Theoretical Computer Science最新文献

筛选
英文 中文
The min-move mutual visibility problem for disoriented asynchronous robots
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-18 DOI: 10.1016/j.tcs.2025.115125
Subhash Bhagat , Krishnendu Mukhopadhyaya , Rajarshi Ray
{"title":"The min-move mutual visibility problem for disoriented asynchronous robots","authors":"Subhash Bhagat ,&nbsp;Krishnendu Mukhopadhyaya ,&nbsp;Rajarshi Ray","doi":"10.1016/j.tcs.2025.115125","DOIUrl":"10.1016/j.tcs.2025.115125","url":null,"abstract":"<div><div>We consider a distributed system of <span><math><mi>n</mi><mo>≥</mo><mn>3</mn></math></span> autonomous robots in the Euclidean plane under the <em>obstructed visibility model</em>. In the <em>obstructed visibility model</em>, robots are considered opaque, and if three robots lie on a straight line, the mid- dle robot blocks the vision of the two other robots. The <em>mutual visibility problem</em> requires the robots to coordinate their movements in such a way that all the robots in the system become mutually visible. This paper studies a constrained version of the mutual visibility problem, namely the <em>min-move mutual visibility problem</em>. The min-move mutual visibility problem asks to solve the mutual visibility problem by moving each robot at most once. One of the major implications of this constrained version of the mutual visibility problem is that it also addresses the issue of energy efficiency for the robots. We study the min-move mutual visibility problem for disoriented robots (i.e., robots not having any form of local axis agreement or common chirality). We study the problem under two of the strongest adversarial models, namely asynchronous scheduler and non- rigid movements. We first show that the min-move mutual visibility problem is not solvable for disoriented asynchronous robots with non-rigid movements in the absence of externally visible lights. Then, we analyze different characteristics of a min-move mutual visibility algorithm for disoriented robots with non-rigid movements. We use these properties to present a distributed algorithm that solves the problem for disoriented asynchronous robots with non-rigid movements and having externally visible lights (FALL light model). The algorithm uses only 7 colors for the lights. The proposed algorithm is collision-free and runs in <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> epochs.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1035 ","pages":"Article 115125"},"PeriodicalIF":0.9,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143478539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
For rational numbers with Suppes-Ono division, equational validity is one-one equivalent with Diophantine unsolvability
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-17 DOI: 10.1016/j.tcs.2025.115124
Jan A. Bergstra , John V. Tucker
{"title":"For rational numbers with Suppes-Ono division, equational validity is one-one equivalent with Diophantine unsolvability","authors":"Jan A. Bergstra ,&nbsp;John V. Tucker","doi":"10.1016/j.tcs.2025.115124","DOIUrl":"10.1016/j.tcs.2025.115124","url":null,"abstract":"<div><div>Adding division to rings and fields leads to the question of how to deal with division by 0. From a plurality of options, we discuss in detail what we call <em>Suppes-Ono division</em> in which division by 0 produces 0. We explain the backstory of this semantic option and its associated notion of equality, and prove a result regarding the logical complexity of deciding equations over the rational numbers equipped with Suppes-Ono division. We prove that deciding the validity of the equations is computationally equivalent to the Diophantine Problem for the rational numbers, which is a longstanding open problem.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1034 ","pages":"Article 115124"},"PeriodicalIF":0.9,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143429029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast and simple (1 + ε)Δ-edge-coloring of dense graphs
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-17 DOI: 10.1016/j.tcs.2025.115126
Abhishek Dhawan
{"title":"Fast and simple (1 + ε)Δ-edge-coloring of dense graphs","authors":"Abhishek Dhawan","doi":"10.1016/j.tcs.2025.115126","DOIUrl":"10.1016/j.tcs.2025.115126","url":null,"abstract":"<div><div>Let <span><math><mi>ε</mi><mo>∈</mo><mo>(</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span> and <span><math><mi>n</mi><mo>,</mo><mi>Δ</mi><mo>∈</mo><mi>N</mi></math></span> be such that <span><math><mi>Δ</mi><mo>=</mo><mi>Ω</mi><mrow><mo>(</mo><mi>max</mi><mo>⁡</mo><mrow><mo>{</mo><mfrac><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow><mrow><mi>ε</mi></mrow></mfrac><mo>,</mo><mspace></mspace><msup><mrow><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>ε</mi></mrow></mfrac><mi>log</mi><mo>⁡</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>ε</mi></mrow></mfrac><mo>)</mo></mrow><mrow><mn>2</mn></mrow></msup><mo>}</mo></mrow><mo>)</mo></mrow></math></span>. Given an <em>n</em>-vertex <em>m</em>-edge simple graph <em>G</em> of maximum degree Δ, we present a randomized <span><math><mi>O</mi><mrow><mo>(</mo><mi>m</mi><mspace></mspace><msup><mrow><mi>log</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>⁡</mo><mi>Δ</mi><mspace></mspace><mo>/</mo><mspace></mspace><msup><mrow><mi>ε</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></math></span>-time algorithm that computes a proper <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mi>ε</mi><mo>)</mo><mi>Δ</mi></math></span>-edge-coloring of <em>G</em> with high probability. This improves upon the best known results for a wide range of the parameters <em>ε</em>, <em>n</em>, and Δ. Our approach combines a <em>flagging</em> strategy from earlier work of the author with a <em>shifting</em> procedure employed by Duan, He, and Zhang for dynamic edge-coloring. The resulting algorithm is simple to implement and may be of practical interest.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1034 ","pages":"Article 115126"},"PeriodicalIF":0.9,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143429028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network control games played on graphs
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-13 DOI: 10.1016/j.tcs.2025.115123
Zihui Liang, Bakh Khoussainov, Mingyu Xiao
{"title":"Network control games played on graphs","authors":"Zihui Liang,&nbsp;Bakh Khoussainov,&nbsp;Mingyu Xiao","doi":"10.1016/j.tcs.2025.115123","DOIUrl":"10.1016/j.tcs.2025.115123","url":null,"abstract":"<div><div>We study network-control games played on graphs. These games belong to the class of scoring games in combinatorial game theory. In a network-control game, two players alternate in rounds on a given graph. During each round, a player selects an unclaimed vertex with its unclaimed neighbours within the distance <em>t</em>. The objective is to decide which player can claim more vertices at the end of the play. We study network-control games on various classes of graphs, including paths, linear forests, and hub-and-spoke graphs. Additionally, we examine greedy, symmetric, and optimal strategies. In the context of scoring games, concepts and techniques developed in this paper contribute to the further understanding and development of combinatorial game theory.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1034 ","pages":"Article 115123"},"PeriodicalIF":0.9,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143429225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A note on quantum divide and conquer for minimal string rotation
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-12 DOI: 10.1016/j.tcs.2025.115120
Qisheng Wang
{"title":"A note on quantum divide and conquer for minimal string rotation","authors":"Qisheng Wang","doi":"10.1016/j.tcs.2025.115120","DOIUrl":"10.1016/j.tcs.2025.115120","url":null,"abstract":"<div><div>Lexicographically minimal string rotation is a fundamental problem in string processing that has recently garnered significant attention in quantum computing. Near-optimal quantum algorithms have been proposed for solving this problem, utilizing a divide-and-conquer structure. In this note, we show that its quantum query complexity is <span><math><msqrt><mrow><mi>n</mi></mrow></msqrt><mo>⋅</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msqrt><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow></msqrt><mo>)</mo></mrow></msup></math></span>, improving the prior result of <span><math><msqrt><mrow><mi>n</mi></mrow></msqrt><mo>⋅</mo><msup><mrow><mn>2</mn></mrow><mrow><msup><mrow><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>1</mn><mo>/</mo><mn>2</mn><mo>+</mo><mi>ε</mi></mrow></msup></mrow></msup></math></span> by Akmal and Jin (2022). Notably, this improvement is quasi-polylogarithmic, which is achieved by only logarithmic level-wise optimization using fault-tolerant quantum minimum finding.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1034 ","pages":"Article 115120"},"PeriodicalIF":0.9,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143445616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lower bounds for graph reconstruction with maximal independent set queries
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-11 DOI: 10.1016/j.tcs.2025.115121
Lukas Michel, Alex Scott
{"title":"Lower bounds for graph reconstruction with maximal independent set queries","authors":"Lukas Michel,&nbsp;Alex Scott","doi":"10.1016/j.tcs.2025.115121","DOIUrl":"10.1016/j.tcs.2025.115121","url":null,"abstract":"<div><div>We investigate the number of maximal independent set queries required to reconstruct the edges of a hidden graph. We show that randomised adaptive algorithms need at least <span><math><mi>Ω</mi><mo>(</mo><msup><mrow><mi>Δ</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mo>(</mo><mi>n</mi><mo>/</mo><mi>Δ</mi><mo>)</mo><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>Δ</mi><mo>)</mo></math></span> queries to reconstruct <em>n</em>-vertex graphs of maximum degree Δ with success probability at least 1/2, and we further improve this lower bound to <span><math><mi>Ω</mi><mo>(</mo><msup><mrow><mi>Δ</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mo>(</mo><mi>n</mi><mo>/</mo><mi>Δ</mi><mo>)</mo><mo>)</mo></math></span> for randomised non-adaptive algorithms. We also prove that deterministic non-adaptive algorithms require at least <span><math><mi>Ω</mi><mo>(</mo><msup><mrow><mi>Δ</mi></mrow><mrow><mn>3</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>Δ</mi><mo>)</mo></math></span> queries.</div><div>This improves bounds of Konrad, O'Sullivan, and Traistaru, and answers one of their questions. The proof of the lower bound for deterministic non-adaptive algorithms relies on a connection to cover-free families, for which we also improve known bounds.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1034 ","pages":"Article 115121"},"PeriodicalIF":0.9,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143394935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shell sort with expected complexity of O(nlog2n) 壳排序的预期复杂度为 O(nlog2n)
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-11 DOI: 10.1016/j.tcs.2025.115122
Shengrong Hu
{"title":"Shell sort with expected complexity of O(nlog2n)","authors":"Shengrong Hu","doi":"10.1016/j.tcs.2025.115122","DOIUrl":"10.1016/j.tcs.2025.115122","url":null,"abstract":"<div><div>Theoretical analysis of the Shell sort algorithm has been a longstanding challenge, and there have been no reports of a Shell sort algorithm with a complexity of O(<em>n</em>log<sub>2</sub><em>n</em>). This study investigated the efficiency of the Shell sort algorithm using a specific increment sequence and conducted stability fitting. The fitting results strongly suggest that the number of key comparisons and movements follows the form c<em>n</em>ln(<em>n</em>)+d<em>n</em><sup>λ</sup>ln(<em>n</em>), where λ&lt;1, implying an overall complexity of O(<em>n</em>log<sub>2</sub><em>n</em>).</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1034 ","pages":"Article 115122"},"PeriodicalIF":0.9,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143429226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unpaired set-to-set disjoint path routings in recursive match networks
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-10 DOI: 10.1016/j.tcs.2025.115111
Bai Yin , Qianru Zhou , Hai Liu , Yan Wang , Baolei Cheng , Jianxi Fan
{"title":"Unpaired set-to-set disjoint path routings in recursive match networks","authors":"Bai Yin ,&nbsp;Qianru Zhou ,&nbsp;Hai Liu ,&nbsp;Yan Wang ,&nbsp;Baolei Cheng ,&nbsp;Jianxi Fan","doi":"10.1016/j.tcs.2025.115111","DOIUrl":"10.1016/j.tcs.2025.115111","url":null,"abstract":"&lt;div&gt;&lt;div&gt;The recursive match networks represent a family of networks, encompassing various types of network structures. Among these network structures, the bijective connection networks and BCube are all special cases of recursive match networks. On the other hand, the bijective connection networks also stand for a family of networks, encompassing well-known hypercubes, twisted cubes, Möbius cubes, and crossed cubes. The BCube, a promising candidate for the data center network model, contains as many as thousands (even millions) of servers. Recursive match networks integrate diverse known networks as well as potentially other future ones, underscoring the significance of exploring their study. One of the key topics is finding vertex-disjoint paths in recursive match networks. An unpaired set-to-set disjoint paths problem is as follows: given a set of source vertices &lt;span&gt;&lt;math&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;s&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;s&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;s&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;p&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; and a set of sink vertices &lt;span&gt;&lt;math&gt;&lt;mi&gt;T&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;t&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;t&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;t&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; in an &lt;em&gt;r&lt;/em&gt;-connected graph &lt;span&gt;&lt;math&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;E&lt;/mi&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; with &lt;span&gt;&lt;math&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;mi&gt;p&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;, construct &lt;em&gt;m&lt;/em&gt; vertex-disjoint paths &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;P&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; from source &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;s&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;a&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; to sink &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;t&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;b&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; (&lt;span&gt;&lt;math&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;) such that &lt;span&gt;&lt;math&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;a&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;a&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;a&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;mo&gt;⊆&lt;/mo&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;p&lt;/mi&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; and &lt;span&gt;&lt;math&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;b&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;b&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;b&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;mo&gt;⊆&lt;/mo&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mo&gt;,&lt;/","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1032 ","pages":"Article 115111"},"PeriodicalIF":0.9,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143394738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing resource allocation: An active learning approach to iterative combinatorial auctions
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-04 DOI: 10.1016/j.tcs.2025.115104
Benjamin Estermann , Stefan Kramer , Roger Wattenhofer , Kanye Ye Wang
{"title":"Optimizing resource allocation: An active learning approach to iterative combinatorial auctions","authors":"Benjamin Estermann ,&nbsp;Stefan Kramer ,&nbsp;Roger Wattenhofer ,&nbsp;Kanye Ye Wang","doi":"10.1016/j.tcs.2025.115104","DOIUrl":"10.1016/j.tcs.2025.115104","url":null,"abstract":"<div><div>In deep learning-based iterative combinatorial auctions (DL-ICA), bidders are not required to report valuations for all bundles upfront. Instead, DL-ICA iteratively requests bidders to report their values for specific bundles and determines item allocation using a winner determination problem, with bidder profiles modeled by neural networks. However, due to the limited number of reported bundles, DL-ICA may not always achieve optimal winner allocation, leading to reduced economic efficiency. In this work, we enhance the economic efficiency, specifically the social welfare, of DL-ICA by optimizing the underlying machine learning-based elicitation algorithm. We introduce two novel active learning-based initial sampling strategies: GALI and GALO. GALI ensures optimal coverage of the entire bundle space during sampling, while GALO identifies bundles with high diversity in bidders' estimated values as determined by the neural network. This approach extends the application of active learning beyond small pool sizes. We demonstrate how linear programs can be utilized for active learning to manage pool sizes exceeding 10<sup>30</sup> samples. Our approach is theoretically validated and experimentally verified, showcasing significant improvements in performance.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1033 ","pages":"Article 115104"},"PeriodicalIF":0.9,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143376720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opinion maximization in social networks via link recommendation
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2025-02-03 DOI: 10.1016/j.tcs.2025.115090
Liwang Zhu , Zhongzhi Zhang
{"title":"Opinion maximization in social networks via link recommendation","authors":"Liwang Zhu ,&nbsp;Zhongzhi Zhang","doi":"10.1016/j.tcs.2025.115090","DOIUrl":"10.1016/j.tcs.2025.115090","url":null,"abstract":"<div><div>We study a variation of the Friedkin-Johnsen model for opinion dynamics in a leader-follower social network with <em>n</em> nodes and <em>m</em> edges, where the node set is partitioned into three subsets: set of leader nodes with opinion 1, set of leaders with opinion 0, and set of follower nodes. We give an explicit expression for the steady-state opinion vector in terms of some related matrices and the initial opinion vector, and interpret the equilibrium opinion vector as the weighted average of the initial opinions for all nodes with the weights being the escape probabilities of a defining random walk. We then pose an opinion maximization problem of recommending <em>k</em> new edges between 1-leader and follower nodes so that the equilibrium overall opinion is maximized. We show that the objective function is monotone and submodular, and propose a simple greedy algorithm with an approximation factor <span><math><mo>(</mo><mn>1</mn><mo>−</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>e</mi></mrow></mfrac><mo>)</mo></math></span> that approximately solves the problem in cubic running time. To speed up the computation, we also provide a fast algorithm with an approximation ratio <span><math><mo>(</mo><mn>1</mn><mo>−</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>e</mi></mrow></mfrac><mo>−</mo><mi>ϵ</mi><mo>)</mo></math></span> and computation complexity <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mi>m</mi><mi>k</mi><msup><mrow><mi>ϵ</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mo>)</mo></math></span> for any <span><math><mi>ϵ</mi><mo>&gt;</mo><mn>0</mn></math></span>, where the <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mo>⋅</mo><mo>)</mo></math></span> notation suppresses the <span><math><mrow><mi>poly</mi></mrow><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> factors. Extensive experiments on both real social networks with real opinions and datasets with synthetic opinions demonstrate that our algorithms are effective, efficient, and scale well to large social networks.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1033 ","pages":"Article 115090"},"PeriodicalIF":0.9,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143348192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信