Journal of Computer and System Sciences最新文献

筛选
英文 中文
Controlling entity integrity with key sets 用键集控制实体完整性
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.04.004
Miika Hannula , Xinyi Li , Sebastian Link
{"title":"Controlling entity integrity with key sets","authors":"Miika Hannula ,&nbsp;Xinyi Li ,&nbsp;Sebastian Link","doi":"10.1016/j.jcss.2023.04.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.004","url":null,"abstract":"<div><p><span>Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its </span><span>coNP</span><span><span>-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and </span>computational complexity for the implication problem of key sets combined with </span><span>NOT NULL</span> constraints.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 195-219"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes 对分散图类的删除II -改进的FPT算法对图类的删除
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.004
Ashwin Jacob , Diptapriyo Majumdar , Venkatesh Raman
{"title":"Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes","authors":"Ashwin Jacob ,&nbsp;Diptapriyo Majumdar ,&nbsp;Venkatesh Raman","doi":"10.1016/j.jcss.2023.03.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.004","url":null,"abstract":"<div><p>The problem of deletion of vertices to a hereditary graph class is a well-studied problem in parameterized complexity. Recently, a natural extension of the problem was initiated where we are given a finite set of hereditary graph classes and we determine whether <em>k</em> vertices can be deleted from a given graph so that the connected components of the resulting graph belong to one of the given hereditary graph classes. The problem is shown to be fixed parameter tractable (FPT) when the deletion problem to each of the given hereditary graph classes is fixed-parameter tractable, and the property of being in any of the graph classes is expressible in the counting monodic second order (CMSO) logic. This paper focuses on pairs of specific graph classes (<span><math><msub><mrow><mi>Π</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span><span>) in which we would like the connected components of the resulting graph to belong to, and design simpler and more efficient FPT algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 280-301"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parameterized complexity of categorical clustering with size constraints 具有大小约束的分类聚类的参数化复杂度
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.006
Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit
{"title":"Parameterized complexity of categorical clustering with size constraints","authors":"Fedor V. Fomin,&nbsp;Petr A. Golovach,&nbsp;Nidhi Purohit","doi":"10.1016/j.jcss.2023.03.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.006","url":null,"abstract":"<div><p>In the <span>Categorical Clustering</span> problem, we are given a set of vectors (matrix) <span><math><mi>A</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> over <span><math><msup><mrow><mi>Σ</mi></mrow><mrow><mi>m</mi></mrow></msup></math></span>, where Σ is a finite alphabet, and integers <em>k</em> and <em>B</em>. The task is to partition <strong>A</strong> into <em>k</em> clusters such that the median objective of the clustering in the Hamming norm is at most <em>B</em>. Fomin, Golovach, and Panolan [ICALP 2018] proved that the problem is fixed-parameter tractable for the binary case <span><math><mi>Σ</mi><mo>=</mo><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>. We extend this algorithmic result to a popular capacitated clustering model, where in addition the sizes of the clusters are lower and upper bounded by integer parameters <em>p</em> and <em>q</em>, respectively. Our main theorem is that the problem is solvable in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>B</mi><mi>log</mi><mo>⁡</mo><mi>B</mi><mo>)</mo></mrow></msup><mo>|</mo><mi>Σ</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>B</mi></mrow></msup><mo>⋅</mo><msup><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>)</mo></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 171-194"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid recognition: Classical and parameterized computational perspectives 网格识别:经典和参数化计算视角
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.02.008
Siddharth Gupta , Guy Sa'ar , Meirav Zehavi
{"title":"Grid recognition: Classical and parameterized computational perspectives","authors":"Siddharth Gupta ,&nbsp;Guy Sa'ar ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2023.02.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.008","url":null,"abstract":"<div><p>Over the past few decades, a large body of works studied the (in)tractability of various computational problems on grid graphs, which often yield substantially faster algorithms than general graphs. Unfortunately, the recognition of a grid graph is hard—it was shown to be NP-hard already in 1987. In this paper, we provide several positive results in this regard in the framework of parameterized complexity. Specifically, our contribution is threefold. First, we show that the problem is FPT parameterized by <span><math><mi>k</mi><mo>+</mo><mrow><mi>mcc</mi></mrow></math></span> where <span><math><mi>mcc</mi></math></span> is the maximum size of a connected component of <em>G</em>. Second, we present a new parameterization, denoted <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span><span><span>, relating graph distance to </span>geometric distance. We show that the problem is para-NP-hard parameterized by </span><span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>, but FPT parameterized by <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span> on trees, as well as FPT parameterized by <span><math><mi>k</mi><mo>+</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>. Third, we show that the recognition of <span><math><mi>k</mi><mo>×</mo><mi>r</mi></math></span> grid graphs is NP-hard on graphs of pathwidth 2 where <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 17-62"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2CNF Boolean formula satisfiability problem and the linear space hypothesis 2CNF布尔公式可满足性问题与线性空间假设
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.001
Tomoyuki Yamakami
{"title":"The 2CNF Boolean formula satisfiability problem and the linear space hypothesis","authors":"Tomoyuki Yamakami","doi":"10.1016/j.jcss.2023.03.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.001","url":null,"abstract":"<div><p><span><span>We aim at investigating the solvability/insolvability of nondeterministic logarithmic-space (NL) decision, search, and optimization problems parameterized by natural size parameters using simultaneously </span>polynomial time and sub-linear space. We are particularly focused on </span><span><math><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub></math></span><span>—a restricted variant of the 2CNF Boolean (propositional) formula satisfiability problem in which each variable of a given 2CNF formula appears at most 3 times in the form of literals—parameterized by the total number </span><span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>(</mo><mi>ϕ</mi><mo>)</mo></math></span><span> of variables of each given Boolean formula </span><em>ϕ</em>. We propose a new, practical working hypothesis, called the linear space hypothesis (LSH), which asserts that <span><math><mo>(</mo><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub><mo>,</mo><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>)</mo></math></span> cannot be solved in polynomial time using only “sub-linear” space (i.e., <span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><msup><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mrow><mi>ε</mi></mrow></msup><mspace></mspace><mi>p</mi><mi>o</mi><mi>l</mi><mi>y</mi><mi>l</mi><mi>o</mi><mi>g</mi><mo>(</mo><mo>|</mo><mi>x</mi><mo>|</mo><mo>)</mo></math></span> space for a constant <span><math><mi>ε</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>) on all instances <em>x</em>. Immediate consequences of LSH include <span><math><mi>L</mi><mo>≠</mo><mrow><mi>NL</mi></mrow></math></span>, <span><math><mrow><mi>LOGDCFL</mi></mrow><mo>≠</mo><mrow><mi>LOGCFL</mi></mrow></math></span>, and <span><math><mrow><mi>SC</mi></mrow><mo>≠</mo><mrow><mi>NSC</mi></mrow></math></span>. For our investigation, we fully utilize a key notion of “short reductions”, under which the class PsubLIN of all parameterized polynomial-time sub-linear-space solvable problems is indeed closed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 88-112"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing the vertex cover number via edge contractions 通过边收缩减少顶点覆盖数
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.003
Paloma T. Lima , Vinicius F. dos Santos , Ignasi Sau , Uéverton S. Souza , Prafullkumar Tale
{"title":"Reducing the vertex cover number via edge contractions","authors":"Paloma T. Lima ,&nbsp;Vinicius F. dos Santos ,&nbsp;Ignasi Sau ,&nbsp;Uéverton S. Souza ,&nbsp;Prafullkumar Tale","doi":"10.1016/j.jcss.2023.03.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.003","url":null,"abstract":"<div><p>Given a graph <em>G</em> on <em>n</em> vertices and two integers <em>k</em> and <em>d</em>, the <span>Contraction(<span>vc</span>)</span> problem asks whether one can contract at most <em>k</em> edges to reduce the vertex cover number of <em>G</em> by at least <em>d</em>. Recently, Lima et al. [JCSS 2021] proved that <span>Contraction(<span>vc</span>)</span> admits an <span>XP</span> algorithm running in time <span><math><mi>f</mi><mo>(</mo><mi>d</mi><mo>)</mo><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msup></math></span>. They asked whether this problem is <span>FPT</span> under this parameterization. In this article, we prove that: (i) <span>Contraction(<span>vc</span>)</span> is <span>W</span>[1]-<span>hard</span> parameterized by <span><math><mi>k</mi><mo>+</mo><mi>d</mi></math></span>. Moreover, unless the <span>ETH</span> fails, the problem does not admit an algorithm running in time <span><math><mi>f</mi><mo>(</mo><mi>k</mi><mo>+</mo><mi>d</mi><mo>)</mo><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>o</mi><mo>(</mo><mi>k</mi><mo>+</mo><mi>d</mi><mo>)</mo></mrow></msup></math></span> for any function <em>f</em>. This answers negatively the open question stated in Lima et al. [JCSS 2021]. (ii) <span>Contraction(<span>vc</span>)</span> is <span>NP</span>-<span>hard</span> even when <span><math><mi>k</mi><mo>=</mo><mi>d</mi></math></span>. (iii) <span>Contraction(<span>vc</span>)</span> can be solved in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>k</mi><mo>−</mo><mi>d</mi><mo>+</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>. This improves the algorithm of Lima et al. [JCSS 2021], and shows that when <span><math><mi>k</mi><mo>=</mo><mi>d</mi></math></span>, <span>Contraction(<span>vc</span>)</span> is <span>FPT</span> parameterized by <em>d</em> (or by <em>k</em>).</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 63-87"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Galactic token sliding 银河令牌滑动
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.008
Valentin Bartier , Nicolas Bousquet , Amer E. Mouawad
{"title":"Galactic token sliding","authors":"Valentin Bartier ,&nbsp;Nicolas Bousquet ,&nbsp;Amer E. Mouawad","doi":"10.1016/j.jcss.2023.03.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.008","url":null,"abstract":"<div><p>Given a graph <em>G</em><span> and two independent sets </span><span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>s</mi></mrow></msub></math></span> and <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>t</mi></mrow></msub></math></span> of size <em>k</em>, the <span>Independent Set Reconfiguration</span> problem asks whether there exists a sequence of independent sets that transforms <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>s</mi></mrow></msub></math></span> to <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>t</mi></mrow></msub></math></span> such that each independent set is obtained from the previous one using a so-called reconfiguration step. Viewing each independent set as a collection of <em>k</em> tokens placed on the vertices of a graph <em>G</em>, the two most studied reconfiguration steps are token jumping and token sliding. Over a series of papers, it was shown that the <span>Token Jumping</span> problem is fixed-parameter tractable (for parameter <em>k</em>) when restricted to sparse graph classes, such as planar, bounded treewidth, and nowhere dense graphs. As for the <span>Token Sliding</span> problem, almost nothing is known. We remedy this situation by showing that <span>Token Sliding</span><span> is fixed-parameter tractable on graphs of bounded degree, planar graphs<span>, and chordal graphs of bounded clique number.</span></span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 220-248"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algebraic characterizations and block product decompositions for first order logic and its infinitary quantifier extensions over countable words 一阶逻辑的代数表征和块积分解及其可数词上的无限量词扩展
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.04.002
Bharat Adsul , Saptarshi Sarkar , A.V. Sreejith
{"title":"Algebraic characterizations and block product decompositions for first order logic and its infinitary quantifier extensions over countable words","authors":"Bharat Adsul ,&nbsp;Saptarshi Sarkar ,&nbsp;A.V. Sreejith","doi":"10.1016/j.jcss.2023.04.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.002","url":null,"abstract":"<div><p>We contribute to the refined understanding of language-logic-algebra interplay in a recent algebraic framework over countable words. Algebraic characterizations of the one variable fragment of FO as well as the boolean closure of the existential fragment of FO are established. We develop a seamless integration of the block product operation in the countable setting, and generalize well-known decompositional characterizations of FO and its two variable fragment. We propose an extension of FO admitting infinitary quantifiers to reason about inherent infinitary properties of countable words, and obtain a natural hierarchical block-product based characterization of this extension. Properties expressible in this extension can be simultaneously expressed in the classical logical systems such as WMSO and FO[cut]. We also rule out the possibility of a finite-basis for a block-product based characterization of these logical systems. Finally, we report algebraic characterizations of one variable fragments of the hierarchies of the new extension.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 302-326"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49752944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless IoT sensors data collection reward maximization by leveraging multiple energy- and storage-constrained UAVs 通过利用多个能量和存储受限的无人机,无线物联网传感器数据收集奖励最大化
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.103475
Francesco Betti Sorbelli , Alfredo Navarra , Lorenzo Palazzetti , Cristina M. Pinotti , Giuseppe Prencipe
{"title":"Wireless IoT sensors data collection reward maximization by leveraging multiple energy- and storage-constrained UAVs","authors":"Francesco Betti Sorbelli ,&nbsp;Alfredo Navarra ,&nbsp;Lorenzo Palazzetti ,&nbsp;Cristina M. Pinotti ,&nbsp;Giuseppe Prencipe","doi":"10.1016/j.jcss.2023.103475","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103475","url":null,"abstract":"<div><p>We consider Internet of Things (IoT) sensors deployed inside an area to be monitored. Drones can be used to collect the data from the sensors, but they are constrained in energy and storage. Therefore, all drones need to select a subset of sensors whose data are the most relevant to be acquired, modeled by assigning a reward. We present an optimization problem called <em>Multiple-drone Data-collection Maximization Problem</em> (<span>MDMP</span>) whose objective is to plan a set of drones' missions aimed at maximizing the overall reward from the collected data, and such that each individual drone's mission energy cost and total collected data are within the energy and storage limits, respectively. We optimally solve <span>MDMP</span> by proposing an Integer Linear Programming based algorithm. Since <span>MDMP</span> is <em>NP</em>-hard, we devise suboptimal algorithms for single- and multiple-drone scenarios. Finally, we thoroughly evaluate our algorithms on the basis of random generated synthetic data.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"139 ","pages":"Article 103475"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addition machines, automatic functions and open problems of Floyd and Knuth 加法机,自动功能和Floyd和Knuth的开放问题
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.04.003
Sanjay Jain , Xiaodong Jia , Ammar Fathin Sabili , Frank Stephan
{"title":"Addition machines, automatic functions and open problems of Floyd and Knuth","authors":"Sanjay Jain ,&nbsp;Xiaodong Jia ,&nbsp;Ammar Fathin Sabili ,&nbsp;Frank Stephan","doi":"10.1016/j.jcss.2023.04.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.003","url":null,"abstract":"<div><p>Floyd and Knuth investigated in 1990 register machines which can add, subtract and compare integers as primitive operations. They asked whether their current bound on the number of registers for multiplying and dividing fast (running in time linear in the size of the input) can be improved and whether one can output fast the powers of two summing up to a positive integer in subquadratic time. Both questions are answered positively. Furthermore, it is shown that every function computed by only one register is automatic and that the automatic functions with one input can be computed with four registers in linear time; automatic functions with a larger number of inputs can be computed with 5 registers in linear time. There is a nonautomatic function with one input which can be computed with two registers in linear time.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 135-156"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信