{"title":"Space-time graph path planner for unsignalized intersection management with a V2V agent coordination architecture","authors":"Ionut Cardei, Caner Mutlu, Mihaela Cardei","doi":"10.1016/j.tcs.2024.114871","DOIUrl":"10.1016/j.tcs.2024.114871","url":null,"abstract":"<div><p>Reducing traffic congestion and increasing passenger safety are important objectives for emerging automated transportation systems. Autonomous intersection management systems (AIMS) enable large scale optimization of vehicle trajectories with connected and autonomous vehicles (CAVs). We propose a novel approach for computing the fastest waypoint trajectory in intersections using graph search in a discretized space-time graph that produces collision-free paths with variable vehicle speeds that comply with traffic rules and vehicle dynamical constraints. To assist our planner algorithm in decentralized scenarios, we also propose a multi-agent protocol architecture for vehicle coordination for trajectory planning using a vehicle-to-vehicle (V2V) network. The trajectories generated allow a much higher evacuation rate and congestion threshold, with lower <span><math><mi>O</mi><mo>(</mo><mi>N</mi><mo>)</mo></math></span> algorithm runtime compared to the state of the art conflict detection graph platoon path planning method, even for large scenarios with vehicle arrival rate of <span><math><mn>1</mn><mo>/</mo><mi>s</mi></math></span> and thousands of vehicles.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114871"},"PeriodicalIF":0.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algebraic approach to the reconstruction of uniform hypergraphs from their degree sequence","authors":"Michela Ascolese , Andrea Frosini , Elisa Pergola , Simone Rinaldi , Laurent Vuillon","doi":"10.1016/j.tcs.2024.114872","DOIUrl":"10.1016/j.tcs.2024.114872","url":null,"abstract":"<div><p>The reconstruction of a (hyper)graph starting from its degree sequence is one of the most relevant among the inverse problems investigated in the field of graph theory. In case of graphs, a feasible solution can be quickly reached, while in case of hypergraphs Deza et al. (2018) proved that the problem is NP-hard even in the simple case of 3-uniform ones. This result opened a new research line consisting in the detection of instances for which a solution can be computed in polynomial time. In this work we deal with 3-uniform hypergraphs, and we study them from a different perspective, exploiting a connection of these objects with partially ordered sets. More precisely, we introduce a simple partially ordered set, whose ideals are in bijection with a subclass of 3-uniform hypergraphs. We completely characterize their degree sequences in case of principal ideals (here a simple fast reconstruction strategy follows), and we furthermore carry on a complete analysis of those degree sequences related to the ideals with two generators. We also consider unique hypergraphs in <span><math><msup><mrow><mi>D</mi></mrow><mrow><mi>e</mi><mi>x</mi><mi>t</mi></mrow></msup></math></span>, i.e., those hypergraphs that do not share their degree sequence with other non-isomorphic ones. We show that uniqueness holds in case of hypergraphs associated to principal ideals, and we provide some examples of hypergraphs in <span><math><msup><mrow><mi>D</mi></mrow><mrow><mi>e</mi><mi>x</mi><mi>t</mi></mrow></msup></math></span> where this property is lost.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114872"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004894/pdfft?md5=9a5013316177a513ac9292e891e55cf0&pid=1-s2.0-S0304397524004894-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructions of rotation symmetric Boolean functions satisfying almost all cryptographic criteria","authors":"Lei Sun , Zexia Shi , Jian Liu , Fang-Wei Fu","doi":"10.1016/j.tcs.2024.114869","DOIUrl":"10.1016/j.tcs.2024.114869","url":null,"abstract":"<div><p>Constructions of Boolean functions with various cryptographic properties have always been an important challenge in cryptography. This paper proposes systematic constructions of even-variable rotation symmetric Boolean functions satisfying almost all cryptographic criteria, that is, resiliency, optimal algebraic degree, strict avalanche criterion, high nonlinearity, nonexistence of nonzero linear structures, good global avalanche characteristics. Moreover, some of the constructions also have high algebraic immunity. This is the first time that Boolean functions having such cryptographic properties are obtained, which can be considered as good candidates for the design of real-life encryption schemes.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114869"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On recursive tiling of some mathematical objects","authors":"Andrew L. Szilard","doi":"10.1016/j.tcs.2024.114781","DOIUrl":"10.1016/j.tcs.2024.114781","url":null,"abstract":"<div><div>This essay, in a novel way, uses various tiles, such as dominoes, square-, interlocking-, and flow-tiles, to visualize approximations to recursively defined, potentially infinite mathematical objects, such as binary code tables, and variants of the space-filling Hilbert curve. The power of L-systems is shown by defining these tiled objects as L-systems.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1022 ","pages":"Article 114781"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142699487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parameterized approximation algorithms for weighted vertex cover","authors":"Soumen Mandal , Pranabendu Misra , Ashutosh Rai , Saket Saurabh","doi":"10.1016/j.tcs.2024.114870","DOIUrl":"10.1016/j.tcs.2024.114870","url":null,"abstract":"<div><p>A <em>vertex cover</em> of a graph is a set of vertices of the graph such that every edge has at least one endpoint in it. In this work, we study <span>Weighted Vertex Cover</span> with solution size as a parameter. Formally, in the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> problem, given a graph <em>G</em>, an integer <em>k</em>, a positive rational <em>W</em>, and a weight function <span><math><mi>w</mi><mo>:</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>→</mo><msup><mrow><mi>Q</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>, the question is whether <em>G</em> has a vertex cover of size at most <em>k</em> of weight at most <em>W</em>, with <em>k</em> being the parameter. An <span><math><mo>(</mo><mi>a</mi><mo>,</mo><mi>b</mi><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> either produces a vertex cover <em>S</em> such that <span><math><mo>|</mo><mi>S</mi><mo>|</mo><mo>≤</mo><mi>a</mi><mi>k</mi></math></span> and <span><math><mi>w</mi><mo>(</mo><mi>S</mi><mo>)</mo><mo>≤</mo><mi>b</mi><mi>W</mi></math></span>, or decides that there is no vertex cover of size at most <em>k</em> of weight at most <em>W</em>. We obtain the following results.</p><ul><li><span>•</span><span><p>A simple <span><math><mo>(</mo><mn>2</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> in polynomial time by modifying the standard <span>LP</span>-rounding algorithm.</p></span></li><li><span>•</span><span><p>A simple exact parameterized algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time<span><span><sup>1</sup></span></span>.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mi>ϵ</mi><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mo>(</mo><mn>1</mn><mo>−</mo><mi>ϵ</mi><mo>)</mo><mi>k</mi></mrow></msup><mo>)</mo></math></span> time.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1.5</mn><mo>,</mo><mn>1.5</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.414</mn></mr","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114870"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142271415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deterministic 3-server on a circle and the limitation of canonical potentials","authors":"Zhiyi Huang, Hanwen Zhang","doi":"10.1016/j.tcs.2024.114844","DOIUrl":"10.1016/j.tcs.2024.114844","url":null,"abstract":"<div><p>The deterministic <em>k</em>-server conjecture states that there is a <em>k</em>-competitive deterministic algorithm for the <em>k</em>-server problem for any metric space. We show that the work function algorithm is 3-competitive for the 3-server problem on circle metrics, a case left open by Coester and Koutsoupias (2021). Our analysis follows the existing framework but introduces a new potential function which may be viewed as a relaxation of the counterpart by Coester and Koutsoupias (2021). We further notice that the new potential function and many existing ones can be rewritten in a canonical form. Through a computer-aided verification, however, we find that no such canonical potential function can resolve the deterministic 3-server conjecture for general metric spaces under the current analysis framework.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114844"},"PeriodicalIF":0.9,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristina G. Fernandes , Carla N. Lintzmayer , Phablo F.S. Moura
{"title":"Approximations for the Steiner Multicycle problem","authors":"Cristina G. Fernandes , Carla N. Lintzmayer , Phablo F.S. Moura","doi":"10.1016/j.tcs.2024.114836","DOIUrl":"10.1016/j.tcs.2024.114836","url":null,"abstract":"<div><p>The <span>Steiner Multicycle</span> problem consists in, given a complete graph, a weight function on its edges, and a collection of pairwise disjoint non-unitary sets called terminal sets, finding a minimum weight collection of vertex-disjoint cycles in the graph such that, for every terminal set, all of its vertices are in a same cycle of the collection. This problem generalizes the <span>Traveling Salesman</span> problem and, therefore, is hard to approximate in general. On the practical side, it models a collaborative less-than-truckload problem with pickup and delivery locations. Using an algorithm for the <span>Survivable Network Design</span> problem and <em>T</em>-joins, we obtain a 3-approximation for the metric case, improving on the previous best 4-approximation. Furthermore, we present an (11/9)-approximation for the particular case of the <span>Steiner Multicycle</span> in which each edge weight is 1 or 2. This algorithm can be adapted to obtain a (7/6)-approximation when every terminal set contains at least four vertices. Finally, we devise an <span><math><mi>O</mi><mo>(</mo><mi>lg</mi><mo></mo><mi>n</mi><mo>)</mo></math></span>-approximation algorithm for the asymmetric version of the problem.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114836"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic cluster fault diagnosis for multiprocessor systems","authors":"Baohua Niu , Shuming Zhou , Hong Zhang , Qifan Zhang","doi":"10.1016/j.tcs.2024.114837","DOIUrl":"10.1016/j.tcs.2024.114837","url":null,"abstract":"<div><p>As high performance computing systems consisting of multiple processors play an important role in big data analytics, we are motivated to focus on the research of reliability, design-for-test, fault diagnosis and detection of large-scale multiprocessor interconnected systems. System-level diagnosis theory, which originates from the testing of VLSI and Wafer, aims to identify faulty processors in these systems by means of analyzing the test results among the processors, while diagnosability as well as diagnosis accuracy are two important indices. The probabilistic fault diagnostic strategy seeks to correctly diagnose processors with high probability under the assumption that each processor has a certain failing probability. In this work, based on the probabilistic diagnosis algorithm with consideration of fault clustering, we specialize in the local diagnostic capability to establish the probability that any processor in a discrete status is diagnosed correctly. Subsequently, we investigate the global performance evaluation of multiprocessor systems under various significant fault distributions including Poisson distribution, Exponential distribution and Binomial distribution. In addition, we directly apply our results to the data center network <span><math><mi>H</mi><mi>S</mi><mi>D</mi><mi>C</mi></math></span> and <span><math><mo>(</mo><mi>n</mi><mo>,</mo><mi>k</mi><mo>)</mo></math></span>-star network. Numerical simulations are performed to verify the established results, which reveal the relationship between the accuracy of correct diagnosis and regulatory parameters.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114837"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Restriction on cut rule in cyclic-proof system for symbolic heaps","authors":"Kenji Saotome , Koji Nakazawa , Daisuke Kimura","doi":"10.1016/j.tcs.2024.114854","DOIUrl":"10.1016/j.tcs.2024.114854","url":null,"abstract":"<div><p>Symbolic heaps, which are a restricted class of separation logic formulas, with inductive definitions are a suitable language in automated verification systems for memory-manipulating programs. In this context, some related problems, e.g., the entailment problem, have been studied theoretically. In addition, several solvers for the entailment problem based on the proof-search algorithm in cyclic-proof systems, which are proof systems in sequent calculus style with cyclic structure, have been proposed. However, the cut-elimination property generally does not hold for cyclic-proof systems of symbolic heaps with inductive definitions, which means that searching for a cut-free proof is insufficient. In other words, we hope to find a reasonable proof-search algorithm considering the cut rule or we give up on obtaining a complete proof-search procedure. This paper investigates this issue and demonstrates a limit to the challenge of the restrictions on the cut rule in a cyclic-proof system for symbolic heaps. We propose a restricted cut rule, referred to as the presumable cut, which is a relaxed variant of the analytic cut, in which the cut formula must be a subformula of the bottom sequent. This paper demonstrates that the provability of the cyclic-proof system for symbolic heaps becomes strictly weaker by restricting the cut rule to the presumable cut.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114854"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004717/pdfft?md5=08f063fdecac881a6031c44144f640a6&pid=1-s2.0-S0304397524004717-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Rass , Max-Julian Jakobitsch , Stefan Haan , Moritz Hiebler
{"title":"Threshold sampling","authors":"Stefan Rass , Max-Julian Jakobitsch , Stefan Haan , Moritz Hiebler","doi":"10.1016/j.tcs.2024.114847","DOIUrl":"10.1016/j.tcs.2024.114847","url":null,"abstract":"<div><p>We consider the problem of sampling elements with some desired property from a large set, without testing the property of interest, but with the (probabilistic) assurance to have at least one match among the random sample. Like in ranked set sampling (RSS), we consider an infinite population under study, whose properties of interest are too expensive and/or time-consuming to measure. Unlike RSS, we are void of a ranking mechanism, so our sampling is done entirely blind. We show how it is nonetheless doable to assure, with controllably large likelihood, to either have at least one of the interesting elements in a random sample, or, contrarily, sample with the likewise assurance of not having one of the interesting elements in the sample. Our technique utilizes density bounds for distributions and threshold functions from random graph theory.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114847"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S030439752400464X/pdfft?md5=26ceab1a448b5baf958ad0b8d3b32343&pid=1-s2.0-S030439752400464X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}