Algorithmica最新文献

筛选
英文 中文
Better Hardness Results for the Minimum Spanning Tree Congestion Problem 最小生成树拥塞问题的更好的硬度结果
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-10-26 DOI: 10.1007/s00453-024-01278-5
Huong Luu, Marek Chrobak
{"title":"Better Hardness Results for the Minimum Spanning Tree Congestion Problem","authors":"Huong Luu,&nbsp;Marek Chrobak","doi":"10.1007/s00453-024-01278-5","DOIUrl":"10.1007/s00453-024-01278-5","url":null,"abstract":"<div><p>In the spanning tree congestion problem, given a connected graph <i>G</i>, the objective is to compute a spanning tree <i>T</i> in <i>G</i> that minimizes its maximum edge congestion, where the congestion of an edge <i>e</i> of <i>T</i> is the number of edges in <i>G</i> for which the unique path in <i>T</i> between their endpoints traverses <i>e</i>. The problem is known to be <span>(mathbb{N}mathbb{P})</span>-hard, but its approximability is still poorly understood, and it is not even known whether the optimum solution can be efficiently approximated with ratio <i>o</i>(<i>n</i>). In the decision version of this problem, denoted <span>({varvec{K}-textsf {STC}})</span>, we need to determine if <i>G</i> has a spanning tree with congestion at most <i>K</i>. It is known that <span>({varvec{K}-textsf {STC}})</span> is <span>(mathbb{N}mathbb{P})</span>-complete for <span>(Kge 8)</span>, and this implies a lower bound of 1.125 on the approximation ratio of minimizing congestion. On the other hand, <span>({varvec{3}-textsf {STC}})</span> can be solved in polynomial time, with the complexity status of this problem for <span>(Kin { left{ 4,5,6,7 right} })</span> remaining an open problem. We substantially improve the earlier hardness results by proving that <span>({varvec{K}-textsf {STC}})</span> is <span>(mathbb{N}mathbb{P})</span>-complete for <span>(Kge 5)</span>. This leaves only the case <span>(K=4)</span> open, and improves the lower bound on the approximation ratio to 1.2. Motivated by evidence that minimizing congestion is hard even for graphs of small constant radius, we also consider <span>({varvec{K}-textsf {STC}})</span> restricted to graphs of radius 2, and we prove that this variant is <span>(mathbb{N}mathbb{P})</span>-complete for all <span>(Kge 6)</span>. \u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"148 - 165"},"PeriodicalIF":0.9,"publicationDate":"2024-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01278-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Euclidean Maximum Matchings in the Plane—Local to Global 局部到全局平面的欧几里得最大匹配
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-10-19 DOI: 10.1007/s00453-024-01279-4
Ahmad Biniaz, Anil Maheshwari, Michiel Smid
{"title":"Euclidean Maximum Matchings in the Plane—Local to Global","authors":"Ahmad Biniaz,&nbsp;Anil Maheshwari,&nbsp;Michiel Smid","doi":"10.1007/s00453-024-01279-4","DOIUrl":"10.1007/s00453-024-01279-4","url":null,"abstract":"<div><p>Let <i>M</i> be a perfect matching on a set of points in the plane where every edge is a line segment between two points. We say that <i>M</i> is <i>globally maximum</i> if it is a maximum-length matching on all points. We say that <i>M</i> is <i>k</i>-<i>local maximum</i> if for any subset <span>(M'={a_1b_1,dots ,a_kb_k})</span> of <i>k</i> edges of <i>M</i> it holds that <span>(M')</span> is a maximum-length matching on points <span>({a_1,b_1,dots ,a_k,b_k})</span>. We show that local maximum matchings are good approximations of global ones. Let <span>(mu _k)</span> be the infimum ratio of the length of any <i>k</i>-local maximum matching to the length of any global maximum matching, over all finite point sets in the Euclidean plane. It is known that <span>(mu _kgeqslant frac{k-1}{k})</span> for any <span>(kgeqslant 2)</span>. We show the following improved bounds for <span>(kin {2,3})</span>: <span>(sqrt{3/7}leqslant mu _2&lt; 0.93 )</span> and <span>(sqrt{3}/2leqslant mu _3&lt; 0.98)</span>. We also show that every pairwise crossing matching is unique and it is globally maximum. Towards our proof of the lower bound for <span>(mu _2)</span> we show the following result which is of independent interest: If we increase the radii of pairwise intersecting disks by factor <span>(2/sqrt{3})</span>, then the resulting disks have a common intersection.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"132 - 147"},"PeriodicalIF":0.9,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Paging with Heterogeneous Cache Slots 异构缓存槽的在线分页
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-10-17 DOI: 10.1007/s00453-024-01270-z
Marek Chrobak, Samuel Haney, Mehraneh Liaee, Debmalya Panigrahi, Rajmohan Rajaraman, Ravi Sundaram, Neal E. Young
{"title":"Online Paging with Heterogeneous Cache Slots","authors":"Marek Chrobak,&nbsp;Samuel Haney,&nbsp;Mehraneh Liaee,&nbsp;Debmalya Panigrahi,&nbsp;Rajmohan Rajaraman,&nbsp;Ravi Sundaram,&nbsp;Neal E. Young","doi":"10.1007/s00453-024-01270-z","DOIUrl":"10.1007/s00453-024-01270-z","url":null,"abstract":"<div><p>It is natural to generalize the online <span>(k)</span>-Server problem by allowing each request to specify not only a point <i>p</i>, but also a subset <i>S</i> of servers that may serve it. To date, only a few special cases of this problem have been studied. The objective of the work presented in this paper has been to more systematically explore this generalization in the case of uniform and star metrics. For uniform metrics, the problem is equivalent to a generalization of Paging in which each request specifies not only a page <i>p</i>, but also a subset <i>S</i> of cache slots, and is satisfied by having a copy of <i>p</i> in some slot in <i>S</i>. We call this problem <i>Slot-Heterogenous Paging</i>. In realistic settings only certain subsets of cache slots or servers would appear in requests. Therefore we parameterize the problem by specifying a family <span>({mathcal {S}}subseteq 2^{[k]})</span> of requestable slot sets, and we establish bounds on the competitive ratio as a function of the cache size <i>k</i> and family <span>({mathcal {S}})</span>:</p><ul>\u0000 <li>\u0000 <p>If all request sets are allowed (<span>({mathcal {S}}=2^{[k]}setminus {emptyset })</span>), the optimal deterministic and randomized competitive ratios are exponentially worse than for standard Paging (<span>({mathcal {S}}={[k]})</span>).</p>\u0000 </li>\u0000 <li>\u0000 <p>As a function of <span>(|{mathcal {S}}|)</span> and <i>k</i>, the optimal deterministic ratio is polynomial: at most <span>(O(k^2|{mathcal {S}}|))</span> and at least <span>(Omega (sqrt{|{mathcal {S}}|}))</span>.</p>\u0000 </li>\u0000 <li>\u0000 <p>For any laminar family <span>({mathcal {S}})</span> of height <i>h</i>, the optimal ratios are <i>O</i>(<i>hk</i>) (deterministic) and <span>(O(h^2log k))</span> (randomized).</p>\u0000 </li>\u0000 <li>\u0000 <p>The special case of laminar <span>({mathcal {S}})</span> that we call <i>All-or-One Paging</i> extends standard Paging by allowing each request to specify a specific slot to put the requested page in. The optimal deterministic ratio for <i>weighted</i> All-or-One Paging is <span>(Theta (k))</span>. Offline All-or-One Paging is <span>(mathbb{N}mathbb{P})</span>-hard.</p>\u0000 </li>\u0000 </ul><p> Some results for the laminar case are shown via a reduction to the generalization of Paging in which each request specifies a set <span>(P)</span> of <i>pages</i>, and is satisfied by fetching any page from <span>(P)</span> into the cache. The optimal ratios for the latter problem (with laminar family of height <i>h</i>) are at most <i>hk</i> (deterministic) and <span>(hH_k)</span> (randomized).</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"89 - 131"},"PeriodicalIF":0.9,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01270-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anti-factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard) 反因子是由树宽和列表大小参数化的FPT(但计数很难)
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-10-15 DOI: 10.1007/s00453-024-01265-w
Dániel Marx, Govind S. Sankar, Philipp Schepper
{"title":"Anti-factor is FPT Parameterized by Treewidth and List Size (but Counting is Hard)","authors":"Dániel Marx,&nbsp;Govind S. Sankar,&nbsp;Philipp Schepper","doi":"10.1007/s00453-024-01265-w","DOIUrl":"10.1007/s00453-024-01265-w","url":null,"abstract":"<div><p>In the general <span>AntiFactor</span> problem, a graph <i>G</i> and, for every vertex <i>v</i> of <i>G</i>, a set <span>(X_vsubseteq {mathbb {N}})</span> of forbidden degrees is given. The task is to find a set <i>S</i> of edges such that the degree of <i>v</i> in <i>S</i> is <i>not</i> in the set <span>(X_v)</span>. Standard techniques (dynamic programming plus fast convolution) can be used to show that if <i>M</i> is the largest forbidden degree, then the problem can be solved in time <span>((M+2)^{{operatorname {tw}}}cdot n^{{mathcal {O}}(1)})</span> if a tree decomposition of width <span>({operatorname {tw}})</span> is given. However, significantly faster algorithms are possible if the sets <span>(X_v)</span> are sparse: our main algorithmic result shows that if every vertex has at most <span>(x)</span> forbidden degrees (we call this special case <span>AntiFactor</span><sub>x</sub>), then the problem can be solved in time <span>((x+1)^{{mathcal {O}}({operatorname {tw}})}cdot n^{{mathcal {O}}(1)})</span>. That is, <span>AntiFactor</span><sub>x</sub> is fixed-parameter tractable parameterized by treewidth <span>({operatorname {tw}})</span> and the maximum number <span>(x)</span> of excluded degrees. Our algorithm uses the technique of representative sets, which can be generalized to the optimization version, but (as expected) not to the counting version of the problem. In fact, we show that #<span>AntiFactor</span><sub>1</sub> is already #<span>W</span> <span>([1])</span>-hard parameterized by the width of the given decomposition. Moreover, we show that, unlike for the decision version, the standard dynamic programming algorithm is essentially optimal for the counting version. Formally, for a fixed nonempty set <span>(X)</span>, we denote by <span>(X)</span>-<span>AntiFactor</span> the special case where every vertex <i>v</i> has the same set <span>(X_v=X)</span> of forbidden degrees. We show the following lower bound for every fixed set <span>(X)</span>: if there is an <span>(epsilon &gt;0)</span> such that #<span>(X)</span>-<span>AntiFactor</span> can be solved in time <span>((max X+2-epsilon )^{{operatorname {tw}}}cdot n^{{mathcal {O}}(1)})</span> given a tree decomposition of width <span>({operatorname {tw}})</span>, then the counting strong exponential-time hypothesis (#SETH) fails.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"22 - 88"},"PeriodicalIF":0.9,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01265-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Constrained Depth First Search 能量受限深度优先搜索
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-10-12 DOI: 10.1007/s00453-024-01275-8
Shantanu Das, Dariusz Dereniowski, Przemysław Uznański
{"title":"Energy Constrained Depth First Search","authors":"Shantanu Das,&nbsp;Dariusz Dereniowski,&nbsp;Przemysław Uznański","doi":"10.1007/s00453-024-01275-8","DOIUrl":"10.1007/s00453-024-01275-8","url":null,"abstract":"<div><p>Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such a route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer <i>B</i> (e.g. due to limited energy resources of the searcher). The objective is to cover all the edges of a tree <i>T</i> using the minimum number of routes, each starting and ending at the root and each being of length at most <i>B</i>. To this end, we analyze the following natural greedy tree traversal process that is based on decomposing a depth first search traversal into a sequence of limited length routes. Given any arbitrary depth first search traversal <i>R</i> of the tree <i>T</i>, we cover <i>R</i> with routes <span>(R_1,ldots ,R_l)</span>, each of length at most <i>B</i> such that: <span>(R_i)</span> starts at the root, reaches directly the farthest point of <i>R</i> visited by <span>(R_{i-1})</span>, then <span>(R_i)</span> continues along the path <i>R</i> as far as possible, and finally <span>(R_i)</span> returns to the root. We call the above algorithm <i>piecemeal-DFS</i> and we prove that it achieves the asymptotically minimal number of routes <i>l</i>, regardless of the choice of <i>R</i>. Our analysis also shows that the total length of the traversal (and thus the traversal time) of piecemeal-DFS is asymptotically minimum over all energy-constrained exploration strategies. The fact that <i>R</i> can be chosen arbitrarily means that the exploration strategy can be constructed in an online fashion when the input tree <i>T</i> is not known in advance. Each route <span>(R_i)</span> can be constructed without any knowledge of the yet unvisited part of <i>T</i>. Surprisingly, our results show that depth first search is efficient for energy constrained exploration of trees, even though it is known that the same does not hold for energy constrained exploration of arbitrary graphs.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3759 - 3782"},"PeriodicalIF":0.9,"publicationDate":"2024-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01275-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Scheduling Mechanisms Beyond the Worst Case 在最坏情况下的调度机制
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-10-12 DOI: 10.1007/s00453-024-01277-6
Yansong Gao, Jie Zhang
{"title":"On Scheduling Mechanisms Beyond the Worst Case","authors":"Yansong Gao,&nbsp;Jie Zhang","doi":"10.1007/s00453-024-01277-6","DOIUrl":"10.1007/s00453-024-01277-6","url":null,"abstract":"<div><p>The problem of scheduling unrelated machines has been studied since the inception of algorithmic mechanism design (Nisan and Ronen, Algorithmic mechanism design(extended abstract). In: Proceedings of the Thirty First Annual ACM Symposium on Theory of Computing (STOC), pp. 129–140, 1999. It is a resource allocation problem that entails assigning <i>m</i> tasks to <i>n</i> machines for execution. Machines are regarded as strategic agents who may lie about their execution costs so as to minimize their time cost. To address the situation when monetary payment is not an option to compensate the machines’ costs, Koutsoupias (Theory Comput Syst 54:375–387, 2014) devised two <i>truthful</i> mechanisms, K and P respectively, that achieves an approximation ratio of <span>(frac{n+1}{2})</span> and <i>n</i>, for social cost minimization. In addition, no truthful mechanism can achieve an approximation ratio better than <span>(frac{n+1}{2})</span>. Hence, mechanism K is optimal. While the approximation ratio provides a strong worst-case guarantee, it also limits us to a comprehensive understanding of mechanism performance on various inputs. This paper investigates these two scheduling mechanisms beyond the worst case. We first show that mechanism K achieves a smaller social cost than mechanism P on every input. That is, mechanism K is pointwise better than mechanism P. Next, for each task, when machines’ execution costs are independent and identically drawn from a task-specific distribution, we show that the average-case approximation ratio of mechanism K converges to a constant determined by the task-specific distribution. This bound is tight for mechanism K. For a better understanding of this distribution-dependent constant, on the one hand, we estimate its value by plugging in a few common distributions; on the other, we show that this converging bound improves a known bound (Zhang in Algorithmica 83(6):1638–1652, 2021)) which only captures the single-task setting. Last, we find that the average-case approximation ratio of mechanism P converges to the same constant.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 1","pages":"1 - 21"},"PeriodicalIF":0.9,"publicationDate":"2024-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01277-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering the Original Simplicity: Succinct and Exact Quantum Algorithm for the Welded Tree Problem 恢复原始的简单性:焊接树问题的简洁精确量子算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-10-04 DOI: 10.1007/s00453-024-01273-w
Guanzhong Li, Lvzhou Li, Jingquan Luo
{"title":"Recovering the Original Simplicity: Succinct and Exact Quantum Algorithm for the Welded Tree Problem","authors":"Guanzhong Li,&nbsp;Lvzhou Li,&nbsp;Jingquan Luo","doi":"10.1007/s00453-024-01273-w","DOIUrl":"10.1007/s00453-024-01273-w","url":null,"abstract":"<div><p>This work revisits quantum algorithms for the well-known welded tree problem, proposing a succinct quantum algorithm based on the simple coined quantum walks. It iterates the naturally defined coined quantum walk operator for a classically precomputed number of iterations, and measures. The number of iterations is linear in the depth of the tree. The success probability of this procedure is inversely linear in the depth of the tree. Moreover, it is the same for all instances of the problem of a fixed size, therefore, we can use the exact quantum amplitude amplification subroutine to answer with probability 1. This gives an exponential speedup over any classical algorithm for the same problem. The significance of the results may be seen as follows. (i) Our algorithm is rather simple compared with the one in (Jeffery and Zur, STOC’2023), which not only breaks the stereotype that coined quantum walks can only achieve quadratic speedups over classical algorithms, but also demonstrates the power of the simplest quantum walk model. (ii) Our algorithm achieves certainty of success for the first time. Thus, it becomes one of the few examples that exhibit exponential separation between exact quantum and randomized query complexities.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3719 - 3758"},"PeriodicalIF":0.9,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Permutation-constrained Common String Partitions with Applications 排列受限的普通字符串分区及其应用
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-30 DOI: 10.1007/s00453-024-01276-7
Manuel Lafond, Binhai Zhu
{"title":"Permutation-constrained Common String Partitions with Applications","authors":"Manuel Lafond,&nbsp;Binhai Zhu","doi":"10.1007/s00453-024-01276-7","DOIUrl":"10.1007/s00453-024-01276-7","url":null,"abstract":"<div><p>We study a new combinatorial problem based on the famous Minimum Common String Partition problem, which we call Permutation-constrained Common String Partition (PCSP for short). In PCSP, we are given two sequences/genomes <i>s</i> and <i>t</i> with the same length and a permutation <span>(pi )</span> on <span>([ell ])</span>, the question is to decide whether it is possible to decompose <i>s</i> and <i>t</i> into <span>(ell )</span> blocks that can be matched according to some specified requirements, and that conform with the permutation <span>(pi )</span>. Our main result is that PCSP is FPT in parameter <span>(ell + d)</span>, where <i>d</i> is the maximum number of occurrences that any symbol may have in <i>s</i> or <i>t</i>. We also study a variant where the input specifies whether each matched pair of block needs to be preserved as is, or reversed. With this result on PCSP, we show that a series of genome rearrangement problems are FPT <span>(k + d)</span>, where <i>k</i> is the rearrangement distance between two genomes of interest.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3684 - 3718"},"PeriodicalIF":0.9,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reachability of Fair Allocations via Sequential Exchanges 通过顺序交换实现公平分配的可达性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-21 DOI: 10.1007/s00453-024-01271-y
Ayumi Igarashi, Naoyuki Kamiyama, Warut Suksompong, Sheung Man Yuen
{"title":"Reachability of Fair Allocations via Sequential Exchanges","authors":"Ayumi Igarashi,&nbsp;Naoyuki Kamiyama,&nbsp;Warut Suksompong,&nbsp;Sheung Man Yuen","doi":"10.1007/s00453-024-01271-y","DOIUrl":"10.1007/s00453-024-01271-y","url":null,"abstract":"<div><p>In the allocation of indivisible goods, a prominent fairness notion is envy-freeness up to one good (EF1). We initiate the study of reachability problems in fair division by investigating the problem of whether one EF1 allocation can be reached from another EF1 allocation via a sequence of exchanges such that every intermediate allocation is also EF1. We show that two EF1 allocations may not be reachable from each other even in the case of two agents, and deciding their reachability is PSPACE-complete in general. On the other hand, we prove that reachability is guaranteed for two agents with identical or binary utilities as well as for any number of agents with identical binary utilities. We also examine the complexity of deciding whether there is an EF1 exchange sequence that is optimal in the number of exchanges required.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3653 - 3683"},"PeriodicalIF":0.9,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01271-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Flipping the Fréchet Distance 关于翻转弗雷谢特距离
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-20 DOI: 10.1007/s00453-024-01267-8
Omrit Filtser, Mayank Goswami, Joseph S. B. Mitchell, Valentin Polishchuk
{"title":"On Flipping the Fréchet Distance","authors":"Omrit Filtser,&nbsp;Mayank Goswami,&nbsp;Joseph S. B. Mitchell,&nbsp;Valentin Polishchuk","doi":"10.1007/s00453-024-01267-8","DOIUrl":"10.1007/s00453-024-01267-8","url":null,"abstract":"<div><p>The classical and extensively-studied <i>Fréchet distance</i> between two curves is defined as an <i>inf max</i>, where the infimum is over all traversals of the curves, and the maximum is over all concurrent positions of the two agents. In this article we investigate a “flipped” Fréchet measure defined by a <i>sup min</i> – the supremum is over all traversals of the curves, and the minimum is over all concurrent positions of the two agents. This measure produces a notion of “social distance” between two curves (or general domains), where agents traverse curves while trying to stay as far apart as possible. We first study the flipped Fréchet measure between two polygonal curves in one and two dimensions, providing conditional lower bounds and matching algorithms. We then consider this measure on polygons, where it denotes the minimum distance that two agents can maintain while restricted to travel in or on the boundary of the same polygon. We investigate several variants of the problem in this setting, for some of which we provide linear-time algorithms. We draw connections between our proposed flipped Fréchet measure and existing related work in computational geometry, hoping that our new measure may spawn investigations akin to those performed for the Fréchet distance, and into further interesting problems that arise.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3629 - 3652"},"PeriodicalIF":0.9,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信