Algorithmica最新文献

筛选
英文 中文
A Clique-Based Separator for Intersection Graphs of Geodesic Disks in (mathbb {R}^2) 一种基于团的测地线盘交点图分割方法 (mathbb {R}^2)
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-29 DOI: 10.1007/s00453-025-01337-5
Boris Aronov, Mark de Berg, Leonidas Theocharous
{"title":"A Clique-Based Separator for Intersection Graphs of Geodesic Disks in (mathbb {R}^2)","authors":"Boris Aronov,&nbsp;Mark de Berg,&nbsp;Leonidas Theocharous","doi":"10.1007/s00453-025-01337-5","DOIUrl":"10.1007/s00453-025-01337-5","url":null,"abstract":"<div><p>Let <i>d</i> be a (well-behaved) shortest-path metric defined on a path-connected subset of <span>(mathbb {R}^2)</span> and let <span>(mathcal {D}={D_1,ldots,D_n})</span> be a set of geodesic disks with respect to the metric <i>d</i>. We prove that <span>(mathcal {G}^{times }(mathcal {D}))</span>, the intersection graph of the disks in <span>(mathcal {D})</span>, has a clique-based separator consisting of <span>(O(n^{3/4+varepsilon }))</span> cliques. This significantly extends the class of objects whose intersection graphs have small clique-based separators. Our clique-based separator yields an algorithm for <i>q</i>-<span>Coloring</span> that runs in time <span>(2^{O(n^{3/4+varepsilon })})</span>, assuming the boundaries of the disks <span>(D_i)</span> can be computed in polynomial time. We also use our clique-based separator to obtain a simple, efficient, and almost exact distance oracle for intersection graphs of geodesic disks. Our distance oracle uses <span>(O(n^{7/4+varepsilon }))</span> storage and can report the hop distance between any two nodes in <span>(mathcal {G}^{times }(mathcal {D}))</span> in <span>(O(n^{3/4+varepsilon }))</span> time, up to an additive error of one. So far, distance oracles with an additive error of one that use subquadratic storage and sublinear query time were not known for such general graph classes.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 12","pages":"1997 - 2017"},"PeriodicalIF":0.7,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-025-01337-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfiguration of Multisets with Applications to Bin Packing 多集的重新配置及其在装箱中的应用
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-21 DOI: 10.1007/s00453-025-01324-w
Jeffrey Kam, Shahin Kamali, Avery Miller, Naomi Nishimura
{"title":"Reconfiguration of Multisets with Applications to Bin Packing","authors":"Jeffrey Kam,&nbsp;Shahin Kamali,&nbsp;Avery Miller,&nbsp;Naomi Nishimura","doi":"10.1007/s00453-025-01324-w","DOIUrl":"10.1007/s00453-025-01324-w","url":null,"abstract":"<div><p>We use the reconfiguration framework to analyze problems that involve the rearrangement of items among groups. In various applications, a group of items could correspond to the files or jobs assigned to a particular machine, and the goal of rearrangement could be improving efficiency or increasing locality. To cover problems arising in a wide range of application areas, we define the general <span>Repacking</span> problem as the rearrangement of multisets of multisets. We present hardness results for the general case and algorithms for various restricted classes of instances. By limiting the total size of items in each multiset, our results can be viewed as an offline approach to <span>Bin Packing</span>, in which each bin is represented as a multiset. In addition to providing the first results on reconfiguration of multisets, our contributions open up several research avenues: the interplay between reconfiguration and online algorithms and parallel algorithms; the use of the tools of linear programming in reconfiguration; and, in the longer term, a focus on extra resources in reconfiguration. A preliminary version of this paper appeared in the proceedings of the 18th International Conference and Workshops on Algorithms and Computation (WALCOM 2024).</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 12","pages":"1933 - 1996"},"PeriodicalIF":0.7,"publicationDate":"2025-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Log-Diameter MST Verification and Sensitivity in MPC 测井径MST在MPC中的验证和灵敏度
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-20 DOI: 10.1007/s00453-025-01332-w
Sam Coy, Artur Czumaj, Gopinath Mishra, Anish Mukherjee
{"title":"Log-Diameter MST Verification and Sensitivity in MPC","authors":"Sam Coy,&nbsp;Artur Czumaj,&nbsp;Gopinath Mishra,&nbsp;Anish Mukherjee","doi":"10.1007/s00453-025-01332-w","DOIUrl":"10.1007/s00453-025-01332-w","url":null,"abstract":"<div><p>We consider two natural variants of the problem of minimum spanning tree (<span>(text {MST})</span>) of a graph in the parallel setting: <i>MST verification</i> (verifying if a given tree is an <span>(text {MST})</span>) and the <i>sensitivity analysis of an MST</i> (finding the lowest cost replacement edge for each edge of the <span>(text {MST})</span>). These two problems have been studied extensively for sequential algorithms and for parallel algorithms in the <span>(textrm{PRAM})</span> model of computation. In this paper, we extend the study to the standard model of <i>Massive Parallel Computation</i> (<span>(textrm{MPC})</span>). It is known that for graphs of diameter <i>D</i>, the connectivity problem can be solved in <span>(O(log D + log log n))</span> rounds on an <span>(textrm{MPC})</span> with <i>low local memory</i> (each machine can store only <span>(O(n^{delta }))</span> words for an arbitrary constant <span>(delta &gt; 0)</span>) and with <i>linear global memory</i>, that is, with <i>optimal utilization</i>. However, for the related task of finding an <span>(text {MST})</span>, we need <span>(Omega (log D_{text {MST}}))</span> rounds, where <span>(D_{text {MST}})</span> denotes the diameter of the minimum spanning tree. The state of the art upper bound for <span>(text {MST})</span> is <span>(O(log n))</span> rounds; the result follows by simulating existing <span>(textrm{PRAM})</span> algorithms. While this bound may be optimal for general graphs, the benchmark of connectivity and lower bound for <span>(text {MST})</span> suggest the target bound of <span>(O(log D_text {MST}))</span> rounds, or possibly <span>(O(log D_text {MST} + log log n))</span> rounds. As for now, we do not know if this bound is achievable for the <span>(text {MST})</span> problem on an <span>(textrm{MPC})</span> with low local memory and linear global memory. In this paper, we show that two natural variants of the <span>(text {MST})</span> problem: <span>(text {MST})</span> verification and sensitivity analysis of an <span>(text {MST})</span>, can be completed in <span>(O(log D_T))</span> rounds on an <span>(textrm{MPC})</span> with low local memory and with linear global memory, that is, with optimal utilization; here <span>(D_T)</span> is the diameter of the input “candidate <span>(text {MST})</span> ” <i>T</i>. The algorithms asymptotically match our lower bound, conditioned on the 1-vs-2-cycle conjecture.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 12","pages":"1899 - 1932"},"PeriodicalIF":0.7,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized Complexity of Path Set Packing 路径集填充的参数化复杂度
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-19 DOI: 10.1007/s00453-025-01329-5
N. R. Aravind, Roopam Saxena
{"title":"Parameterized Complexity of Path Set Packing","authors":"N. R. Aravind,&nbsp;Roopam Saxena","doi":"10.1007/s00453-025-01329-5","DOIUrl":"10.1007/s00453-025-01329-5","url":null,"abstract":"<div><p>In <span>Path Set Packing</span>, the input is an undirected graph <i>G</i>, a collection <span>(mathcal{P})</span> of simple paths in <i>G</i>, and a positive integer <i>k</i>. The problem is to decide whether there exist <i>k</i> edge-disjoint paths in <span>(mathcal{P})</span>. We study the parameterized complexity of <span>Path Set Packing</span> with respect to both natural and structural parameters. We show that the problem is W[1]-hard with respect to vertex cover number, and W[1]-hard respect to pathwidth plus solution size when input graph is a grid. These results answer an open question raised in Xu and Zhang (in: Wang L, Zhu D (eds) Computing and combinatorics—24th international conference, COCOON 2018, Qing Dao, China, July 2–4, 2018, proceedings. Lecture notes in computer science, vol 10976, pp 305–315. Springer, 2018, https://doi.org/10.1007/978-3-319-94776-1_26). On the positive side, we present an FPT algorithm parameterized by feedback vertex number plus maximum degree, and present an FPT algorithm parameterized by treewidth plus maximum degree plus maximum length of a path in <span>(mathcal{P})</span>. These positive results complement the hardness of <span>Path Set Packing</span> with respect to any subset of the parameters used in the FPT algorithms. We also give a 4-approximation algorithm for maximum path set packing problem which runs in FPT time when parameterized by feedback edge number.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 12","pages":"1864 - 1898"},"PeriodicalIF":0.7,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comma Selection Outperforms Plus Selection on OneMax with Randomly Planted Optima 逗号选择优于加选择在OneMax随机种植的最优
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-18 DOI: 10.1007/s00453-025-01330-y
Joost Jorritsma, Johannes Lengler, Dirk Sudholt
{"title":"Comma Selection Outperforms Plus Selection on OneMax with Randomly Planted Optima","authors":"Joost Jorritsma,&nbsp;Johannes Lengler,&nbsp;Dirk Sudholt","doi":"10.1007/s00453-025-01330-y","DOIUrl":"10.1007/s00453-025-01330-y","url":null,"abstract":"<div><p>Evolutionary algorithms (EAs) are general-purpose optimisation algorithms that maintain a population (multiset) of candidate solutions and apply variation operators to create new solutions called offspring. A new population is typically formed using one of two strategies: a <span>((mu +lambda ))</span> EA (plus selection) keeps the best <span>(mu )</span> search points out of the union of <span>(mu )</span> parents in the old population and <span>(lambda )</span> offspring, whereas a <span>((mu ,lambda ))</span> EA (comma selection) discards all parents and only keeps the best <span>(mu )</span> out of <span>(lambda )</span> offspring. Comma selection may help to escape from local optima, however when and how it is beneficial is subject to an ongoing debate. We propose a new benchmark function to investigate the benefits of comma selection: the well known benchmark function <span>OneMax</span>with randomly planted local optima, generated by frozen noise. We show that comma selection (the <span>({(1,lambda )})</span> EA) is faster than plus selection (the <span>({(1+lambda )})</span> EA) on this benchmark, in a fixed-target scenario, and for offspring population sizes <span>(lambda )</span> for which both algorithms behave differently. For certain parameters, the <span>({(1,lambda )})</span> EAfinds the target in <span>(Theta (n ln n))</span> evaluations, with high probability (w.h.p.), while the <span>({(1+lambda )})</span> EAw.h.p. requires <span>(omega (n^2))</span> evaluations. We further show that the advantage of comma selection is not arbitrarily large: w.h.p. comma selection outperforms plus selection at most by a factor of <span>(O(n ln n))</span> for most reasonable parameter choices. We develop novel methods for analysing frozen noise and give powerful and general fixed-target results with tail bounds that are of independent interest.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 12","pages":"1804 - 1863"},"PeriodicalIF":0.7,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-025-01330-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decidability of Fully Quantum Nonlocal Games with Noisy Maximally Entangled States 具有噪声最大纠缠态的全量子非局部对策的可判决性
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-13 DOI: 10.1007/s00453-025-01339-3
Minglong Qin, Penghui Yao
{"title":"Decidability of Fully Quantum Nonlocal Games with Noisy Maximally Entangled States","authors":"Minglong Qin,&nbsp;Penghui Yao","doi":"10.1007/s00453-025-01339-3","DOIUrl":"10.1007/s00453-025-01339-3","url":null,"abstract":"<div><p>This paper considers the decidability of fully quantum nonlocal games with noisy maximally entangled states. Fully quantum nonlocal games are a generalization of nonlocal games, where both questions and answers are quantum and the referee performs a binary POVM measurement to decide whether they win the game after receiving the quantum answers from the players. The quantum value of a fully quantum nonlocal game is the supremum of the probability that they win the game, where the supremum is taken over all the possible entangled states shared between the players and all the valid quantum operations performed by the players. The seminal work <span>(text {MIP}^*=text {RE})</span> ( Ji et al. MIP ∗ = RE, 2020; Ji et al. Quantum soundness of the classical low individual degree test, 2020) implies that it is undecidable to approximate the quantum value of a fully nonlocal game. This still holds even if the players are only allowed to share (arbitrarily many copies of) maximally entangled states. This paper investigates the case that the shared maximally entangled states are noisy. We prove that there is a computable upper bound on the copies of noisy maximally entangled states for the players to win a fully quantum nonlocal game with a probability arbitrarily close to the quantum value. This implies that it is decidable to approximate the quantum values of these games. Hence, the hardness of approximating the quantum value of a fully quantum nonlocal game is not robust against the noise in the shared states. This paper is built on the framework for the decidability of non-interactive simulations of joint distributions (Ghazi et al. in: 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), Los Alamitos, 2016; De et al. in: Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, Philadelphia, 2018; Ghazi et al. Proceedings of the 33rd Computational Complexity Conference, 2018) and generalizes the analogous result for nonlocal games in Qin and Yao (SIAM J Comput 50(6):1800–1891, 2021). We extend the theory of Fourier analysis to the space of super-operators and prove several key results including an invariance principle and a dimension reduction for super-operators. These results are interesting in their own right and are believed to have further applications.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 12","pages":"1732 - 1803"},"PeriodicalIF":0.7,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Equivalence of Parameterized Inapproximability of k-Median, k-Max-Coverage, and 2-CSP k-Median、k-Max-Coverage和2-CSP的参数化不可逼近性的等价性
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-13 DOI: 10.1007/s00453-025-01338-4
Karthik C.S., Euiwoong Lee, Pasin Manurangsi
{"title":"On Equivalence of Parameterized Inapproximability of k-Median, k-Max-Coverage, and 2-CSP","authors":"Karthik C.S.,&nbsp;Euiwoong Lee,&nbsp;Pasin Manurangsi","doi":"10.1007/s00453-025-01338-4","DOIUrl":"10.1007/s00453-025-01338-4","url":null,"abstract":"<div><p>Parameterized Inapproximability Hypothesis (<span>(textsf{PIH})</span>) is a central question in the field of parameterized complexity. <span>(textsf{PIH})</span> asserts that given as input a 2-<span>(textsf{CSP})</span> on <i>k</i> variables and alphabet size <i>n</i>, it is <span>(textsf{W})</span>[1]-hard parameterized by <i>k</i> to distinguish if the input is perfectly satisfiable or if every assignment to the input violates 1% of the constraints. An important implication of <span>(textsf{PIH})</span> is that it yields the tight parameterized inapproximability of the <span>(k)</span>-<span>(textsf{maxcoverage})</span> problem. In the <span>(k)</span>-<span>(textsf{maxcoverage})</span> problem, we are given as input a set system, a threshold <span>(tau &gt;0)</span>, and a parameter <i>k</i> and the goal is to determine if there exist <i>k</i> sets in the input whose union is at least <span>(tau )</span> fraction of the entire universe. <span>(textsf{PIH})</span> is known to imply that it is <span>(textsf{W})</span>[1]-hard parameterized by <i>k</i> to distinguish if there are <i>k</i> input sets whose union is at least <span>(tau )</span> fraction of the universe or if the union of every <i>k</i> input sets is not much larger than <span>(tau cdot (1-frac{1}{e}))</span> fraction of the universe. In this work we present a gap preserving <span>(textsf{FPT})</span> reduction (in the reverse direction) from the <span>(k)</span>-<span>(textsf{maxcoverage})</span> problem to the aforementioned 2-<span>(textsf{CSP})</span> problem, thus showing that the assertion that approximating the <span>(k)</span>-<span>(textsf{maxcoverage})</span> problem to some constant factor is <span>(textsf{W})</span>[1]-hard implies <span>(textsf{PIH})</span>. In addition, we present a gap preserving <span>(textsf{FPT})</span> reduction from the <span>(k)</span>-<span>(textsf{median})</span> problem (in general metrics) to the <span>(k)</span>-<span>(textsf{maxcoverage})</span> problem, further highlighting the power of gap preserving <span>(textsf{FPT})</span> reductions over classical gap preserving polynomial time reductions.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 12","pages":"1711 - 1731"},"PeriodicalIF":0.7,"publicationDate":"2025-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145227912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Parameterized Complexity of Eulerian Strong Component Arc Deletion 欧拉强分量圆弧剔除的参数化复杂度
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-07 DOI: 10.1007/s00453-025-01336-6
Václav Blažej, Satyabrata Jana, M. S. Ramanujan, Peter Strulo
{"title":"On the Parameterized Complexity of Eulerian Strong Component Arc Deletion","authors":"Václav Blažej,&nbsp;Satyabrata Jana,&nbsp;M. S. Ramanujan,&nbsp;Peter Strulo","doi":"10.1007/s00453-025-01336-6","DOIUrl":"10.1007/s00453-025-01336-6","url":null,"abstract":"<div><p>In this paper, we study the Eulerian Strong Component Arc Deletion problem, where the input is a directed multigraph and the goal is to delete the minimum number of arcs to ensure every strongly connected component of the resulting digraph is Eulerian. This problem is a natural extension of the Directed Feedback Arc Set problem and is also known to be motivated by certain scenarios arising in the study of housing markets. The complexity of the problem, when parameterized by solution size (i.e., size of the deletion set), has remained unresolved and has been highlighted in several papers. In this work, we answer this question by ruling out (subject to the usual complexity assumptions) a fixed-parameter algorithm (FPT algorithm) for this parameter and conduct a broad analysis of the problem with respect to other natural parameterizations. We prove both positive and negative results. Among these, we demonstrate that the problem is also hard (W[1]-hard or even para-NP-hard) when parameterized by either treewidth or maximum degree alone. Complementing our lower bounds, we establish that the problem is in XP when parameterized by treewidth and FPT when parameterized either by both treewidth and maximum degree or by both treewidth and solution size. We show that on simple digraphs, these algorithms have near-optimal asymptotic dependence on the treewidth assuming the Exponential Time Hypothesis.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 11","pages":"1669 - 1709"},"PeriodicalIF":0.7,"publicationDate":"2025-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-025-01336-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145090612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ShockHash: Near Optimal-Space Minimal Perfect Hashing Beyond Brute-Force shockash:超越蛮力的近最优空间最小完美哈希
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-08-02 DOI: 10.1007/s00453-025-01321-z
Hans-Peter Lehmann, Peter Sanders, Stefan Walzer
{"title":"ShockHash: Near Optimal-Space Minimal Perfect Hashing Beyond Brute-Force","authors":"Hans-Peter Lehmann,&nbsp;Peter Sanders,&nbsp;Stefan Walzer","doi":"10.1007/s00453-025-01321-z","DOIUrl":"10.1007/s00453-025-01321-z","url":null,"abstract":"<div><p>A minimal perfect hash function (MPHF) maps a set <i>S</i> of <i>n</i> keys to the first <i>n</i> integers without collisions. There is a lower bound of <span>(nlog _2e-mathcal {O}(log n) approx 1.44n)</span> bits needed to represent an MPHF. This can be reached by a <i>brute-force</i> algorithm that tries <span>(e^n)</span> hash function seeds in expectation and stores the first seed that leads to an MPHF. The most space-efficient previous algorithms for constructing MPHFs all use such a brute-force approach as a basic building block. In this paper, we introduce ShockHash – <b>S</b>mall, <b>h</b>eavily <b>o</b>verloaded cu<b>ck</b>oo <b>hash</b> tables for minimal perfect hashing. ShockHash uses two hash functions <span>(h_0)</span> and <span>(h_1)</span>, hoping for the existence of a function <span>(f : S rightarrow {0,1})</span> such that <span>(x mapsto h_{f(x)}(x))</span> is an MPHF on <i>S</i>. It then uses a 1-bit retrieval data structure to store <i>f</i> using <span>(n + o(n))</span> bits. In graph terminology, ShockHash generates <i>n</i>-edge random graphs until stumbling on a <i>pseudoforest</i> – where each component contains as many edges as nodes. Using cuckoo hashing, ShockHash then derives an MPHF from the pseudoforest in linear time. We show that ShockHash needs to try only about <span>((e/2)^n approx 1.359^n)</span> seeds in expectation. This reduces the space for storing the seed by roughly <i>n</i> bits (maintaining the asymptotically optimal space consumption) and speeds up construction by almost a factor of <span>(2^n)</span> compared to brute-force. <i>Bipartite</i> ShockHash reduces the expected construction time again to about <span>(1.166^n)</span> by maintaining a pool of candidate hash functions and checking all possible pairs. Using ShockHash as a building block within the RecSplit framework we obtain ShockHash-RS, which can be constructed up to 3 orders of magnitude faster than competing approaches. ShockHash-RS can build an MPHF for 10 million keys with 1.489 bits per key in about half an hour. When instead using ShockHash after an efficient <i>k</i>-perfect hash function, it achieves space usage similar to the best competitors, while being significantly faster to construct and query.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 11","pages":"1620 - 1668"},"PeriodicalIF":0.7,"publicationDate":"2025-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-025-01321-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145090312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving Tight (O(4^k)) Runtime Bounds on Jumpk by Proving that Genetic Algorithms Evolve Near-Maximal Population Diversity 通过证明遗传算法进化出接近最大种群多样性来实现跳跃的紧密(O(4^k))运行时间界限
IF 0.7 4区 计算机科学
Algorithmica Pub Date : 2025-07-28 DOI: 10.1007/s00453-025-01323-x
Andre Opris, Johannes Lengler, Dirk Sudholt
{"title":"Achieving Tight (O(4^k)) Runtime Bounds on Jumpk by Proving that Genetic Algorithms Evolve Near-Maximal Population Diversity","authors":"Andre Opris,&nbsp;Johannes Lengler,&nbsp;Dirk Sudholt","doi":"10.1007/s00453-025-01323-x","DOIUrl":"10.1007/s00453-025-01323-x","url":null,"abstract":"<div><p>The <span>(textsc {Jump} _k)</span> benchmark was the first problem for which crossover was proven to give a speed-up over mutation-only evolutionary algorithms. Jansen and Wegener (Algorithmica 2002) proved an upper bound of <span>(O(textrm{poly}(n) + 4^k/p_c))</span> for the (<span>(mu )</span>+1) Genetic Algorithm ((<span>(mu )</span>+1) GA), but only for unrealistically small crossover probabilities <span>(p_c)</span>. To this date, it remains an open problem to prove similar upper bounds for realistic <span>(p_c)</span>; the best known runtime bound, in terms of function evaluations, for <span>(p_c = Omega (1))</span> is <span>(O((n/chi )^{k-1}))</span>, <span>(chi )</span> a positive constant. We provide a novel approach and analyse the evolution of the population diversity, measured as sum of pairwise Hamming distances, for a variant of the (<span>(mu )</span>+1) GA on <span>(textsc {Jump} _k)</span>. The (<span>(mu )</span>+1)-<span>({lambda _c})</span>-GA creates one offspring in each generation either by applying mutation to one parent or by applying crossover <span>({lambda _c})</span> times to the same two parents (followed by mutation), to amplify the probability of creating an accepted offspring in generations with crossover. We show that population diversity in the (<span>(mu )</span>+1)-<span>({lambda _c})</span>-GA converges to an equilibrium of near-perfect diversity. This yields an improved time bound of <span>(O(mu n log (mu ) + 4^k))</span> function evaluations for a range of <i>k</i> under the mild assumptions <span>(p_c = O(1/k))</span> and <span>(mu in Omega (kn))</span>. For all constant <i>k</i>, the restriction is satisfied for some <span>(p_c = Omega (1))</span> and it implies that the expected runtime for all constant <i>k</i> and an appropriate <span>(mu = Theta (kn))</span> is bounded by <span>(O(n^2 log n))</span>, irrespective of <i>k</i>. For larger <i>k</i>, the expected time of the (<span>(mu )</span>+1)-<span>({lambda _c})</span>-GA is <span>(Theta (4^k))</span>, which is tight for a large class of unbiased black-box algorithms and faster than the original (<span>(mu )</span>+1) GA by a factor of <span>(Omega (1/p_c))</span>. We also show that our analysis can be extended to other unitation functions such as <span>(textsc {Jump} _{k, delta })</span> and H<span>urdle</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"87 11","pages":"1564 - 1619"},"PeriodicalIF":0.7,"publicationDate":"2025-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-025-01323-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145090348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信