Theoretical Computer Science最新文献

筛选
英文 中文
Sink location problems in dynamic flow grid networks 动态流网格网络中的下沉点定位问题
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-09-03 DOI: 10.1016/j.tcs.2024.114812
{"title":"Sink location problems in dynamic flow grid networks","authors":"","doi":"10.1016/j.tcs.2024.114812","DOIUrl":"10.1016/j.tcs.2024.114812","url":null,"abstract":"<div><p>A <em>dynamic flow network</em> consists of a directed graph, where nodes called <em>sources</em> represent locations of evacuees, and nodes called <em>sinks</em> represent locations of evacuation facilities. Each source and each sink are given <em>supply</em> representing the number of evacuees and <em>demand</em> representing the maximum number of acceptable evacuees, respectively. Each edge is given <em>capacity</em> and <em>transit time</em>. Here, the capacity of an edge bounds the rate at which evacuees can enter the edge per unit time, and the transit time represents the time which evacuees take to travel across the edge. The <em>evacuation completion time</em> is the minimum time at which each evacuee can arrive at one of the evacuation facilities. Given a dynamic flow network without sinks, once sinks are located on some nodes or edges, the evacuation completion time for this sink location is determined. We then consider the problem of locating sinks to minimize the evacuation completion time, called the <em>sink location problem</em>. The problems have been given polynomial-time algorithms only for limited networks such as paths <span><span>[1]</span></span>, <span><span>[2]</span></span>, <span><span>[3]</span></span>, cycles <span><span>[1]</span></span>, and trees <span><span>[4]</span></span>, <span><span>[5]</span></span>, <span><span>[6]</span></span>, but no polynomial-time algorithms are known for more complex network classes. In this paper, we prove that the 1-sink location problem can be solved in polynomial-time when an input network is a grid with uniform edge capacity and transit time.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The cyclic diagnosability of balanced hypercubes under the PMC and MM⁎ model PMC和MM⁎模型下平衡超立方体的可循环诊断性
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114816
{"title":"The cyclic diagnosability of balanced hypercubes under the PMC and MM⁎ model","authors":"","doi":"10.1016/j.tcs.2024.114816","DOIUrl":"10.1016/j.tcs.2024.114816","url":null,"abstract":"<div><p>In 2023, Zhang et al. proposed a novel diagnostic parameter, namely the cyclic diagnosability and explored the cyclic diagnosability of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. In this paper, the cyclic diagnosability of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> is determined under the <em>PMC</em> model and the <span><math><mi>M</mi><msup><mrow><mi>M</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> model.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Maximum Zero-Sum Partition problem 最大零和分割问题
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114811
{"title":"The Maximum Zero-Sum Partition problem","authors":"","doi":"10.1016/j.tcs.2024.114811","DOIUrl":"10.1016/j.tcs.2024.114811","url":null,"abstract":"<div><p>We study the <span>Maximum Zero-Sum Partition</span> problem (or <span>MZSP</span>), defined as follows: given a multiset <span><math><mi>S</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> of integers <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>∈</mo><msup><mrow><mi>Z</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> (where <span><math><msup><mrow><mi>Z</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> denotes the set of non-zero integers) such that <span><math><msubsup><mrow><mo>∑</mo></mrow><mrow><mi>i</mi><mo>=</mo><mn>1</mn></mrow><mrow><mi>n</mi></mrow></msubsup><msub><mrow><mi>a</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>=</mo><mn>0</mn></math></span>, find a maximum cardinality partition <span><math><mo>{</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>}</mo></math></span> of <span><math><mi>S</mi></math></span> such that, for every <span><math><mn>1</mn><mo>≤</mo><mi>i</mi><mo>≤</mo><mi>k</mi></math></span>, <span><math><msub><mrow><mo>∑</mo></mrow><mrow><msub><mrow><mi>a</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>∈</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></msub><msub><mrow><mi>a</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>=</mo><mn>0</mn></math></span>. Solving <span>MZSP</span> is useful in genomics for computing evolutionary distances between pairs of species. Our contributions are a series of algorithmic results concerning <span>MZSP</span>, in terms of complexity, (in)approximability, with a particular focus on the fixed-parameter tractability of <span>MZSP</span> with respect to either (i) the size <em>k</em> of the solution, (ii) the number of negative (resp. positive) values in <span><math><mi>S</mi></math></span> and (iii) the largest integer in <span><math><mi>S</mi></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004286/pdfft?md5=834de52b293d98cccaa7d3d01b33ccb6&pid=1-s2.0-S0304397524004286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On monochromatic arithmetic progressions in binary words associated with pattern sequences 论与模式序列相关的二进制词中的单色算术级数
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114815
{"title":"On monochromatic arithmetic progressions in binary words associated with pattern sequences","authors":"","doi":"10.1016/j.tcs.2024.114815","DOIUrl":"10.1016/j.tcs.2024.114815","url":null,"abstract":"<div><p>Let <span><math><msub><mrow><mi>e</mi></mrow><mrow><mi>v</mi></mrow></msub><mo>(</mo><mi>n</mi><mo>)</mo></math></span> denote the number of occurrences of a fixed pattern <em>v</em> in the binary expansion of <span><math><mi>n</mi><mo>∈</mo><mi>N</mi></math></span>. In this paper we study monochromatic arithmetic progressions in the class of binary words <span><math><msub><mrow><mo>(</mo><msub><mrow><mi>e</mi></mrow><mrow><mi>v</mi></mrow></msub><mo>(</mo><mi>n</mi><mo>)</mo><mspace></mspace><mrow><mi>mod</mi></mrow><mspace></mspace><mn>2</mn><mo>)</mo></mrow><mrow><mi>n</mi><mo>≥</mo><mn>0</mn></mrow></msub></math></span>, which includes the famous Thue–Morse word <strong>t</strong> and Rudin–Shapiro word <strong>r</strong>. We prove that the length of a monochromatic arithmetic progression of difference <span><math><mi>d</mi><mo>≥</mo><mn>3</mn></math></span> starting at 0 in <strong>r</strong> is at most <span><math><mo>(</mo><mi>d</mi><mo>+</mo><mn>3</mn><mo>)</mo><mo>/</mo><mn>2</mn></math></span>, with equality for infinitely many <em>d</em>. We also compute the maximal length of a monochromatic arithmetic progression in <strong>r</strong> of difference <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>−</mo><mn>1</mn></math></span> and <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>+</mo><mn>1</mn></math></span>. For a general pattern <em>v</em> we show that the maximal length of a monochromatic arithmetic progression of difference <em>d</em> is at most linear in <em>d</em>. Moreover, we prove that a linear lower bound holds for suitable subsequences <span><math><msub><mrow><mo>(</mo><msub><mrow><mi>d</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>)</mo></mrow><mrow><mi>k</mi><mo>≥</mo><mn>0</mn></mrow></msub></math></span> of differences. We also offer a number of related problems and conjectures.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004328/pdfft?md5=f1b8c0a8a097177b0f698184130f8ee6&pid=1-s2.0-S0304397524004328-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User-driven competitive influence maximization in social networks 社交网络中用户驱动的竞争影响力最大化
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114813
{"title":"User-driven competitive influence maximization in social networks","authors":"","doi":"10.1016/j.tcs.2024.114813","DOIUrl":"10.1016/j.tcs.2024.114813","url":null,"abstract":"<div><p>Online social networks have emerged as pivotal platforms where users not only interact but also influence each other's decisions and preferences. As these networks grow in complexity, understanding and leveraging influence dynamics within networks have become essential, particularly for businesses and marketers. Competitive Influence Maximization (CIM) in online social networks has garnered significant interest, focusing on maximizing influence spread among multiple entities. However, recent research on CIM often overlooks the differences in user preferences, which realistically impact the propagation of competitive influence. To address this issue, we introduce the User-Driven Competitive Linear Threshold (UDCLT) model. This model takes into account user preference differences for two distinct brands within the identical product category, thereby formulating the User-Driven Competitive Influence Maximization (UDCIM) problem. Based on community structure, we introduce a novel measure, namely Topology Importance (TI), to assess a node's potential influence within a social network by considering its connections within and across communities. To resolve the UDCIM problem effectively, we develop a novel two-phase algorithm, the Community-based Dual Influence Assessment (CDIA) algorithm, which integrates Topology Importance and Dual Influence to identify seed nodes. Various experiments are conducted on four real-world datasets, illustrating the efficiency and effectiveness of the CDIA algorithm in addressing the UDCIM problem.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph realization of distance sets 距离集的图形实现
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114810
{"title":"Graph realization of distance sets","authors":"","doi":"10.1016/j.tcs.2024.114810","DOIUrl":"10.1016/j.tcs.2024.114810","url":null,"abstract":"&lt;div&gt;&lt;p&gt;The &lt;span&gt;Distance Realization&lt;/span&gt; problem is defined as follows. Given an &lt;span&gt;&lt;math&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;mo&gt;×&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt; matrix &lt;em&gt;D&lt;/em&gt; of nonnegative integers, interpreted as inter-vertex distances, find an &lt;em&gt;n&lt;/em&gt;-vertex weighted or unweighted graph &lt;em&gt;G&lt;/em&gt; realizing &lt;em&gt;D&lt;/em&gt;, i.e., whose inter-vertex distances satisfy &lt;span&gt;&lt;math&gt;&lt;mi&gt;d&lt;/mi&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mi&gt;s&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;t&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;j&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;D&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;j&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; for every &lt;span&gt;&lt;math&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;&lt;&lt;/mo&gt;&lt;mi&gt;j&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;, or decide that no such realizing graph exists. The problem was studied for general weighted and unweighted graphs, as well as for cases where the realizing graph is restricted to a specific family of graphs (e.g., trees or bipartite graphs). An extension of &lt;span&gt;Distance Realization&lt;/span&gt; that was studied in the past is where each entry in the matrix &lt;em&gt;D&lt;/em&gt; may contain a &lt;em&gt;range&lt;/em&gt; of consecutive permissible values. We refer to this extension as &lt;span&gt;Range Distance Realization&lt;/span&gt; (or &lt;span&gt;Range-DR&lt;/span&gt;). Restricting each range to at most &lt;em&gt;k&lt;/em&gt; values yields the problem &lt;em&gt;k&lt;/em&gt;-&lt;span&gt;Range Distance Realization&lt;/span&gt; (or &lt;em&gt;k&lt;/em&gt;-&lt;span&gt;Range-DR&lt;/span&gt;). The current paper introduces a new extension of &lt;span&gt;Distance Realization&lt;/span&gt;, in which each entry &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;D&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;j&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; of the matrix may contain an arbitrary set of acceptable values for the distance between &lt;em&gt;i&lt;/em&gt; and &lt;em&gt;j&lt;/em&gt;, for every &lt;span&gt;&lt;math&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;&lt;&lt;/mo&gt;&lt;mi&gt;j&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;. We refer to this extension as &lt;span&gt;Set Distance Realization&lt;/span&gt; (&lt;span&gt;Set-DR&lt;/span&gt;), and to the restricted problem where each entry may contain at most &lt;em&gt;k&lt;/em&gt; values as &lt;em&gt;k&lt;/em&gt;-&lt;span&gt;Set Distance Realization&lt;/span&gt; (or &lt;em&gt;k&lt;/em&gt;-&lt;span&gt;Set-DR&lt;/span&gt;).&lt;/p&gt;&lt;p&gt;We first show that 2-&lt;span&gt;Range-DR&lt;/span&gt; is NP-hard for unweighted graphs (implying the same for 2-&lt;span&gt;Set-DR&lt;/span&gt;). Next we prove that 2-&lt;span&gt;Set-DR&lt;/span&gt; is NP-hard for unweighted and weighted trees.&lt;/p&gt;&lt;p&gt;Finally, we explore &lt;span&gt;Set-DR&lt;/span&gt; where the realization is restricted to the families of stars, paths, cycles, or caterpillars. For the weighted case, our positive results are that there exist polynomial time algorithms for the 2-&lt;span&gt;Set-DR&lt;/span&gt; problem on stars, paths and cycles, and for the 1-&lt;span&gt;Set-DR&lt;/span&gt; problem on caterpillars. On the hardness side, we prove that 6-&lt;span&gt;Set-DR&lt;/span&gt; is NP-hard for stars and 5-&lt;span&gt;Set-DR&lt;/span&gt; is NP-hard for paths, cycles and caterpillars. For the unweighted case, our results are the same, except for the case of unweighted stars, for which &lt;em&gt;k&lt;/em&gt;-&lt;span&gt;Set-DR&lt;/span&gt; is polynomially solvable for a","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On submodular prophet inequalities and correlation gap 关于亚模态预言不等式和相关差距
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-30 DOI: 10.1016/j.tcs.2024.114814
{"title":"On submodular prophet inequalities and correlation gap","authors":"","doi":"10.1016/j.tcs.2024.114814","DOIUrl":"10.1016/j.tcs.2024.114814","url":null,"abstract":"<div><p>Prophet inequalities and secretary problems have been extensively studied in recent years due to their elegance, connections to online algorithms, stochastic optimization, and mechanism design problems in game theoretic settings. Rubinstein and Singla <span><span>[31]</span></span> developed a notion of <em>combinatorial</em> prophet inequalities in order to generalize the standard prophet inequality setting to combinatorial valuation functions such as submodular and subadditive functions. For non-negative submodular functions they demonstrated a constant factor prophet inequality for matroid constraints. Along the way they showed a variant of the correlation gap for non-negative submodular functions.</p><p>In this paper we revisit their notion of correlation gap as well as the standard notion of correlation gap and prove much tighter and cleaner bounds. Via these bounds and other insights we obtain substantially improved constant factor combinatorial prophet inequalities for both monotone and non-monotone submodular functions over any constraint that admits an Online Contention Resolution Scheme. In addition to improved bounds we describe efficient polynomial-time algorithms that achieve these bounds.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The diameter of sum basic equilibria games 和基本均衡博弈的直径
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-28 DOI: 10.1016/j.tcs.2024.114807
{"title":"The diameter of sum basic equilibria games","authors":"","doi":"10.1016/j.tcs.2024.114807","DOIUrl":"10.1016/j.tcs.2024.114807","url":null,"abstract":"<div><p>We study the sum basic network creation game introduced in 2010 by Alon, Demaine, Hajiaghai and Leighton. In this game, an undirected and unweighted graph <em>G</em> is said to be a <em>sum basic equilibrium</em> if and only if, for every edge <em>uv</em> and any vertex <span><math><msup><mrow><mi>v</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> in <em>G</em>, swapping edge <em>uv</em> with edge <span><math><mi>u</mi><msup><mrow><mi>v</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> does not decrease the total sum of the distances from <em>u</em> to all the other vertices. This concept lies at the heart of the network creation games, where the central problem is to understand the structure of the resulting equilibrium graphs, and in particular, how well they globally minimize the diameter. In this sense, in 2013 Alon et al. showed an upper bound of <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msqrt><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow></msqrt><mo>)</mo></mrow></msup></math></span> on the diameter of sum basic equilibria, and they also proved that if a sum basic equilibrium graph is a tree, then it has diameter at most 2. In this paper, we prove that the upper bound of 2 also holds for bipartite graphs and even for some non-bipartite classes like block graphs and cactus graphs.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004249/pdfft?md5=ab3c3a76dbdf1ff573755d82085be616&pid=1-s2.0-S0304397524004249-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142099008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards zero knowledge argument for double discrete logarithm with constant cost 以恒定成本实现双离散对数的零知识论证
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-26 DOI: 10.1016/j.tcs.2024.114799
{"title":"Towards zero knowledge argument for double discrete logarithm with constant cost","authors":"","doi":"10.1016/j.tcs.2024.114799","DOIUrl":"10.1016/j.tcs.2024.114799","url":null,"abstract":"<div><p>Given that the Schnorr's protocol for Discrete Logarithm (DLOG) exchanges three messages, it is an interesting problem whether a constant round zero-knowledge protocol exists for the Double Discrete Logarithm problem (DDLOG), i.e., to demonstrate the knowledge of a secret witness <em>x</em> in <span><math><msup><mrow><mi>g</mi></mrow><mrow><msup><mrow><mi>h</mi></mrow><mrow><mi>x</mi></mrow></msup></mrow></msup></math></span>. In this paper, we show that it exists for a fragment of DDLOG with two restrictions: (1) The outer group of DDLOG supports bilinear pairing, and it needs a trusted set-up for common reference string (CRS). (2) <span><math><mi>x</mi><mo>&lt;</mo><mi>t</mi></math></span> where <em>t</em> is the size of KZG commitment key in CRS. The protocol is zero knowledge and constant round, with <span><math><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span> complexity for prover and verifier, regardless of the desired security strength. The contributions of the work are mainly theoretical due to its restrictions and concrete performance.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142098954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterised approximation of the fixation probability of the dominant mutation in the multi-type Moran process 多类型莫兰过程中显性突变固定概率的参数化近似值
IF 0.9 4区 计算机科学
Theoretical Computer Science Pub Date : 2024-08-22 DOI: 10.1016/j.tcs.2024.114785
{"title":"Parameterised approximation of the fixation probability of the dominant mutation in the multi-type Moran process","authors":"","doi":"10.1016/j.tcs.2024.114785","DOIUrl":"10.1016/j.tcs.2024.114785","url":null,"abstract":"<div><p>The multi-type Moran process is an evolutionary process on a connected graph <em>G</em> in which each vertex has one of <em>k</em> types and, in each step, a vertex <em>v</em> is chosen to reproduce its type to one of its neighbours. The probability of a vertex <em>v</em> being chosen for reproduction is proportional to the fitness of the type of <em>v</em>. So far, the literature was almost solely concerned with the 2-type Moran process in which each vertex is either healthy (type 0) or a mutant (type 1), and the main problem of interest has been the (approximate) computation of the so-called <em>fixation probability</em>, i.e., the probability that eventually all vertices are mutants.</p><p>In this work we initiate the study of approximating fixation probabilities in the multi-type Moran process on general graphs. Our main result is an FPTRAS (fixed-parameter tractable randomised approximation scheme) for computing the fixation probability of the dominant mutation; the parameter is the number of types and their fitnesses. In the course of our studies we also provide novel upper bounds on the expected <em>absorption time</em>, i.e., the time that it takes the multi-type Moran process to reach a state in which each vertex has the same type.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信