Christian Biefel, Martina Kuchlbauer, Frauke Liers, Lisa Waldmüller
{"title":"Robust static and dynamic maximum flows","authors":"Christian Biefel, Martina Kuchlbauer, Frauke Liers, Lisa Waldmüller","doi":"10.1007/s10878-025-01298-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01298-z","url":null,"abstract":"<p>We study the robust maximum flow problem and the robust maximum flow over time problem where a given number of arcs <span>(Gamma )</span> may fail or may be delayed. Two prominent models have been introduced for these problems: either one assigns flow to arcs fulfilling weak flow conservation in any scenario, or one assigns flow to paths where an arc failure or delay affects a whole path. We provide a unifying framework by presenting novel general models, in which we assign flow to subpaths. These models contain the known models as special cases and unify their advantages in order to obtain less conservative robust solutions.</p><p>We give a thorough analysis with respect to complexity of the general models. In particular, we show that the general models are essentially NP-hard, whereas, e.g., in the static case with <span>(Gamma =1)</span> an optimal solution can be computed in polynomial time. Further, we answer the open question about the complexity of the dynamic path model for <span>(Gamma =1)</span>. We also compare the solution quality of the different models. In detail, we show that the general models have better robust optimal values than the known models and we prove bounds on these gaps.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144133661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximating the maximum weight cycle/path partition in graphs with weights one and two","authors":"Xinmeng Guo, Wei Yu, Zhaohui Liu","doi":"10.1007/s10878-025-01322-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01322-2","url":null,"abstract":"<p>In this paper, we investigate the maximum weight <i>k</i>-cycle (<i>k</i>-path) partition problem (MaxWkCP/MaxWkPP for short). The input consists of an undirected complete graph <span>(G=(V,E))</span> with <span>(|V|=kn)</span>, where <i>k</i>, <i>n</i> are positive integers, and a non-negative weight function on <i>E</i>, the objective is to determine <i>n</i> vertex disjoint <i>k</i>-cycles (<i>k</i>-paths), which are cycles (paths) containing exactly <i>k</i> vertices, covering all the vertices such that the total edge weight of these cycles (paths) is as large as possible. We propose improved approximation algorithms for the MaxWkCP/MaxWkPP in graphs with weights one and two. For the MaxWkCP in graphs with weights one and two, we obtain an approximation algorithm having an approximation ratio of <span>(frac{37}{48})</span> for <span>(k=6)</span>, which improves upon the best available <span>(frac{91}{120})</span>-approximation algorithm by Zhao and Xiao 2024a. When <span>(k=4)</span>, we show that the same algorithm is a <span>(frac{7}{8})</span>-approximation algorithm and give a tight example. This ratio ties with the state-of-the-art result, also given by Zhao and Xiao 2024a. However, we demonstrate that our algorithm can be applied to the minimization variant of MaxWkCP in graphs with weights one and two and achieve a tight approximation ratio of <span>(frac{5}{4})</span>. For the MaxW5PP in graphs with weights one and two, we devise a novel <span>(frac{19}{24})</span>-approximation algorithm by combining two separate algorithms, each of which handles one of the two complementary scenarios of the optimal solution well. This ratio is better than the previous best ratio of <span>(frac{3}{4})</span> due to Li and Yu 2023.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"2 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On some path-critical Ramsey numbers","authors":"Ye Wang, Yanyan Song","doi":"10.1007/s10878-025-01312-4","DOIUrl":"https://doi.org/10.1007/s10878-025-01312-4","url":null,"abstract":"<p>For graphs <i>G</i> and <i>H</i>, the Ramsey number <i>R</i>(<i>G</i>, <i>H</i>) is the smallest <i>r</i> such that any red-blue edge coloring of <span>(K_r)</span> contains a red <i>G</i> or a blue <i>H</i>. The path-critical Ramsey number <span>(R_{pi }(G,H))</span> is the largest <i>n</i> such that any red-blue edge coloring of <span>(K_r setminus P_{n})</span> contains a red <i>G</i> or a blue <i>H</i>, where <span>(r=R(G,H))</span> and <span>(P_{n})</span> is a path of order <i>n</i>. In this note, we show a general upper bound for <span>(R_{pi }(G,H))</span>, and determine the exact values for some cases of <span>(R_{pi }(G,H))</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sathya, V. Mareeswari, M. Jeyaselvi, A. Solairaj
{"title":"Smart health system with deep kronecker network-based key generation for privacy-aware aggregate authentication and access control in IoT","authors":"M. Sathya, V. Mareeswari, M. Jeyaselvi, A. Solairaj","doi":"10.1007/s10878-025-01303-5","DOIUrl":"https://doi.org/10.1007/s10878-025-01303-5","url":null,"abstract":"<p>The Internet of Things (IoT) application is an application and service that incorporates both the physical and information world. Similarly, it is difficult for existing health systems to provide privacy-aware aggregate authentication and fine-grained access control. To bridge the concern, a smart health system (SHS) with Deep Kronecker Network_key generation (DKN_keyGen) for privacy-aware aggregate authentication and access control in IoT is implemented. Here, entities employed for this model such as data owner (DO), registration center (RC), data user (DU) and cloud service provider (CSP). The method follows four steps, such as system initialization, user registration, Health data outsourcing and Health data access. Initially, the RC needs to initialize the security parameters, random parameters and public keys. After that, DO and DU must be registered in RC. Moreover, the smart health care data of DO generates the secret parameter and also obtains the secret parameter from the RC. The cloud storage stores and manages health care data in the health data outsourcing step. Finally, for health data access, the user gives appropriate parameters and access to the data which is implemented in the data access phase. The model is established considering different security functionalities including Encryption, ECC, XoR and hashing function. Here, the key is generated using DKN. The proposed model obtained a minimum computation time of 6.857 s, memory usage of 30 MB, and communication cost of 20.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"48 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su
{"title":"Improved approximation algorithms for multiprocessor indivisible coflow scheduling","authors":"Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su","doi":"10.1007/s10878-025-01325-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01325-z","url":null,"abstract":"<p>Coflow scheduling is a challenging optimization problem that underlies many data transmission and parallel computing applications. In this paper, we study the <i>indivisible</i> coflow scheduling problem on parallel identical machines with the objective to minimize the makespan, i.e., the completion time of the last flow. In our problem setting, the number of the input/output ports in each machine is a fixed constant, each port has a unit capacity, and all the flows inside a coflow should be scheduled on the same machine. We present a <span>((2 + epsilon ))</span>-approximation algorithm for the problem, for any <span>(epsilon > 0)</span>, in which the number of machines can be either a fixed constant or part of the input.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"133 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil
{"title":"ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration","authors":"Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil","doi":"10.1007/s10878-025-01306-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01306-2","url":null,"abstract":"<p>In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"47 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The influence of carbon sink trading on carbon emission reduction in agricultural supply chains","authors":"Tingting Meng, Yukun Cheng, Xujin Pu, Rui Li","doi":"10.1007/s10878-025-01316-0","DOIUrl":"https://doi.org/10.1007/s10878-025-01316-0","url":null,"abstract":"<p>As global climate change intensifies, the agricultural sector, responsible for over 30% of global greenhouse gas emissions, faces an urgent imperative to mitigate emissions and align with international climate commitments. Carbon sink trading, a market-based mechanism that incentivizes emission reductions through sequestration credits, has emerged as an important tool for accelerating carbon peaking and neutrality goals. This study investigates the influence of carbon sink trading on the strategic interactions between farmers and retailers in agricultural supply chains. Employing differential game theory, we construct three cooperative models: decentralized, Stackelberg leader-follower, and centralized, and derive equilibrium strategies for each using the Hamilton-Jacobi-Bellman framework. Through numerical simulations, we evaluate the influence of carbon sink trading on the emission reduction efforts of farmers and retailers, the extent of emission reductions in the supply chain, and the overall profits. Comparative analysis against baseline scenarios without carbon trading reveals that the integration of carbon sink markets enhances profit margins across all models and improves the level of emission reduction in the agricultural supply chain. In addition, our results show that the centralized model outperforms other configurations, followed by the Stackelberg model, with the decentralized model exhibiting the least effectiveness. These findings provide actionable insights for policymakers and supply chain managers to design carbon trading frameworks that harmonize economic incentives with ecological sustainability.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"40 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An exponential cone integer programming and piece-wise linear approximation approach for 0-1 fractional programming","authors":"Hoang Giang Pham, Thuy Anh Ta, Tien Mai","doi":"10.1007/s10878-025-01318-y","DOIUrl":"https://doi.org/10.1007/s10878-025-01318-y","url":null,"abstract":"<p>We study a class of binary fractional programs commonly encountered in important application domains such as assortment optimization and facility location. These problems are known to be NP-hard to approximate within any constant factor, and existing solution approaches typically rely on mixed-integer linear programming or second-order cone programming reformulations. These methods often utilize linearization techniques (e.g., big-M or McCormick inequalities), which can result in weak continuous relaxations. In this work, we propose a novel approach based on an exponential cone reformulation combined with piecewise linear approximation. This allows the problem to be solved efficiently using standard cutting-plane or branch-and-cut procedures. We further provide a theoretical analysis of the approximation quality yielded by our reformulation and discuss strategies for optimizing the problem size of the exponential cone formulation. Experiments on instances of various sizes demonstrate that our approach delivers competitive performance on small and medium instances while offering superior performance on large instances compared to state-of-the-art baselines.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"19 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu
{"title":"Approximation algorithms for the partition set cover problem with penalties","authors":"Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu","doi":"10.1007/s10878-025-01317-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01317-z","url":null,"abstract":"<p>In this paper, we consider the partition set cover problem with penalties. In this problem, we have a universe <i>U</i>, a partition <span>(mathscr {P}={P_{1},ldots ,P_{r}})</span> of <i>U</i>, and a collection <span>(mathscr {S}={S_{1},ldots ,S_{m}})</span> of nonempty subsets of <i>U</i> satisfying <span>(bigcup _{S_iin mathscr {S}} S_i=U)</span>. In addition, each <span>(P_t)</span> <span>((tin [r]))</span> is associated with a covering requirement <span>(k_t)</span> as well as a penalty <span>(pi _t)</span>, and each <span>(S_i)</span> <span>((iin [m]))</span> is associated with a cost. A class <span>(P_t)</span> attains its covering requirement by a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> if at least <span>(k_t)</span> elements in <span>(P_t)</span> are contained in <span>(bigcup _{S_iin mathscr {A}} S_i)</span>. Each <span>(P_t)</span> is either attaining its covering requirement or paid with its penalty. The objective is to find a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> such that the sum of the cost of <span>(mathscr {A})</span> and the penalties of classes not attaining covering requirements by <span>(mathscr {A})</span> is minimized. We present two approximation algorithms for this problem. The first is based on the LP-rounding technique with approximation ratio <span>(K+O(beta +ln r))</span>, where <span>(K=max _{tin [r]}k_t)</span>, and <span>(beta )</span> denotes the approximation guarantee for a related set cover instance obtained by rounding the standard LP. The second is based on the primal-dual method with approximation ratio <i>lf</i>, where <span>(f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|)</span> and <span>(l=max _{tin [r]}|P_t|)</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"32 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qinqin Gong, Ling Gai, Yanjun Jiang, Yang Lv, Ruiqi Yang
{"title":"Approximating combinatorial contracts with a cardinality constraint","authors":"Qinqin Gong, Ling Gai, Yanjun Jiang, Yang Lv, Ruiqi Yang","doi":"10.1007/s10878-025-01307-1","DOIUrl":"https://doi.org/10.1007/s10878-025-01307-1","url":null,"abstract":"<p>We explore the problem of combinatorial contract design, a subject introduced and studied by Dütting et al. (2023). Previous research has focused on the challenge of selecting an unconstrained subset of agents, particularly when the principal’s utility function exhibits XOS or submodular characteristics related to the subset of agents that exert effort. Our study extends this existing line of research by examining scenarios in which the principal aims to select a subset of agents with a specific <i>k</i>-cardinality constraint. In these scenarios, the actions that each agent can take are binary values: effort or no effort. We focus on linear contracts, where the expected reward function is XOS or submodular. Our contribution is an approximation of 0.0197 for the problem of designing multi-agent hidden-action principal-agent contracts with the <i>k</i>-cardinality constraint. This result stands in contrast to the unconstrained setting, where Dütting et al. (2023) achieved an approximation of nearly 0.0039.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"44 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}