Theoretical Computer Science最新文献

筛选
英文 中文
Greedy algorithm for maximization of semi-monotone non-submodular functions with applications 半单调非次模函数最大化的贪婪算法及其应用
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-29 DOI: 10.1016/j.tcs.2024.114755
{"title":"Greedy algorithm for maximization of semi-monotone non-submodular functions with applications","authors":"","doi":"10.1016/j.tcs.2024.114755","DOIUrl":"10.1016/j.tcs.2024.114755","url":null,"abstract":"<div><p>The problem of maximizing submodular set functions has received increasing attention in recent years, and significant improvements have been made, particularly in relation to objective functions that satisfy monotonic submodularity. However, in practice, the objective function may not be monotonically submodular. While greedy algorithms have strong theoretical guarantees for maximizing submodular functions, their performance is barely guaranteed for non-submodular functions. Therefore, in this paper, we investigate the problem of maximizing non-monotone non-submodular functions under knapsack constraints based on the problem of infectious diseases and provides a more sophisticated analysis through the idea of segmentation. Since our definition characterizes the function more elaborately, a better bound, i.e., a tighter approximation guarantee, is achieved. Finally, we generalize the relevant results for the more general problems.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524003724/pdfft?md5=529fa87d331f2d5c51cd1720e01d6101&pid=1-s2.0-S0304397524003724-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cascade products and Wheeler automata 级联产品和惠勒自动机
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-26 DOI: 10.1016/j.tcs.2024.114754
{"title":"Cascade products and Wheeler automata","authors":"","doi":"10.1016/j.tcs.2024.114754","DOIUrl":"10.1016/j.tcs.2024.114754","url":null,"abstract":"<div><p>The Krohn-Rhodes Decomposition Theorem (KRDT) holds a central position in automata and semigroup theories. It asserts that any finite-state automaton can be broken down into a collection, a <em>cascade</em>, of automata of two simple types (<em>reset</em> and <em>permutation</em>) that, combined, simulate the original automaton.</p><p>In this paper we show how the <em>cascade product</em> operation and the related decomposition are particularly well-suited for the class of <em>Wheeler</em> automata. In these automata, recently introduced in the context of data compression, states are ordered and transitions map state-intervals to state-intervals. First, we prove that Wheeler DFAs are closed under cascade products in an efficient way: the cascade product of two Wheeler automata is still a Wheeler automaton and has always a number of states which is at most the <em>sum</em> (after removing unreachable states) of the number of states of the two input automata, a result that cannot be achieved for general (even counter-free) automata. Second, we prove that each Wheeler automaton can be decomposed into a cascade of a <em>linear</em> number of <em>reset</em> blocks. Crucially, our line of reasoning avoids the necessity of using full KRDT and proves our results directly by an inductive argument.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Euclidean bottleneck matching 动态欧氏瓶颈匹配
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-25 DOI: 10.1016/j.tcs.2024.114727
{"title":"Dynamic Euclidean bottleneck matching","authors":"","doi":"10.1016/j.tcs.2024.114727","DOIUrl":"10.1016/j.tcs.2024.114727","url":null,"abstract":"<div><p>A fundamental question in computational geometry is for a set of input points in the Euclidean space, that is subject to discrete changes (insertion/deletion of points at each time step), whether it is possible to maintain an exact/approximate minimum weight perfect matching and/or bottleneck matching (a perfect matching that minimizes the length of the longest matched edge), in sublinear update time. In this work, we answer this question in the affirmative for points on a real line and for points in the plane with a bounded geometric spread.</p><p>For a set <em>P</em> of <em>n</em> points on a line, we show that there exists a dynamic algorithm that maintains an exact bottleneck matching of <em>P</em> and supports insertion and deletion in <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> time. Moreover, we show that a modified version of this algorithm maintains an exact minimum-weight perfect matching with <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> update (insertion and deletion) time. Next, for a set <em>P</em> of <em>n</em> points in the plane, we show that a (<span><math><mn>6</mn><msqrt><mrow><mn>2</mn></mrow></msqrt></math></span>)-factor approximate bottleneck matching of <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub></math></span>, at each time step <em>k</em>, can be maintained in <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>Δ</mi><mo>)</mo></math></span> amortized time per insertion and <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>Δ</mi><mo>+</mo><mo>|</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>|</mo><mo>)</mo></math></span> amortized time per deletion, where Δ is the geometric spread of <em>P</em> (the ratio between the diameter of <em>P</em> and the distance between the closest pair of points in <em>P</em>).</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kolmogorov complexity and nondeterminism versus determinism for polynomial time computations 多项式时间计算的柯尔莫哥洛夫复杂性和非确定性与确定性比较
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-25 DOI: 10.1016/j.tcs.2024.114747
{"title":"Kolmogorov complexity and nondeterminism versus determinism for polynomial time computations","authors":"","doi":"10.1016/j.tcs.2024.114747","DOIUrl":"10.1016/j.tcs.2024.114747","url":null,"abstract":"<div><p>We call any consistent and sufficiently powerful formal theory that enables to algorithmically verify whether a text is a proof <strong>algorithmically verifiable mathematics</strong> (av-mathematics). We study the fundamental question whether nondeterminism is more powerful than determinism for polynomial time computations in the framework of av-mathematics.</p><p>Our goal is to show strong indications that nondeterminism is more powerful than determinism for polynomial time computations. To do that, we do not consider decision problems only, but also compression algorithms. We show that at least one of the following three claims must be true:</p><ul><li><span>(i)</span><span><p><figure><img></figure></p></span></li><li><span>(ii)</span><span><p>non-determinism is more powerful than determinism for polynomial-time compression</p></span></li><li><span>(iii)</span><span><p>for each polynomial-time compression algorithm there exists another one of the same asymptotic time complexity that compresses infinitely many strings logarithmically stronger</p></span></li></ul><p>Another surprising consequence of P = NP would be that time-bounded Kolmogorov complexity for any polynomial bound can be computed by deterministic algorithms in polynomial time.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524003645/pdfft?md5=cc80c7c87843aa9d2e4febe406dc48b5&pid=1-s2.0-S0304397524003645-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141853997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On one-sided testing affine subspaces 关于单边测试仿射子空间
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-25 DOI: 10.1016/j.tcs.2024.114745
{"title":"On one-sided testing affine subspaces","authors":"","doi":"10.1016/j.tcs.2024.114745","DOIUrl":"10.1016/j.tcs.2024.114745","url":null,"abstract":"<div><p>We study the query complexity of one-sided <em>ϵ</em>-testing the class of Boolean functions <span><math><mi>f</mi><mo>:</mo><msup><mrow><mi>F</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>→</mo><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span> that describe affine subspaces and Boolean functions that describe axis-parallel affine subspaces, where <span><math><mi>F</mi></math></span> is any finite field. We give polynomial-time <em>ϵ</em>-testers that ask <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mn>1</mn><mo>/</mo><mi>ϵ</mi><mo>)</mo></math></span> queries. This improves the query complexity <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mo>|</mo><mi>F</mi><mo>|</mo><mo>/</mo><mi>ϵ</mi><mo>)</mo></math></span> in <span><span>[14]</span></span>. The almost optimality of the algorithms follows from the lower bound of <span><math><mi>Ω</mi><mo>(</mo><mn>1</mn><mo>/</mo><mi>ϵ</mi><mo>)</mo></math></span> for the query complexity proved by Bshouty and Goldreich <span><span>[3]</span></span>.</p><p>We then show that any one-sided <em>ϵ</em>-tester with proximity parameter <span><math><mi>ϵ</mi><mo>&lt;</mo><mn>1</mn><mo>/</mo><mo>|</mo><mi>F</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>d</mi></mrow></msup></math></span> for the class of Boolean functions that describe <span><math><mo>(</mo><mi>n</mi><mo>−</mo><mi>d</mi><mo>)</mo></math></span>-dimensional affine subspaces and Boolean functions that describe axis-parallel <span><math><mo>(</mo><mi>n</mi><mo>−</mo><mi>d</mi><mo>)</mo></math></span>-dimensional affine subspaces must make at least <span><math><mi>Ω</mi><mo>(</mo><mn>1</mn><mo>/</mo><mi>ϵ</mi><mo>+</mo><mo>|</mo><mi>F</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>d</mi><mo>−</mo><mn>1</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> and <span><math><mi>Ω</mi><mo>(</mo><mn>1</mn><mo>/</mo><mi>ϵ</mi><mo>+</mo><mo>|</mo><mi>F</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>d</mi><mo>−</mo><mn>1</mn></mrow></msup><mi>n</mi><mo>)</mo></math></span> queries, respectively. This improves the lower bound <span><math><mi>Ω</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> that is proved in <span><span>[14]</span></span> for <span><math><mi>F</mi><mo>=</mo><mrow><mi>GF</mi></mrow><mo>(</mo><mn>2</mn><mo>)</mo></math></span>. We also give testers for those classes with query complexity that almost match the lower bounds.<span><span><sup>1</sup></span></span></p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource efficient stabilization for local tasks despite unknown capacity links 在未知容量链路的情况下,为本地任务提供资源效率高的稳定性
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-25 DOI: 10.1016/j.tcs.2024.114744
{"title":"Resource efficient stabilization for local tasks despite unknown capacity links","authors":"","doi":"10.1016/j.tcs.2024.114744","DOIUrl":"10.1016/j.tcs.2024.114744","url":null,"abstract":"<div><p>Self-stabilizing protocols enable distributed systems to recover correct behavior starting from any arbitrary configuration. In particular, when processors communicate by message passing and the communication links are unbounded, fake messages may be placed in communication links by an adversary. When the number of such fake messages is unknown, self-stabilization may require huge resources:</p><ul><li><span>•</span><span><p>generic solutions (<em>a.k.a.</em> data link protocols) require unbounded resources, which makes them unrealistic to deploy,</p></span></li><li><span>•</span><span><p>specific solutions (<em>e.g.</em>, census or tree construction) require <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> or <span><math><mi>O</mi><mo>(</mo><mi>Δ</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> bits of memory per node, where <em>n</em> denotes the network size and Δ its maximum degree, which may prevent scalability.</p></span></li></ul><p>We investigate the possibility of resource-efficient self-stabilizing protocols in this context.</p><p>Specifically, we present self-stabilizing protocols for <span><math><mo>(</mo><mi>Δ</mi><mo>+</mo><mn>1</mn><mo>)</mo></math></span>-coloring and maximal independent set construction in any <em>n</em>-node graph, under the asynchronous message-passing model. The problems of <span><math><mo>(</mo><mi>Δ</mi><mo>+</mo><mn>1</mn><mo>)</mo></math></span>-coloring and maximal independent set construction are widely regarded as benchmark problems for evaluating local algorithms. Our protocols offer many desirable features. They are deterministic, converge in <span><math><mi>O</mi><mo>(</mo><mi>k</mi><mi>Δ</mi><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> message exchanges, where <em>k</em> is the (unknown) initial number of (possibly corrupted) messages in a communication link. They use messages of <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>+</mo><mi>log</mi><mo>⁡</mo><mi>Δ</mi><mo>)</mo></math></span> bits with a memory of <span><math><mi>O</mi><mo>(</mo><mi>Δ</mi><mi>log</mi><mo>⁡</mo><mi>Δ</mi><mo>+</mo><mi>log</mi><mo>⁡</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> bits at each node. The resource consumption of our protocols is thus almost oblivious to the number of nodes, enabling scalability. Moreover, a striking property of our protocols is that the nodes do not need to know the number, or any bound on the number of messages initially present in each communication link of the initial (potentially corrupted) network configuration. This permits our protocols to handle any future network with unknown message capacity communication links.</p><p>A key building block of our coloring and maximal independent set schemes is an algorithm to obtain an acyclic orientation of graph edges, that is of independent interest, and","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141842367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chess is hard even for a single player 单人下棋也很难
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-23 DOI: 10.1016/j.tcs.2024.114726
{"title":"Chess is hard even for a single player","authors":"","doi":"10.1016/j.tcs.2024.114726","DOIUrl":"10.1016/j.tcs.2024.114726","url":null,"abstract":"<div><p>We introduce a generalization of “Solo Chess”, a single-player variant of the game that can be played on chess.com. The standard version of the game is played on a regular 8 × 8 chessboard by a single player, with only white pieces, using the following rules: every move must capture a piece, no piece may capture more than 2 times, and if there is a King on the board, it must be the final piece. The goal is to clear the board, i.e., make a sequence of captures after which only one piece is left.</p><p>We generalize this game to unbounded boards with <em>n</em> pieces, each of which have a given number of captures that they are permitted to make. We show that <span>Generalized Solo Chess</span> is <span>NP</span>-complete, even when it is played by only rooks that have at most two captures remaining. It also turns out to be <span>NP</span>-complete even when every piece is a queen with exactly two captures remaining in the initial configuration. In contrast, we show that solvable instances of <span>Generalized Solo Chess</span> can be completely characterized when the game is: a) played by rooks on a one-dimensional board, and b) played by pawns with two captures left on a 2D board.</p><p>Inspired by <span>Generalized Solo Chess</span>, we also introduce the <span>Graph Capture Game</span>, which involves clearing a graph of tokens via captures along edges. This game subsumes <span>Generalized Solo Chess</span> played by knights. We show that the <span>Graph Capture Game</span> is <span>NP</span>-complete for undirected graphs and DAGs.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141984656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Büchi automata 量子布奇自动机
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-22 DOI: 10.1016/j.tcs.2024.114740
{"title":"Quantum Büchi automata","authors":"","doi":"10.1016/j.tcs.2024.114740","DOIUrl":"10.1016/j.tcs.2024.114740","url":null,"abstract":"<div><p>Quantum finite automata (QFAs) have been extensively studied in the literature. In this paper, we define and systematically study quantum Büchi automata (QBAs) over infinite words to model the long-term behavior of quantum systems, which extend QFAs. We introduce the classes of <em>ω</em>-languages recognized by QBAs in probable, almost sure, strict and non-strict threshold semantics. Several pumping lemmas and closure properties for QBAs are proved. Some decision problems for QBAs are investigated. In particular, we show that there are surprisingly only at most four substantially different classes of <em>ω</em>-languages recognized by QBAs (out of uncountably infinite). The relationship between classical <em>ω</em>-languages and QBAs is clarified using our pumping lemmas. We also find an <em>ω</em>-language recognized by QBAs under the almost sure semantics, which is not <em>ω</em>-context-free.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141950068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating power node-deletion problems 近似电源节点删除问题
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-17 DOI: 10.1016/j.tcs.2024.114733
{"title":"Approximating power node-deletion problems","authors":"","doi":"10.1016/j.tcs.2024.114733","DOIUrl":"10.1016/j.tcs.2024.114733","url":null,"abstract":"<div><p>In the <span>Power Vertex Cover</span> <em>(PVC)</em> problem introduced in <span><span>[1]</span></span> as a generalization of the well-known <span>Vertex Cover</span>, we are allowed to specify costs for covering edges in a graph individually. Namely, two (nonnegative) weights, <span><math><mi>w</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo><mtext> and </mtext><mi>w</mi><mo>(</mo><mi>v</mi><mo>,</mo><mi>u</mi><mo>)</mo></math></span>, are associated with each edge <span><math><mo>{</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>}</mo><mo>∈</mo><mi>E</mi></math></span> of an input graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span>, and to cover an edge <span><math><mo>{</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>}</mo></math></span>, it is required to assign “power” <span><math><mi>p</mi><mo>∈</mo><msubsup><mrow><mi>R</mi></mrow><mrow><mo>+</mo></mrow><mrow><mi>V</mi></mrow></msubsup></math></span> on vertices of <em>G</em> such that either <span><math><mi>p</mi><mo>(</mo><mi>u</mi><mo>)</mo><mo>≥</mo><mi>w</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> or <span><math><mi>p</mi><mo>(</mo><mi>v</mi><mo>)</mo><mo>≥</mo><mi>w</mi><mo>(</mo><mi>v</mi><mo>,</mo><mi>u</mi><mo>)</mo></math></span>. The objective is to minimize the total power assigned on <em>V</em>, <span><math><msub><mrow><mo>∑</mo></mrow><mrow><mi>v</mi><mo>∈</mo><mi>V</mi></mrow></msub><mi>p</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span>, while covering all the edges of <em>G</em> by <em>p</em>.</p><p>The <em>node-deletion</em> problem for a graph property <em>π</em> is the problem of computing a minimum vertex subset <span><math><mi>C</mi><mo>⊆</mo><mi>V</mi></math></span> in a given graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span>, such that the graph satisfies <em>π</em> when all the vertices in <em>C</em> are removed from <em>G</em>. In this paper we consider node-deletion problems extended with the “covering-by-power” condition as in PVC, and present a unified approach for effectively approximating them. The node-deletion problems considered are <span>Partial Vertex Cover (PartVC)</span>, <span>Bounded Degree Deletion (BDD)</span>, and <span>Feedback Vertex Set (FVS)</span>, each corresponding to graph properties <em>π</em>= “the graph has at most <span><math><mo>|</mo><mi>E</mi><mo>|</mo><mo>−</mo><mi>k</mi></math></span> edges”, <em>π</em>= “vertex degree of <em>v</em> is no larger than <span><math><mi>b</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span>”, and <em>π</em>= “the graph is acyclic”, respectively. After reducing these problems to the <span>Submodular Set Cover</span> (SSC) problem, we conduct an extended analysis of the approximability of these problems in the new setting of power covering by applying some of the existing techniques for approximating SSC. It will be shown that 1) PPartVC can be approximated within a factor of 2, 2) PBD","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141841678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision algorithms for reversibility of 1D cellular automata under reflective boundary conditions 反射边界条件下一维蜂窝自动机可逆性的决策算法
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-07-15 DOI: 10.1016/j.tcs.2024.114732
{"title":"Decision algorithms for reversibility of 1D cellular automata under reflective boundary conditions","authors":"","doi":"10.1016/j.tcs.2024.114732","DOIUrl":"10.1016/j.tcs.2024.114732","url":null,"abstract":"<div><p>Reversibility is one of the most significant properties of cellular automata (CA). In this paper, we focus on the reversibility of one-dimensional finite CA under reflective boundary conditions (RBC). We present two algorithms for deciding the reversibility of one-dimensional CA under RBC. Both algorithms work for not only linear rules but also non-linear rules. The first algorithm is to determine what we call the “strict reversibility” of CA. The second algorithm is to compute what we call the “reversibility function” of CA. Reversibility functions are proved to be periodic. Based on the algorithms, we list some experiment results of one-dimensional CA under RBC and analyse some features of this family of CA.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141716721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信