their spectrum are studied. Laplacian energy of a graph <i>G</i> of order <i>n</i> is defined as <span>( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|)</span>, where <span>(lambda _i(L))</span> is the <i>i</i>-th eigenvalue of Laplacian matrix of <i>G</i>, and <span>({bar{d}})</span> is their average. If <span>(mathrm{{LE}}(G) = mathrm{{LE}}(K_n))</span> for the complete graph <span>(K_n)</span> of order <i>n</i>, then <i>G</i> is known as <i>L</i>-borderenergetic graph. In the first part of this paper, we construct three infinite families of non-complete disconnected <i>L</i>-borderenergetic graphs: <span>(Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+})</span>, <span>( Lambda _2 = {G_{2,b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ })</span>, <span>( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6} | bin {{mathbb {Z}}}^+ })</span>, where <span>(nabla )</span> is join operator and <span>(times )</span> is direct product operator on graphs. Then, in the second part of this work, we construct new infinite families of non-complete connected <i>L</i>-borderenergetic graphs <span>(Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+})</span>, <span>(Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ })</span> and <span>(Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ })</span>, where <span>({overline{G}})</span> is the complement operator on <i>G</i>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"115 - 129"},"PeriodicalIF":0.4,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present a new FPTAS for the Subset Sum Ratio problem, which, given a set of integers, asks for two disjoint subsets such that the ratio of their sums is as close to 1 as possible. Our scheme makes use of exact and approximate algorithms for Partition, and clearly showcases the close relationship between the two algorithmic problems. Depending on the relationship between the size of the input set n and the error margin (varepsilon ), we improve upon the best currently known algorithm of Melissinos and Pagourtzis [COCOON 2018] of complexity (mathcal {O} (n^4 / varepsilon )). In particular, the exponent of n in our proposed scheme may decrease down to 2, depending on the Partition algorithm used.
{"title":"Approximating subset sum ratio via partition computations","authors":"Giannis Alonistiotis, Antonis Antonopoulos, Nikolaos Melissinos, Aris Pagourtzis, Stavros Petsalakis, Manolis Vasilakis","doi":"10.1007/s00236-023-00451-7","DOIUrl":"10.1007/s00236-023-00451-7","url":null,"abstract":"<div><p>We present a new FPTAS for the <span>Subset Sum Ratio</span> problem, which, given a set of integers, asks for two disjoint subsets such that the ratio of their sums is as close to 1 as possible. Our scheme makes use of exact and approximate algorithms for <span>Partition</span>, and clearly showcases the close relationship between the two algorithmic problems. Depending on the relationship between the size of the input set <i>n</i> and the error margin <span>(varepsilon )</span>, we improve upon the best currently known algorithm of Melissinos and Pagourtzis [COCOON 2018] of complexity <span>(mathcal {O} (n^4 / varepsilon ))</span>. In particular, the exponent of <i>n</i> in our proposed scheme may decrease down to 2, depending on the <span>Partition</span> algorithm used.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"101 - 113"},"PeriodicalIF":0.4,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00451-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139459074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}