Journal of Computer and System Sciences最新文献

筛选
英文 中文
Serial and parallel kernelization of Multiple Hitting Set parameterized by the Dilworth number, implemented on the GPU 以Dilworth数为参数的多命中集的串行和并行核化,在GPU上实现
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-12 DOI: 10.1016/j.jcss.2023.103479
René van Bevern , Artem M. Kirilin , Daniel A. Skachkov , Pavel V. Smirnov , Oxana Yu. Tsidulko
{"title":"Serial and parallel kernelization of Multiple Hitting Set parameterized by the Dilworth number, implemented on the GPU","authors":"René van Bevern ,&nbsp;Artem M. Kirilin ,&nbsp;Daniel A. Skachkov ,&nbsp;Pavel V. Smirnov ,&nbsp;Oxana Yu. Tsidulko","doi":"10.1016/j.jcss.2023.103479","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103479","url":null,"abstract":"<div><p>The NP-hard Multiple Hitting Set problem is the problem of finding a minimum-cardinality set intersecting each of the sets in a given input collection a given number of times. Generalizing a well-known data reduction<span> algorithm due to Weihe, we show a problem kernel for Multiple Hitting Set parameterized by the Dilworth number, a graph parameter introduced by Foldes and Hammer in 1978 yet seemingly so far unexplored in the context of parameterized complexity theory. Using matrix multiplication, we speed up the algorithm to quadratic sequential time and logarithmic parallel time. We experimentally evaluate our algorithms. By implementing our algorithm on GPUs, we show the feasibility of realizing kernelization algorithms on SIMD (Single Instruction, Multiple Data) architectures.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"139 ","pages":"Article 103479"},"PeriodicalIF":1.1,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From symmetry to asymmetry: Generalizing TSP approximations by parametrization 从对称到不对称:用参数化推广TSP近似
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.007
Lukas Behrendt , Katrin Casel , Tobias Friedrich , J.A. Gregor Lagodzinski , Alexander Löser , Marcus Wilhelm
{"title":"From symmetry to asymmetry: Generalizing TSP approximations by parametrization","authors":"Lukas Behrendt ,&nbsp;Katrin Casel ,&nbsp;Tobias Friedrich ,&nbsp;J.A. Gregor Lagodzinski ,&nbsp;Alexander Löser ,&nbsp;Marcus Wilhelm","doi":"10.1016/j.jcss.2023.03.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.007","url":null,"abstract":"<div><p><span>We generalize the tree doubling and Christofides algorithm to parameterized approximations for ATSP (constant factor approximations that invest more runtime with respect to a chosen parameter). The parameters we consider are upper bounded by the number of </span><em>asymmetric distances</em><span>, which yields algorithms to efficiently compute good approximations for moderately asymmetric TSP instances. As generalization of the Christofides algorithm, we derive a parameterized 2.5-approximation, with the size of a vertex cover for the subgraph induced by the edges with asymmetric distances as parameter. Our generalization of tree doubling gives a parameterized 3-approximation, where the parameter is the minimum number of asymmetric distances in a minimum spanning arborescence. Further, we combine these with a notion of symmetry relaxation which allows to trade approximation guarantee for runtime. Since the parameters we consider are theoretically incomparable, we present experimental results showing that generalized tree doubling frequently outperforms generalized Christofides with respect to parameter size.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 157-170"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronizing Boolean networks asynchronously 异步同步布尔网络
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.04.001
Julio Aracena , Adrien Richard , Lilian Salinas
{"title":"Synchronizing Boolean networks asynchronously","authors":"Julio Aracena ,&nbsp;Adrien Richard ,&nbsp;Lilian Salinas","doi":"10.1016/j.jcss.2023.04.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.001","url":null,"abstract":"<div><p>The <span><em>asynchronous </em><em>automaton</em></span> of a Boolean network <span><math><mi>f</mi><mo>:</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup><mo>→</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span><span>, considered in many applications, is the finite deterministic automaton where the set of states is </span><span><math><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span>, the alphabet is <span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span>, and the action of letter <em>i</em> on a state <em>x</em> consists in either switching the <em>i</em>th component if <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>(</mo><mi>x</mi><mo>)</mo><mo>≠</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span> or doing nothing otherwise. In this paper, we ask for the existence of synchronizing words for this automaton, and their minimal length, when <em>f</em><span> is the and-net over an arc-signed digraph </span><em>G</em> on <span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span>: for every <span><math><mi>i</mi><mo>∈</mo><mo>[</mo><mi>n</mi><mo>]</mo></math></span>, <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>(</mo><mi>x</mi><mo>)</mo><mo>=</mo><mn>1</mn></math></span> if and only if <span><math><msub><mrow><mi>x</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>=</mo><mn>1</mn></math></span> (<span><math><msub><mrow><mi>x</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>≠</mo><mn>0</mn></math></span>) for every positive (negative) arc from <em>j</em> to <em>i</em>. Our main result is that if <em>G</em> is strongly connected and has no positive cycles, then either there exists a synchronizing word of length at most <span><math><mn>10</mn><msup><mrow><mo>(</mo><msqrt><mrow><mn>5</mn></mrow></msqrt><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span> or <em>G</em> is a cycle and there are no synchronizing words. We also give complexity results showing that the situation is much more complex if one of the two hypothesis made on <em>G</em> is removed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 249-279"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markov chains and unambiguous automata 马尔可夫链和无二义自动机
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.005
Christel Baier , Stefan Kiefer , Joachim Klein , David Müller , James Worrell
{"title":"Markov chains and unambiguous automata","authors":"Christel Baier ,&nbsp;Stefan Kiefer ,&nbsp;Joachim Klein ,&nbsp;David Müller ,&nbsp;James Worrell","doi":"10.1016/j.jcss.2023.03.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.005","url":null,"abstract":"<div><p>Unambiguous automata are nondeterministic automata in which every word has at most one accepting run. In this paper we give a polynomial-time algorithm for model checking discrete-time Markov chains against <em>ω</em>-regular specifications represented as unambiguous automata. We furthermore show that the complexity of this model checking problem lies in NC: the subclass of P comprising those problems solvable in poly-logarithmic parallel time. These complexity bounds match the known bounds for model checking Markov chains against specifications given as deterministic automata, notwithstanding the fact that unambiguous automata can be exponentially more succinct than deterministic automata. We report on an implementation of our procedure, including an experiment in which the implementation is used to model check LTL formulas on Markov chains.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 113-134"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complexity of verification in self-assembly with prebuilt assemblies 预组装自组装验证的复杂性
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.002
David Caballero , Timothy Gomez , Robert Schweller , Tim Wylie
{"title":"Complexity of verification in self-assembly with prebuilt assemblies","authors":"David Caballero ,&nbsp;Timothy Gomez ,&nbsp;Robert Schweller ,&nbsp;Tim Wylie","doi":"10.1016/j.jcss.2023.03.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.002","url":null,"abstract":"<div><p><span>We analyze the complexity of two fundamental verification problems within a generalization of the two-handed tile self-assembly model (2HAM) where initial system assemblies are not restricted to be singleton tiles, but may be larger prebuilt assemblies. Within this model we consider the </span><em>producibility</em> problem, which asks if a given tile system builds, or produces, a given assembly, and the <em>unique assembly verification</em> (UAV) problem, which asks if a given system <em>uniquely</em> produces a given assembly. We show that producibility is NP-complete and UAV is coNP<span><math><msup><mrow></mrow><mrow><mi>N</mi><mi>P</mi></mrow></msup></math></span><span>-complete even when the initial assembly size and temperature threshold are both bounded by a constant. This is in stark contrast to results in the standard model with singleton input tiles where producibility is in P and UAV is coNP-complete with constant temperature. We further provide preliminary polynomial time results for producibility and UAV in the case of 1-dimensional </span><em>linear</em> assemblies with pre-built assemblies, as well as extend our results to the abstract Tile Assembly Model (aTAM) with constant-size attachable assemblies.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 1-16"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49752946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controlling entity integrity with key sets 用键集控制实体完整性
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.04.004
Miika Hannula , Xinyi Li , Sebastian Link
{"title":"Controlling entity integrity with key sets","authors":"Miika Hannula ,&nbsp;Xinyi Li ,&nbsp;Sebastian Link","doi":"10.1016/j.jcss.2023.04.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.004","url":null,"abstract":"<div><p><span>Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its </span><span>coNP</span><span><span>-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and </span>computational complexity for the implication problem of key sets combined with </span><span>NOT NULL</span> constraints.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 195-219"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes 对分散图类的删除II -改进的FPT算法对图类的删除
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.004
Ashwin Jacob , Diptapriyo Majumdar , Venkatesh Raman
{"title":"Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes","authors":"Ashwin Jacob ,&nbsp;Diptapriyo Majumdar ,&nbsp;Venkatesh Raman","doi":"10.1016/j.jcss.2023.03.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.004","url":null,"abstract":"<div><p>The problem of deletion of vertices to a hereditary graph class is a well-studied problem in parameterized complexity. Recently, a natural extension of the problem was initiated where we are given a finite set of hereditary graph classes and we determine whether <em>k</em> vertices can be deleted from a given graph so that the connected components of the resulting graph belong to one of the given hereditary graph classes. The problem is shown to be fixed parameter tractable (FPT) when the deletion problem to each of the given hereditary graph classes is fixed-parameter tractable, and the property of being in any of the graph classes is expressible in the counting monodic second order (CMSO) logic. This paper focuses on pairs of specific graph classes (<span><math><msub><mrow><mi>Π</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span><span>) in which we would like the connected components of the resulting graph to belong to, and design simpler and more efficient FPT algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 280-301"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parameterized complexity of categorical clustering with size constraints 具有大小约束的分类聚类的参数化复杂度
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.006
Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit
{"title":"Parameterized complexity of categorical clustering with size constraints","authors":"Fedor V. Fomin,&nbsp;Petr A. Golovach,&nbsp;Nidhi Purohit","doi":"10.1016/j.jcss.2023.03.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.006","url":null,"abstract":"<div><p>In the <span>Categorical Clustering</span> problem, we are given a set of vectors (matrix) <span><math><mi>A</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> over <span><math><msup><mrow><mi>Σ</mi></mrow><mrow><mi>m</mi></mrow></msup></math></span>, where Σ is a finite alphabet, and integers <em>k</em> and <em>B</em>. The task is to partition <strong>A</strong> into <em>k</em> clusters such that the median objective of the clustering in the Hamming norm is at most <em>B</em>. Fomin, Golovach, and Panolan [ICALP 2018] proved that the problem is fixed-parameter tractable for the binary case <span><math><mi>Σ</mi><mo>=</mo><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>. We extend this algorithmic result to a popular capacitated clustering model, where in addition the sizes of the clusters are lower and upper bounded by integer parameters <em>p</em> and <em>q</em>, respectively. Our main theorem is that the problem is solvable in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>B</mi><mi>log</mi><mo>⁡</mo><mi>B</mi><mo>)</mo></mrow></msup><mo>|</mo><mi>Σ</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>B</mi></mrow></msup><mo>⋅</mo><msup><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>)</mo></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 171-194"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid recognition: Classical and parameterized computational perspectives 网格识别:经典和参数化计算视角
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.02.008
Siddharth Gupta , Guy Sa'ar , Meirav Zehavi
{"title":"Grid recognition: Classical and parameterized computational perspectives","authors":"Siddharth Gupta ,&nbsp;Guy Sa'ar ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2023.02.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.008","url":null,"abstract":"<div><p>Over the past few decades, a large body of works studied the (in)tractability of various computational problems on grid graphs, which often yield substantially faster algorithms than general graphs. Unfortunately, the recognition of a grid graph is hard—it was shown to be NP-hard already in 1987. In this paper, we provide several positive results in this regard in the framework of parameterized complexity. Specifically, our contribution is threefold. First, we show that the problem is FPT parameterized by <span><math><mi>k</mi><mo>+</mo><mrow><mi>mcc</mi></mrow></math></span> where <span><math><mi>mcc</mi></math></span> is the maximum size of a connected component of <em>G</em>. Second, we present a new parameterization, denoted <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span><span><span>, relating graph distance to </span>geometric distance. We show that the problem is para-NP-hard parameterized by </span><span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>, but FPT parameterized by <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span> on trees, as well as FPT parameterized by <span><math><mi>k</mi><mo>+</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>. Third, we show that the recognition of <span><math><mi>k</mi><mo>×</mo><mi>r</mi></math></span> grid graphs is NP-hard on graphs of pathwidth 2 where <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 17-62"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2CNF Boolean formula satisfiability problem and the linear space hypothesis 2CNF布尔公式可满足性问题与线性空间假设
IF 1.1 3区 计算机科学
Journal of Computer and System Sciences Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.001
Tomoyuki Yamakami
{"title":"The 2CNF Boolean formula satisfiability problem and the linear space hypothesis","authors":"Tomoyuki Yamakami","doi":"10.1016/j.jcss.2023.03.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.001","url":null,"abstract":"<div><p><span><span>We aim at investigating the solvability/insolvability of nondeterministic logarithmic-space (NL) decision, search, and optimization problems parameterized by natural size parameters using simultaneously </span>polynomial time and sub-linear space. We are particularly focused on </span><span><math><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub></math></span><span>—a restricted variant of the 2CNF Boolean (propositional) formula satisfiability problem in which each variable of a given 2CNF formula appears at most 3 times in the form of literals—parameterized by the total number </span><span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>(</mo><mi>ϕ</mi><mo>)</mo></math></span><span> of variables of each given Boolean formula </span><em>ϕ</em>. We propose a new, practical working hypothesis, called the linear space hypothesis (LSH), which asserts that <span><math><mo>(</mo><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub><mo>,</mo><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>)</mo></math></span> cannot be solved in polynomial time using only “sub-linear” space (i.e., <span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><msup><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mrow><mi>ε</mi></mrow></msup><mspace></mspace><mi>p</mi><mi>o</mi><mi>l</mi><mi>y</mi><mi>l</mi><mi>o</mi><mi>g</mi><mo>(</mo><mo>|</mo><mi>x</mi><mo>|</mo><mo>)</mo></math></span> space for a constant <span><math><mi>ε</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>) on all instances <em>x</em>. Immediate consequences of LSH include <span><math><mi>L</mi><mo>≠</mo><mrow><mi>NL</mi></mrow></math></span>, <span><math><mrow><mi>LOGDCFL</mi></mrow><mo>≠</mo><mrow><mi>LOGCFL</mi></mrow></math></span>, and <span><math><mrow><mi>SC</mi></mrow><mo>≠</mo><mrow><mi>NSC</mi></mrow></math></span>. For our investigation, we fully utilize a key notion of “short reductions”, under which the class PsubLIN of all parameterized polynomial-time sub-linear-space solvable problems is indeed closed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 88-112"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信