Theory of Computing Systems最新文献

筛选
英文 中文
Characterization of Ordered Semigroups Generating Well Quasi-Orders of Words 有序半群的特征,产生良好的词准有序半群
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-04-11 DOI: 10.1007/s00224-024-10172-0
Ondřej Klíma, Jonatan Kolegar
{"title":"Characterization of Ordered Semigroups Generating Well Quasi-Orders of Words","authors":"Ondřej Klíma, Jonatan Kolegar","doi":"10.1007/s00224-024-10172-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10172-0","url":null,"abstract":"<p>The notion of a quasi-order generated by a homomorphism from the semigroup of all words onto a finite ordered semigroup was introduced by Bucher et al. (Theor. Comput. Sci. <b>40</b>, 131–148 1985). It naturally occurred in their studies of derivation relations associated with a given set of context-free rules, and they asked a crucial question, whether the resulting relation is a well quasi-order. We answer this question in the case of the quasi-order generated by a semigroup homomorphism. We show that the answer does not depend on the homomorphism, but it is a property of its image. Moreover, we give an algebraic characterization of those finite semigroups for which we get well quasi-orders. This characterization completes the structural characterization given by Kunc (Theor. Comput. Sci. <b>348</b>, 277–293 2005) in the case of semigroups ordered by equality. Compared with Kunc’s characterization, the new one has no structural meaning, and we explain why that is so. In addition, we prove that the new condition is testable in polynomial time.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Hide a Clique? 如何隐藏小团体?
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-04-05 DOI: 10.1007/s00224-024-10167-x
Uriel Feige, Vadim Grinberg
{"title":"How to Hide a Clique?","authors":"Uriel Feige, Vadim Grinberg","doi":"10.1007/s00224-024-10167-x","DOIUrl":"https://doi.org/10.1007/s00224-024-10167-x","url":null,"abstract":"<p>In the well known planted clique problem, a clique (or alternatively, an independent set) of size <i>k</i> is planted at random in an Erdos-Renyi random <i>G</i>(<i>n</i>, <i>p</i>) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size <span>(k = sqrt{n})</span> planted in a random <span>(G(n, frac{1}{2}))</span> graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size <span>(k=frac{n}{2})</span> in a <i>G</i>(<i>n</i>, <i>p</i>) graph with <span>(p = n^{-frac{1}{2}})</span>, there is no polynomial time algorithm that finds an independent set of size <i>k</i>, unless NP has randomized polynomial time algorithms.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the Distortion of Distributed Voting 重新审视分散投票的扭曲现象
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-04-05 DOI: 10.1007/s00224-024-10171-1
Aris Filos-Ratsikas, Alexandros A. Voudouris
{"title":"Revisiting the Distortion of Distributed Voting","authors":"Aris Filos-Ratsikas, Alexandros A. Voudouris","doi":"10.1007/s00224-024-10171-1","DOIUrl":"https://doi.org/10.1007/s00224-024-10171-1","url":null,"abstract":"<p>We consider a setting with agents that have preferences over alternatives and are partitioned into disjoint districts. The goal is to choose one alternative as the winner using a mechanism which first decides a representative alternative for each district based on a local election with the agents therein as participants, and then chooses one of the district representatives as the winner. Previous work showed bounds on the distortion of a specific class of deterministic plurality-based mechanisms depending on the available information about the preferences of the agents in the districts. In this paper, we first consider the whole class of deterministic mechanisms and show asymptotically tight bounds on their distortion. We then initiate the study of the distortion of randomized mechanisms in distributed voting and show bounds based on several informational assumptions, which in many cases turn out to be tight. Finally, we also experimentally compare the distortion of many different mechanisms of interest using synthetic and real-world data.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pumping Lemmas Can be “Harmful” 抽水马桶可能 "有害"
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-04-05 DOI: 10.1007/s00224-024-10169-9
Jingnan Xie, Harry B. Hunt III, Richard E. Stearns
{"title":"Pumping Lemmas Can be “Harmful”","authors":"Jingnan Xie, Harry B. Hunt III, Richard E. Stearns","doi":"10.1007/s00224-024-10169-9","DOIUrl":"https://doi.org/10.1007/s00224-024-10169-9","url":null,"abstract":"<p>A pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> is often used to show particular languages are not in <span>(varvec{mathcal {C}})</span>. In contrast, we show that a pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> can be used to study the computational complexity of the predicate “<span>(in varvec{mathcal {C}})</span>” via highly efficient many-one reductions. In this paper, we use extended regular expressions (EXREGs, introduced in Câmpeanu et al. (Int. J. Foundations Comput. Sci. <b>14</b>(6), 1007–1018, 2003)) as an example to illustrate the proof technique and establish the complexity of the predicate “is an EXREG language” for several classes of languages. Due to the efficiency of the reductions, both productiveness (a stronger form of non-recursive enumerability) and complexity results can be obtained simultaneously. For example, we show that the predicate “is an EXREG language” is productive (hence, not recursively enumerable) for context-free grammars, and is Co-NEXPTIME-hard for context-free grammars generating bounded languages. The proof technique is easy to use and requires only a few conditions. This suggests that for any class of languages <span>(varvec{mathcal {C}})</span> having a pumping lemma, the language class comparison problems (e.g., does a given context-free grammar generate a language in <span>(varvec{mathcal {C}})</span>?) are almost guaranteed to be hard. So, pumping lemmas sometimes could be “harmful” when studying computational complexity results.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Placing Green Bridges Optimally, with a Multivariate Analysis 通过多变量分析优化绿色桥梁的布局
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-04-01 DOI: 10.1007/s00224-023-10157-5
Till Fluschnik, Leon Kellerhals
{"title":"Placing Green Bridges Optimally, with a Multivariate Analysis","authors":"Till Fluschnik, Leon Kellerhals","doi":"10.1007/s00224-023-10157-5","DOIUrl":"https://doi.org/10.1007/s00224-023-10157-5","url":null,"abstract":"<p>We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of building green bridges, to find a low-cost placement of green bridges that connects the habitats. We develop three problem models for this task and study them from a computational complexity and parameterized algorithmics perspective.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNF Encodings of Symmetric Functions 对称函数的 CNF 编码
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-26 DOI: 10.1007/s00224-024-10168-w
{"title":"CNF Encodings of Symmetric Functions","authors":"","doi":"10.1007/s00224-024-10168-w","DOIUrl":"https://doi.org/10.1007/s00224-024-10168-w","url":null,"abstract":"<h3>Abstract</h3> <p>Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF computing the parity function <span> <span>(x_1oplus x_2 oplus cdots oplus x_n)</span> </span> is <span> <span>(2^{n-1})</span> </span>, one can use <span> <span>(n-1)</span> </span> nondeterministic variables to get a CNF encoding with 4<em>n</em> clauses. In this paper, we prove tradeoffs between various parameters (the number of clauses, the width of clauses, and the number of nondeterministic variables) of CNF encodings of various symmetric functions. In particular, we show that a folklore way of encoding parity as CNF is provably optimal. We do this by using a tight connection between CNF encodings and depth-3 circuits. This connection shows that CNF encodings is an interesting computational model for Boolean functions: on the one hand, it is routinely used in practice when translating a computational problem to a format acceptable by a SAT solver, on the other hand, lower bounds on the size of CNF encodings imply depth-3 circuit lower bounds.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation Algorithms for the MAXSPACE Advertisement Problem MAXSPACE 广告问题的近似算法
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-25 DOI: 10.1007/s00224-024-10170-2
Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery
{"title":"Approximation Algorithms for the MAXSPACE Advertisement Problem","authors":"Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery","doi":"10.1007/s00224-024-10170-2","DOIUrl":"https://doi.org/10.1007/s00224-024-10170-2","url":null,"abstract":"<p>In MAXSPACE, given a set of ads <span>(mathcal {A})</span>, one wants to schedule a subset <span>({mathcal {A}'subseteq mathcal {A}})</span> into <i>K</i> slots <span>({B_1, dots , B_K})</span> of size <i>L</i>. Each ad <span>({A_i in mathcal {A}})</span> has a <i>size</i> <span>(s_i)</span> and a <i>frequency</i> <span>(w_i)</span>. A schedule is feasible if the total size of ads in any slot is at most <i>L</i>, and each ad <span>({A_i in mathcal {A}'})</span> appears in exactly <span>(w_i)</span> slots and at most once per slot. The goal is to find a feasible schedule that maximizes the sum of the space occupied by all slots. We consider a generalization called MAXSPACE-R for which an ad <span>(A_i)</span> also has a release date <span>(r_i)</span> and may only appear in a slot <span>(B_j)</span> if <span>({j ge r_i})</span>. For this variant, we give a 1/9-approximation algorithm. Furthermore, we consider MAXSPACE-RDV for which an ad <span>(A_i)</span> also has a deadline <span>(d_i)</span> (and may only appear in a slot <span>(B_j)</span> with <span>(r_i le j le d_i)</span>), and a value <span>(v_i)</span> that is the gain of each assigned copy of <span>(A_i)</span> (which can be unrelated to <span>(s_i)</span>). We present a polynomial-time approximation scheme for this problem when <i>K</i> is bounded by a constant. This is the best factor one can expect since MAXSPACE is strongly NP-hard, even if <span>(K = 2)</span>.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imperative Process Algebra and Models of Parallel Computation 强制过程代数和并行计算模型
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-14 DOI: 10.1007/s00224-024-10164-0
Cornelis A. Middelburg
{"title":"Imperative Process Algebra and Models of Parallel Computation","authors":"Cornelis A. Middelburg","doi":"10.1007/s00224-024-10164-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10164-0","url":null,"abstract":"<p>Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are computational processes. Processes of this kind can be described using an imperative process algebra based on ACP (Algebra of Communicating Processes). In this paper, it is investigated whether the imperative process algebra concerned can play a role in the field of models of computation. It is demonstrated that the process algebra is suitable to describe in a mathematically precise way models of computation corresponding to existing models based on sequential, asynchronous parallel, and synchronous parallel random access machines as well as time and work complexity measures for those models.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performing Regular Operations with 1-Limited Automata 用 1 限自动机执行正则运算
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-14 DOI: 10.1007/s00224-024-10163-1
Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský
{"title":"Performing Regular Operations with 1-Limited Automata","authors":"Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský","doi":"10.1007/s00224-024-10163-1","DOIUrl":"https://doi.org/10.1007/s00224-024-10163-1","url":null,"abstract":"<p>The descriptional complexity of basic operations on regular languages using 1-limited automata, a restricted version of one-tape Turing machines, is investigated. When simulating operations on deterministic finite automata with deterministic 1-limited automata, the sizes of the resulting devices are polynomial in the sizes of the simulated machines. The situation is different when the operations are applied to deterministic 1-limited automata: while for boolean operations the simulations remain polynomial, for product, star, and reversal they cost exponential in size. The costs for product and star do not reduce if the given machines are sweeping two-way deterministic finite automata. These bounds are tight.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance 利用同质距离校正重复突发的线性编码
IF 0.5 4区 计算机科学
Theory of Computing Systems Pub Date : 2024-03-06 DOI: 10.1007/s00224-024-10166-y
{"title":"Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance","authors":"","doi":"10.1007/s00224-024-10166-y","DOIUrl":"https://doi.org/10.1007/s00224-024-10166-y","url":null,"abstract":"<h3>Abstract</h3> <p>The homogeneous weight (metric) is useful in the construction of codes over a ring of integers <span> <span>(mathbb {Z}_{p^l})</span> </span> (<em>p</em> prime and <span> <span>(l ge 1)</span> </span> an integer). It becomes Hamming weight when the ring is taken to be a finite field and becomes Lee weight when the ring is taken to be <span> <span>(mathbb {Z}_{4})</span> </span>. This paper presents homogeneous weight distribution and total homogeneous weight of burst and repeated burst errors in the code space of <em>n</em>-tuples over <span> <span>(mathbb {Z}_{p^l})</span> </span>. Necessary and sufficient conditions for existence of an (<em>n</em>, <em>k</em>) linear code over <span> <span>(mathbb {Z}_{p^l})</span> </span> correcting the error patterns with respect to the homogeneous weight are derived.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信