Journal of Computer and System Sciences最新文献

筛选
英文 中文
On the binary and Boolean rank of regular matrices 正则矩阵的二进制和布尔秩
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-06-01 DOI: 10.1016/j.jcss.2023.01.005
Ishay Haviv , Michal Parnas
{"title":"On the binary and Boolean rank of regular matrices","authors":"Ishay Haviv ,&nbsp;Michal Parnas","doi":"10.1016/j.jcss.2023.01.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.005","url":null,"abstract":"<div><p>A <span><math><mn>0</mn><mo>,</mo><mn>1</mn></math></span> matrix is said to be regular if all of its rows and columns have the same number of ones. We prove that for infinitely many integers <em>k</em>, there exists a square regular <span><math><mn>0</mn><mo>,</mo><mn>1</mn></math></span> matrix with binary rank <em>k</em>, such that the Boolean rank of its complement is <span><math><msup><mrow><mi>k</mi></mrow><mrow><mover><mrow><mi>Ω</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>k</mi><mo>)</mo></mrow></msup></math></span>. This settles, in a strong form, a question of Pullman (1988) <span>[27]</span> and a conjecture of Hefner et al. (1990) <span>[18]</span>. The result can be viewed as a regular analogue of a recent result of Balodis et al. (2021) <span>[2]</span><span>, motivated by the clique vs. independent set problem in communication complexity and by the (disproved) Alon-Saks-Seymour conjecture in graph theory. As an application of the produced regular matrices, we obtain regular counterexamples to the Alon-Saks-Seymour conjecture and prove that for infinitely many integers </span><em>k</em><span>, there exists a regular graph with biclique partition number </span><em>k</em><span> and chromatic number </span><span><math><msup><mrow><mi>k</mi></mrow><mrow><mover><mrow><mi>Ω</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>k</mi><mo>)</mo></mrow></msup></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"134 ","pages":"Pages 73-86"},"PeriodicalIF":1.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49753163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted online search 加权在线搜索
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-30 DOI: 10.1016/j.jcss.2023.05.002
Spyros Angelopoulos , Konstantinos Panagiotou
{"title":"Weighted online search","authors":"Spyros Angelopoulos ,&nbsp;Konstantinos Panagiotou","doi":"10.1016/j.jcss.2023.05.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.002","url":null,"abstract":"<div><p>We study the general setting of <em>weighted search</em> in which a number of weighted targets are hidden in a star-like environment, and a mobile searcher must locate a subset of targets with aggregate weight at least a given value <em>W</em>. The cost of the strategy is the distance traversed by the searcher, and its performance is measured by the worst-case ratio of the cost incurred by the searcher over the cost of an on optimal, offline strategy. This is the first study of a setting that generalizes several problems in search theory such as searching for a single target and searching for unit-weighted targets. We present and analyze a near-optimal strategy using an approach based on parameterized analysis. This problem formulates settings of resource allocation among parallel tasks under uncertainty; specifically, we demonstrate further applications in the design of interruptible systems based on <em>adaptive</em> scheduling of contract algorithms.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103457"},"PeriodicalIF":1.1,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balanced allocation on hypergraphs 在超图上均衡分配
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-30 DOI: 10.1016/j.jcss.2023.05.004
Catherine Greenhill , Bernard Mans , Ali Pourmiri
{"title":"Balanced allocation on hypergraphs","authors":"Catherine Greenhill ,&nbsp;Bernard Mans ,&nbsp;Ali Pourmiri","doi":"10.1016/j.jcss.2023.05.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.004","url":null,"abstract":"<div><p>We consider a variation of balls-into-bins which randomly allocates <em>m</em> balls into <em>n</em> bins. Following Godfrey's model (SODA, 2008), we assume that each ball <em>t</em>, <span><math><mn>1</mn><mo>⩽</mo><mi>t</mi><mo>⩽</mo><mi>m</mi></math></span>, comes with a hypergraph <span><math><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></msup><mo>=</mo><mo>{</mo><msub><mrow><mi>B</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>B</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>B</mi></mrow><mrow><msub><mrow><mi>s</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></msub><mo>}</mo></math></span>, and each edge <span><math><mi>B</mi><mo>∈</mo><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></msup></math></span> contains at least a logarithmic number of bins. Given <span><math><mi>d</mi><mo>⩾</mo><mn>2</mn></math></span>, our <em>d</em>-choice algorithm chooses an edge <span><math><mi>B</mi><mo>∈</mo><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></msup></math></span>, uniformly at random, and then chooses a set <em>D</em> of <em>d</em> random bins from the selected edge <em>B</em>. The ball is allocated to a least-loaded bin from <em>D</em>. We prove that if the hypergraphs <span><math><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup><mo>,</mo><mo>…</mo><mo>,</mo><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>m</mi><mo>)</mo></mrow></msup></math></span> satisfy a <em>balancedness</em> condition and have low <em>pair visibility</em>, then after allocating <span><math><mi>m</mi><mo>=</mo><mi>Θ</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> balls, the maximum load of any bin is at most <span><math><msub><mrow><mi>log</mi></mrow><mrow><mi>d</mi></mrow></msub><mo>⁡</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>+</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>, with high probability. Moreover, we establish a lower bound for the maximum load attained by the balanced allocation for a sequence of hypergraphs in terms of pair visibility.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103459"},"PeriodicalIF":1.1,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interaction graphs of isomorphic automata networks I: Complete digraph and minimum in-degree 同构自动机网络的交互图I:完全有向图和最小in度
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-25 DOI: 10.1016/j.jcss.2023.05.003
Florian Bridoux , Kévin Perrot , Aymeric Picard Marchetto , Adrien Richard
{"title":"Interaction graphs of isomorphic automata networks I: Complete digraph and minimum in-degree","authors":"Florian Bridoux ,&nbsp;Kévin Perrot ,&nbsp;Aymeric Picard Marchetto ,&nbsp;Adrien Richard","doi":"10.1016/j.jcss.2023.05.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.003","url":null,"abstract":"<div><p><span>An automata network with </span><em>n</em> components over a finite alphabet <em>Q</em> of size <em>q</em><span> is a discrete dynamical system described by the successive iterations of a function </span><span><math><mi>f</mi><mo>:</mo><msup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>→</mo><msup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msup></math></span>. In most applications, the main parameter is the interaction graph of <em>f</em><span>: the digraph with vertex set </span><span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span> that contains an arc from <em>j</em> to <em>i</em> if <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span> depends on input <em>j</em>. What can be said on the set <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> of the interaction graphs of the automata networks isomorphic to <em>f</em>? It seems that this simple question has never been studied. Here, we report some basic facts. First, we prove that if <span><math><mi>n</mi><mo>≥</mo><mn>5</mn></math></span> or <span><math><mi>q</mi><mo>≥</mo><mn>3</mn></math></span> and <em>f</em> is neither the identity nor constant, then <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> always contains the complete digraph <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, with <span><math><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> arcs. Then, we prove that <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> always contains a digraph whose minimum in-degree is bounded as a function of <em>q</em>. Hence, if <em>n</em> is large with respect to <em>q</em>, then <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> cannot only contain <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. However, we prove that <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> can contain only dense digraphs, with at least <span><math><mo>⌊</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>/</mo><mn>4</mn><mo>⌋</mo></math></span> arcs.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103458"},"PeriodicalIF":1.1,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detours in directed graphs 有向图中的Detours
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-22 DOI: 10.1016/j.jcss.2023.05.001
Fedor V. Fomin , Petr A. Golovach , William Lochet , Danil Sagunov , Saket Saurabh , Kirill Simonov
{"title":"Detours in directed graphs","authors":"Fedor V. Fomin ,&nbsp;Petr A. Golovach ,&nbsp;William Lochet ,&nbsp;Danil Sagunov ,&nbsp;Saket Saurabh ,&nbsp;Kirill Simonov","doi":"10.1016/j.jcss.2023.05.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.001","url":null,"abstract":"<div><p>We study two “above guarantee” versions of the classical <span>Longest Path</span> problem on undirected and directed graphs and obtain the following results. In the first variant of <span>Longest Path</span> that we study, called <span>Longest Detour</span>, the task is to decide whether a graph has an <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span>-path of length at least <span><math><msub><mrow><mi>dist</mi></mrow><mrow><mi>G</mi></mrow></msub><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo><mo>+</mo><mi>k</mi></math></span>. Bezáková et al. <span>[7]</span> proved that on undirected graphs the problem is fixed-parameter tractable (<span><math><mi>FPT</mi></math></span>). Our first main result establishes a connection between <span>Longest Detour</span> on directed graphs and 3- <span>Disjoint Paths</span> on directed graphs. Using these new insights, we design a <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>k</mi><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span> time algorithm for the problem on directed planar graphs. Furthermore, the new approach yields a significantly faster <span><math><mi>FPT</mi></math></span> algorithm on undirected graphs. In the second variant of <span>Longest Path</span>, namely <span>Longest Path above Diameter</span>, the task is to decide whether the graph has a path of length at least <span><math><mi>diam</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>+</mo><mi>k</mi></math></span>. We obtain dichotomy results about <span>Longest Path above Diameter</span> on undirected and directed graphs.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 66-86"},"PeriodicalIF":1.1,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear-time 2-party secure merge from additively homomorphic encryption 加性同态加密的线性时间二部分安全合并
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-11 DOI: 10.1016/j.jcss.2023.04.007
Brett Hemenway Falk , Rohit Nema , Rafail Ostrovsky
{"title":"Linear-time 2-party secure merge from additively homomorphic encryption","authors":"Brett Hemenway Falk ,&nbsp;Rohit Nema ,&nbsp;Rafail Ostrovsky","doi":"10.1016/j.jcss.2023.04.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.007","url":null,"abstract":"<div><p>We present a linear-time, space and communication <em>data-oblivious</em> algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the <em>two</em> party setting. Although merging two sorted lists can be done <em>insecurely</em> in linear time, previous <em>secure</em> merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to <em>obliviously</em> traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 37-49"},"PeriodicalIF":1.1,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space characterizations of complexity measures and size-space trade-offs in propositional proof systems 命题证明系统中复杂性度量和大小-空间权衡的空间表征
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-04 DOI: 10.1016/j.jcss.2023.04.006
Theodoros Papamakarios , Alexander Razborov
{"title":"Space characterizations of complexity measures and size-space trade-offs in propositional proof systems","authors":"Theodoros Papamakarios ,&nbsp;Alexander Razborov","doi":"10.1016/j.jcss.2023.04.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.006","url":null,"abstract":"<div><p>We identify two new clusters of proof complexity measures equal up to polynomial and <span><math><mi>log</mi><mo>⁡</mo><mi>n</mi></math></span> factors. The first cluster contains the logarithm of tree-like resolution size, regularized clause and monomial space, and clause space, ordinary and regularized, in regular and tree-like resolution. Consequently, separating clause or monomial space from the logarithm of tree-like resolution size is equivalent to showing strong trade-offs between clause space and length, and equivalent to showing super-critical trade-offs between clause space and depth. The second cluster contains width, <span><math><msub><mrow><mi>Σ</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> space (a generalization of clause space to depth 2 Frege systems), ordinary and regularized, and the logarithm of tree-like <span><math><mi>R</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mo>)</mo></math></span> size. As an application, we improve a known size-space trade-off for polynomial calculus with resolution. We further show a quadratic lower bound on tree-like resolution size for formulas refutable in clause space 4, and introduce a measure intermediate between depth and the logarithm of tree-like resolution size.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 20-36"},"PeriodicalIF":1.1,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing maximum matchings in temporal graphs 计算时间图中的最大匹配
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-04 DOI: 10.1016/j.jcss.2023.04.005
George B. Mertzios , Hendrik Molter , Rolf Niedermeier , Viktor Zamaraev , Philipp Zschoche
{"title":"Computing maximum matchings in temporal graphs","authors":"George B. Mertzios ,&nbsp;Hendrik Molter ,&nbsp;Rolf Niedermeier ,&nbsp;Viktor Zamaraev ,&nbsp;Philipp Zschoche","doi":"10.1016/j.jcss.2023.04.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.005","url":null,"abstract":"<div><p><span>Temporal graphs are graphs whose topology is subject to discrete changes over time. Given a static underlying graph </span><em>G</em>, a temporal graph is represented by assigning a set of integer time-labels to every edge <em>e</em> of <em>G</em><span>, indicating the discrete time steps at which </span><em>e</em><span><span> is active. We introduce and study the complexity of a natural temporal extension of the </span>classical graph problem </span><span>Maximum Matching</span>, taking into account the dynamic nature of temporal graphs. In our problem, <span>Maximum Temporal Matching</span>, we are looking for the largest possible number of time-labeled edges (simply <em>time-edges</em>) <span><math><mo>(</mo><mi>e</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span> such that no vertex is matched more than once within any time window of Δ consecutive time slots, where <span><math><mi>Δ</mi><mo>∈</mo><mi>N</mi></math></span> is given. We prove strong computational hardness results for <span>Maximum Temporal Matching</span><span>, even for elementary cases, as well as fixed-parameter algorithms with respect to natural parameters and polynomial-time approximation algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 1-19"},"PeriodicalIF":1.1,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved IP lookup technology for trie-based data structures 改进了基于尝试的数据结构的IP查找技术
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-01 DOI: 10.1016/j.jcss.2022.10.003
Yen-Heng Lin , Sun-Yuan Hsieh
{"title":"Improved IP lookup technology for trie-based data structures","authors":"Yen-Heng Lin ,&nbsp;Sun-Yuan Hsieh","doi":"10.1016/j.jcss.2022.10.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.10.003","url":null,"abstract":"<div><p>Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory consumption and IP lookup time. Experiments involving binary tries (for simplicity) were conducted on four real-world data sets, two of which were on IPv4 router tables (855,997 and 876,489 active prefixes) and two of which were on IPv6 router tables (155,310 and 157,579 active prefixes). Technologies designed to reduce time taken (at the expense of memory consumption) worked well for IPv4, and those designed to reduce memory consumption worked well for IPv6. Various combinations of these technologies were applied together in the experiments.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 41-55"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
p-Edge/vertex-connected vertex cover: Parameterized and approximation algorithms p边/顶点连接的顶点覆盖:参数化和近似算法
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-05-01 DOI: 10.1016/j.jcss.2022.11.002
Carl Einarson , Gregory Gutin , Bart M.P. Jansen , Diptapriyo Majumdar , Magnus Wahlström
{"title":"p-Edge/vertex-connected vertex cover: Parameterized and approximation algorithms","authors":"Carl Einarson ,&nbsp;Gregory Gutin ,&nbsp;Bart M.P. Jansen ,&nbsp;Diptapriyo Majumdar ,&nbsp;Magnus Wahlström","doi":"10.1016/j.jcss.2022.11.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.11.002","url":null,"abstract":"<div><p>We introduce and study two natural generalizations of the Connected Vertex Cover (VC) problem: the <em>p</em>-Edge-Connected and <em>p</em>-Vertex-Connected VC problem (where <span><math><mi>p</mi><mo>≥</mo><mn>2</mn></math></span> is a fixed integer). We obtain an <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>p</mi><mi>k</mi><mo>)</mo></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm for <em>p</em>-Edge-Connected VC and an <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm for <em>p</em>-Vertex-Connected VC. Thus, like Connected VC, both constrained VC problems are FPT. Furthermore, like Connected VC, neither problem admits a polynomial kernel unless NP ⊆ coNP/poly, which is highly unlikely. We prove however that both problems admit time efficient polynomial sized approximate kernelization schemes. Finally, we describe a <span><math><mn>2</mn><mo>(</mo><mi>p</mi><mo>+</mo><mn>1</mn><mo>)</mo></math></span>-approximation algorithm for the <em>p</em>-Edge-Connected VC. The proofs for the new VC problems require more sophisticated arguments than for Connected VC. In particular, for the approximation algorithm we use Gomory-Hu trees and for the approximate kernels a result on small-size spanning <em>p</em>-vertex/edge-connected subgraphs of a <em>p</em>-vertex/edge-connected graph by Nishizeki and Poljak (1994) <span>[30]</span> and Nagamochi and Ibaraki (1992) <span>[27]</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 23-40"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信