Theory of Computing Systems最新文献

筛选
英文 中文
Elastic-Degenerate String Matching with 1 Error or Mismatch 弹性去生成字符串匹配,1 次错误或不匹配
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-09-16 DOI: 10.1007/s00224-024-10194-8
Giulia Bernardini, Esteban Gabory, Solon P. Pissis, Leen Stougie, Michelle Sweering, Wiktor Zuba
{"title":"Elastic-Degenerate String Matching with 1 Error or Mismatch","authors":"Giulia Bernardini, Esteban Gabory, Solon P. Pissis, Leen Stougie, Michelle Sweering, Wiktor Zuba","doi":"10.1007/s00224-024-10194-8","DOIUrl":"https://doi.org/10.1007/s00224-024-10194-8","url":null,"abstract":"<p>An elastic-degenerate (ED) string is a sequence of <i>n</i> finite sets of strings of total length <i>N</i>, introduced to represent a set of related DNA sequences, also known as a <i>pangenome</i>. The ED string matching (EDSM) problem consists in reporting all occurrences of a pattern of length <i>m</i> in an ED text. The EDSM problem has recently received some attention by the combinatorial pattern matching community, culminating in an <span>(mathcal {tilde{O}}(nm^{omega -1})+mathcal {O}(N))</span>-time algorithm [Bernardini et al., SIAM J. Comput. 2022], where <span>(omega )</span> denotes the matrix multiplication exponent and the <span>(mathcal {tilde{O}}(cdot ))</span> notation suppresses polylog factors. In the <i>k</i>-EDSM problem, the approximate version of EDSM, we are asked to report all pattern occurrences with at most <i>k</i> errors. <i>k</i>-EDSM can be solved in <span>(mathcal {O}(k^2mG+kN))</span> time, under edit distance, or <span>(mathcal {O}(kmG+kN))</span> time, under Hamming distance, where <i>G</i> denotes the total number of strings in the ED text [Bernardini et al., Theor. Comput. Sci. 2020]. Unfortunately, <i>G</i> is only bounded by <i>N</i>, and so even for <span>(k=1)</span>, the existing algorithms run in <span>(varOmega (mN))</span> time in the worst case. In this paper we make progress in this direction. We show that 1-EDSM can be solved in <span>(mathcal {O}((nm^2 + N)log m))</span> or <span>(mathcal {O}(nm^3 + N))</span> time under edit distance. For the decision version of the problem, we present a faster <span>(mathcal {O}(nm^2sqrt{log m} + Nlog log m))</span>-time algorithm. We also show that 1-EDSM can be solved in <span>(mathcal {O}(nm^2 + Nlog m))</span> time under Hamming distance. Our algorithms for edit distance rely on non-trivial reductions from 1-EDSM to special instances of classic computational geometry problems (2d rectangle stabbing or 2d range emptiness), which we show how to solve efficiently. In order to obtain an even faster algorithm for Hamming distance, we rely on employing and adapting the <i>k</i>-errata trees for indexing with errors [Cole et al., STOC 2004]. This is an extended version of a paper presented at LATIN 2022.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"101 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
String Attractors of Some Simple-Parry Automatic Sequences 一些简易arry 自动序列的弦吸引子
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-09-10 DOI: 10.1007/s00224-024-10195-7
France Gheeraert, Giuseppe Romana, Manon Stipulanti
{"title":"String Attractors of Some Simple-Parry Automatic Sequences","authors":"France Gheeraert, Giuseppe Romana, Manon Stipulanti","doi":"10.1007/s00224-024-10195-7","DOIUrl":"https://doi.org/10.1007/s00224-024-10195-7","url":null,"abstract":"<p>Firstly studied by Kempa and Prezza in 2018 as the unifying idea behind text compression algorithms, string attractors have become a compelling object of theoretical research within the community of combinatorics on words. In this context, they have been studied for several families of finite and infinite words. In this paper, we focus on string attractors of prefixes of particular automatic infinite words (including the famous period-doubling and <i>k</i>-bonacci words) related to simple-Parry numbers. For a subfamily of these words, we describe string attractors of optimal size, while for the rest of them, we provide nearly optimal-size ones. Such a contribution is of particular interest, since in general finding smallest string attractors is NP-hard. This extends our previous work published in the international conference WORDS 2023.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"117 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jumping Automata over Infinite Words 跳过无限字的自动机
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-09-10 DOI: 10.1007/s00224-024-10192-w
Shaull Almagor, Omer Yizhaq
{"title":"Jumping Automata over Infinite Words","authors":"Shaull Almagor, Omer Yizhaq","doi":"10.1007/s00224-024-10192-w","DOIUrl":"https://doi.org/10.1007/s00224-024-10192-w","url":null,"abstract":"<p>Jumping automata are finite automata that read their input in a non-consecutive manner, disregarding the order of the letters in the word. We introduce and study jumping automata over infinite words. Unlike the setting of finite words, which has been well studied, for infinite words it is not clear how words can be reordered. To this end, we consider three semantics: automata that read the infinite word in some order so that no letter is overlooked, automata that can permute the word in windows of a given size k, and automata that can permute the word in windows of an existentially-quantified bound. We study expressiveness, closure properties and algorithmic properties of these models.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"173 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Solution Sets of Three-Variable Word Equations 论三变量word方程的解集
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-08-20 DOI: 10.1007/s00224-024-10193-9
Aleksi Saarela
{"title":"On the Solution Sets of Three-Variable Word Equations","authors":"Aleksi Saarela","doi":"10.1007/s00224-024-10193-9","DOIUrl":"https://doi.org/10.1007/s00224-024-10193-9","url":null,"abstract":"<p>It is known that the set of solutions of any constant-free three-variable word equation can be represented using parametric words, and the number of numerical parameters and the level of nesting in these parametric words is at most logarithmic with respect to the length of the equation. We show that this result can be significantly improved in the case of unbalanced equations, that is, equations where at least one variable has a different number of occurrences on the left-hand side and on the right-hand side. More specifically, it is sufficient to have two numerical parameters and one level of nesting in this case. We also discuss the possibility of proving a similar result for balanced equations in the future.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"29 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near-Optimal Auctions on Independence Systems 独立系统上的近优拍卖
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-08-17 DOI: 10.1007/s00224-024-10189-5
Sabrina C. L. Ammann, Sebastian Stiller
{"title":"Near-Optimal Auctions on Independence Systems","authors":"Sabrina C. L. Ammann, Sebastian Stiller","doi":"10.1007/s00224-024-10189-5","DOIUrl":"https://doi.org/10.1007/s00224-024-10189-5","url":null,"abstract":"<p>A classical result by Myerson (Math. Oper. Res. <b>6</b>(1), 58-73, 1981) gives a characterization of an optimal auction for any given distribution of valuations of the bidders. We consider the situation where the distribution is not explicitly given but can be observed in a sample of auction results from the same distribution. A seminal paper by Morgenstern and Roughgarden (Adv.Neural Inf. Process. Syst. <b>28</b>, 2015) proposes to learn a near-optimal auction from the hypothesis class of <i>t</i>-level auctions. They prove a bound on the sample complexity, i.e., the function <span>(f(varepsilon , delta ))</span> of required samples to guarantee a certain level of precision <span>((1-varepsilon ))</span> with a probability of at least <span>((1-delta ))</span>, for the general single-parameter case and a tighter bound for the very restricted matroid case. We show a new bound for the case of independence systems, that widely generalizes matroids and contains several important combinatorial optimization problems. This bound of <span>(tilde{O}left( nicefrac {H^2n^4}{varepsilon ^3}right) )</span> falls neatly between those known for the general and the matroid case. The class of independence systems contains several well known NP-hard problems such as knapsack. Therefore, the allocation itself might in practice be limited to <span>(alpha )</span>-approximate solutions. In a second result we show that an approximation algorithm can be used without compromising the sample complexity. Also, the precision is affected only mildly, resulting in a factor of <span>(alpha cdot (1-varepsilon ))</span>.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"27 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142205312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2-Balanced Sequences Coding Rectangle Exchange Transformation 2 平衡序列编码矩形交换变换
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-08-10 DOI: 10.1007/s00224-024-10188-6
Lubomíra Dvořáková, Zuzana Masáková, Edita Pelantová
{"title":"2-Balanced Sequences Coding Rectangle Exchange Transformation","authors":"Lubomíra Dvořáková, Zuzana Masáková, Edita Pelantová","doi":"10.1007/s00224-024-10188-6","DOIUrl":"https://doi.org/10.1007/s00224-024-10188-6","url":null,"abstract":"<p>We define a new class of ternary sequences that are 2-balanced. These sequences are obtained by colouring of Sturmian sequences. We show that the class contains sequences of any given letter frequencies. We provide an upper bound on factor and abelian complexity of these sequences. Using the interpretation by rectangle exchange transformation, we prove that for almost all triples of letter frequencies, the upper bound on factor and abelian complexity is reached. The bound on factor complexity is given using a number-theoretical function which we compute explicitly for a class of parameters.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"14 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141943934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obstructions to Return Preservation for Episturmian Morphisms 表观变形的返回保存障碍
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-08-01 DOI: 10.1007/s00224-024-10190-y
Valérie Berthé, Herman Goulet-Ouellet
{"title":"Obstructions to Return Preservation for Episturmian Morphisms","authors":"Valérie Berthé, Herman Goulet-Ouellet","doi":"10.1007/s00224-024-10190-y","DOIUrl":"https://doi.org/10.1007/s00224-024-10190-y","url":null,"abstract":"<p>This paper studies obstructions to preservation of return sets by episturmian morphisms. We show, by way of an explicit construction, that infinitely many obstructions exist. This generalizes and improves an earlier result about Sturmian morphisms.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"62 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141887400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Constructive Upper Bounds for Repetition Thresholds 重复阈值的非建设性上限
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-08-01 DOI: 10.1007/s00224-024-10187-7
Arseny M. Shur
{"title":"Non-Constructive Upper Bounds for Repetition Thresholds","authors":"Arseny M. Shur","doi":"10.1007/s00224-024-10187-7","DOIUrl":"https://doi.org/10.1007/s00224-024-10187-7","url":null,"abstract":"<p>We study the power of entropy compression in proving avoidance results in combinatorics on words. Namely, we analyze variants of a simple algorithm that transforms an input word into a word avoiding repetitions of prescribed type. This transformation can be made reversible by adding the log of the run of the algorithm to the output. Counting distinct logs, it is possible to conclude that a given repetition is avoidable over all sufficiently large alphabets. We introduce two methods of counting logs. Applying them to ordinary, undirected, and conjugate repetitions, we prove, in all cases, the results of type “<span>((1+frac{1}{d}))</span>-powers are avoidable over <span>(d+O(1))</span> letters”. These results are closer to the optimum than is usually expected from purely information-theoretic considerations. In the final part, we present experimental results obtained by the mentioned transformation algorithm in the extreme case of <span>((d+1))</span>-ary words avoiding <span>((1+frac{1}{d})^+!)</span>-powers.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"81 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141885344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lower Bounds on the Amortized Time Complexity of Shared Objects 共享对象摊销时间复杂度的下限
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-07-12 DOI: 10.1007/s00224-024-10184-w
Hagit Attiya, Arie Fouren, Jeremy Ko
{"title":"Lower Bounds on the Amortized Time Complexity of Shared Objects","authors":"Hagit Attiya, Arie Fouren, Jeremy Ko","doi":"10.1007/s00224-024-10184-w","DOIUrl":"https://doi.org/10.1007/s00224-024-10184-w","url":null,"abstract":"<p>The <i>amortized</i> step complexity of an implementation measures its performance as a whole, rather than the performance of individual operations. Specifically, the amortized step complexity of an implementation is the average number of steps performed by invoked operations, in the worst case, taken over all possible executions. The <i>point contention</i> of an execution, denoted by <span>(dot{c})</span>, measures the maximal number of precesses simultaneously active in the execution. Ruppert (2016) showed that the amortized step complexity of known lock-free implementations for many shared data structures includes an additive factor linear in the point contention <span>(dot{c})</span>. This paper shows that there is no lock-free implementation with <span>(o(min {dot{c}, sqrt{log log n}}))</span> amortized <i>RMR</i> complexity of queues, stacks or heaps from reads, writes, comparison primitives (such as <span>compare &amp;swap</span>) and <span>LL/SC</span>, where <i>n</i> is the total number of the processes in the system. In addition, the paper shows a <span>(Omega (min {dot{c}, log log n}))</span> lower bound on the amortized <i>step</i> complexity for shared linked lists, skip lists, search trees and other pointer-based data structures. These lower bounds mean that the additive factor linear in <span>(dot{c})</span> is inherent for these implementations, provided that the point contention is small compared to the number of processes in the system (i.e. <span>(dot{c}in O(sqrt{log log n}))</span> or <span>(dot{c}in O(log log n))</span>).</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"48 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141608538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster Editing for Multi-Layer and Temporal Graphs 多层和时态图的聚类编辑
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-07-03 DOI: 10.1007/s00224-024-10174-y
Jiehua Chen, Hendrik Molter, Manuel Sorge, Ondřej Suchý
{"title":"Cluster Editing for Multi-Layer and Temporal Graphs","authors":"Jiehua Chen, Hendrik Molter, Manuel Sorge, Ondřej Suchý","doi":"10.1007/s00224-024-10174-y","DOIUrl":"https://doi.org/10.1007/s00224-024-10174-y","url":null,"abstract":"<p>Motivated by the recent rapid growth of research for algorithms to cluster multi-layer and temporal graphs, we study extensions of the classical <span>Cluster Editing</span> problem. In <span>Multi-Layer Cluster Editing</span> we receive a set of graphs on the same vertex set, called <i>layers</i> and aim to transform all layers into cluster graphs (disjoint unions of cliques) that differ only slightly. More specifically, we want to mark at most <i>d</i> vertices and to transform each layer into a cluster graph using at most <i>k</i> edge additions or deletions per layer so that, if we remove the marked vertices, we obtain the same cluster graph in all layers. In <span>Temporal Cluster Editing</span> we receive a <i>sequence</i> of layers and we want to transform each layer into a cluster graph so that consecutive layers differ only slightly. That is, we want to transform each layer into a cluster graph with at most <i>k</i> edge additions or deletions and to mark a distinct set of <i>d</i> vertices in each layer so that each two consecutive layers are the same after removing the vertices marked in the first of the two layers. We study the combinatorial structure of the two problems via their parameterized complexity with respect to the parameters <i>d</i> and <i>k</i>, among others. Despite the similar definition, the two problems behave quite differently: In particular, <span>Multi-Layer Cluster Editing</span> is fixed-parameter tractable with running time <span>(k^{O(k + d)} s^{O(1)})</span> for inputs of size <i>s</i>, whereas <span>Temporal Cluster Editing</span> is <span>(textsf {W[1]})</span>-hard with respect to <i>k</i> even if <span>(d = 3)</span>.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"15 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信