Algorithmica最新文献

筛选
英文 中文
Minimizing the Maximum Flow Time in the Online Food Delivery Problem 在线食品配送问题中的最大流通时间最小化
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-10-31 DOI: 10.1007/s00453-023-01177-1
Xiangyu Guo, Shi Li, Kelin Luo, Yuhao Zhang
{"title":"Minimizing the Maximum Flow Time in the Online Food Delivery Problem","authors":"Xiangyu Guo,&nbsp;Shi Li,&nbsp;Kelin Luo,&nbsp;Yuhao Zhang","doi":"10.1007/s00453-023-01177-1","DOIUrl":"10.1007/s00453-023-01177-1","url":null,"abstract":"<div><p>We study a common delivery problem encountered in nowadays online food-ordering platforms: Customers order dishes online, and the restaurant delivers the food after receiving the order. Specifically, we study a problem where <i>k</i> vehicles of capacity <i>c</i> are serving a set of requests ordering food from one restaurant. After a request arrives, it can be served by a vehicle moving from the restaurant to its delivery location. We are interested in serving all requests while minimizing the maximum flow-time, i.e., the maximum time length a customer waits to receive his/her food after submitting the order. The problem also has a close connection with the broadcast scheduling problem with maximum flow time objective. We show that the problem is hard in both offline and online settings even when <span>(k = 1)</span> and <span>(c = infty )</span>: There is a hardness of approximation of <span>(Omega (n))</span> for the offline problem, and a lower bound of <span>(Omega (n))</span> on the competitive ratio of any online algorithm, where <i>n</i> is number of points in the metric. We circumvent the strong negative results in two directions. Our main result is an <i>O</i>(1)-competitive online algorithm for the uncapaciated (i.e, <span>(c = infty )</span>) food delivery problem on tree metrics; we also have a negative result showing that the condition <span>(c = infty )</span> is needed. Then we consider the speed-augmentation model, in which our online algorithm is allowed to use <span>(alpha )</span>-speed vehicles, where <span>(alpha ge 1)</span> is called the speeding factor. We develop an exponential time <span>((1+epsilon ))</span>-speeding <span>(O(1/epsilon ))</span>-competitive algorithm for any <span>(epsilon &gt; 0)</span>. A polynomial time algorithm can be obtained with a speeding factor of <span>(alpha _{textsf{TSP}}+ epsilon )</span> or <span>(alpha _{textsf{CVRP}}+ epsilon )</span>, depending on whether the problem is uncapacitated. Here <span>(alpha _{textsf{TSP}})</span> and <span>(alpha _{textsf{CVRP}})</span> are the best approximation factors for the traveling salesman (TSP) and capacitated vehicle routing (CVRP) problems respectively. We complement the results with some negative ones.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"907 - 943"},"PeriodicalIF":0.9,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135810614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counting Cycles on Planar Graphs in Subexponential Time 以亚指数时间计算平面图上的周期
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-10-30 DOI: 10.1007/s00453-023-01182-4
Jin-Yi Cai, Ashwin Maran
{"title":"Counting Cycles on Planar Graphs in Subexponential Time","authors":"Jin-Yi Cai,&nbsp;Ashwin Maran","doi":"10.1007/s00453-023-01182-4","DOIUrl":"10.1007/s00453-023-01182-4","url":null,"abstract":"<div><p>We study the problem of counting all cycles or self- avoiding walks (SAWs) on triangulated planar graphs. We present a subexponential <span>(2^{O(sqrt{n})})</span> time algorithm for this counting problem. Among the technical ingredients used in this algorithm are the planar separator theorem and a delicate analysis using pairs of Motzkin paths and Motzkin numbers. We can then adapt this algorithm to uniformly sample SAWs, in subexponential time. Our work is motivated by the problem of gerrymandered districting maps.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"656 - 693"},"PeriodicalIF":0.9,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Token Sliding on Graphs of Girth Five 五围图形上的令牌滑动
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-10-28 DOI: 10.1007/s00453-023-01181-5
Valentin Bartier, Nicolas Bousquet, Jihad Hanna, Amer E. Mouawad, Sebastian Siebertz
{"title":"Token Sliding on Graphs of Girth Five","authors":"Valentin Bartier,&nbsp;Nicolas Bousquet,&nbsp;Jihad Hanna,&nbsp;Amer E. Mouawad,&nbsp;Sebastian Siebertz","doi":"10.1007/s00453-023-01181-5","DOIUrl":"10.1007/s00453-023-01181-5","url":null,"abstract":"<div><p>In the <span>Token Sliding</span> problem we are given a graph <i>G</i> and two independent sets <span>(I_s)</span> and <span>(I_t)</span> in <i>G</i> of size <span>(k ge 1)</span>. The goal is to decide whether there exists a sequence <span>(langle I_1, I_2, ldots , I_ell rangle )</span> of independent sets such that for all <span>(j in {1,ldots , ell - 1})</span> the set <span>(I_j)</span> is an independent set of size <i>k</i>, <span>(I_1 = I_s)</span>, <span>(I_ell = I_t)</span> and <span>(I_j triangle I_{j + 1} = {u, v} in E(G))</span>. Intuitively, we view each independent set as a collection of tokens placed on the vertices of the graph. Then, the problem asks whether there exists a sequence of independent sets that transforms <span>(I_s)</span> into <span>(I_t)</span> where at each step we are allowed to slide one token from a vertex to a neighboring vertex. In this paper, we focus on the parameterized complexity of <span>Token Sliding</span> parameterized by <i>k</i>. As shown by Bartier et al. (Algorithmica 83(9):2914–2951, 2021. https://doi.org/10.1007/s00453-021-00848-1), the problem is <span>W[1]</span>-hard on graphs of girth four or less, and the authors posed the question of whether there exists a constant <span>(p ge 5)</span> such that the problem becomes fixed-parameter tractable on graphs of girth at least <i>p</i>. We answer their question positively and prove that the problem is indeed fixed-parameter tractable on graphs of girth five or more, which establishes a full classification of the tractability of <span>Token Sliding</span> parameterized by the number of tokens based on the girth of the input graph.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"638 - 655"},"PeriodicalIF":0.9,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01181-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136159019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognizing Map Graphs of Bounded Treewidth 识别有界树宽的地图图形
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-10-27 DOI: 10.1007/s00453-023-01180-6
Patrizio Angelini, Michael A. Bekos, Giordano Da Lozzo, Martin Gronemann, Fabrizio Montecchiani, Alessandra Tappini
{"title":"Recognizing Map Graphs of Bounded Treewidth","authors":"Patrizio Angelini,&nbsp;Michael A. Bekos,&nbsp;Giordano Da Lozzo,&nbsp;Martin Gronemann,&nbsp;Fabrizio Montecchiani,&nbsp;Alessandra Tappini","doi":"10.1007/s00453-023-01180-6","DOIUrl":"10.1007/s00453-023-01180-6","url":null,"abstract":"<div><p>A map is a partition of the sphere into interior-disjoint regions homeomorphic to closed disks. Some regions are labeled as nations, while the remaining ones are labeled as holes. A map in which at most <i>k</i> nations touch at the same point is a <i>k</i>-map, while it is hole-free if it contains no holes. A graph is a map graph if there is a bijection between its vertices and the nations of a map, such that two nations touch if and only the corresponding vertices are connected by an edge. We present a fixed-parameter tractable algorithm for recognizing map graphs parameterized by treewidth. Its time complexity is linear in the size of the graph. It reports a certificate in the form of a so-called witness, if the input is a yes-instance. Our algorithmic framework is general enough to test, for any <i>k</i>, if the input graph admits a <i>k</i>-map or a hole-free <i>k</i>-map.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"613 - 637"},"PeriodicalIF":0.9,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01180-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136317040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Meta-Theorem for Distributed Certification 分布式认证元定理
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-10-25 DOI: 10.1007/s00453-023-01185-1
Pierre Fraigniaud, Pedro Montealegre, Ivan Rapaport, Ioan Todinca
{"title":"A Meta-Theorem for Distributed Certification","authors":"Pierre Fraigniaud,&nbsp;Pedro Montealegre,&nbsp;Ivan Rapaport,&nbsp;Ioan Todinca","doi":"10.1007/s00453-023-01185-1","DOIUrl":"10.1007/s00453-023-01185-1","url":null,"abstract":"<div><p>Distributed certification, whether it be <i>proof-labeling schemes</i>, <i>locally checkable proofs</i>, etc., deals with the issue of certifying the legality of a distributed system with respect to a given boolean predicate. A certificate is assigned to each process in the system by a non-trustable oracle, and the processes are in charge of verifying these certificates, so that two properties are satisfied: <i>completeness</i>, i.e., for every legal instance, there is a certificate assignment leading all processes to accept, and <i>soundness</i>, i.e., for every illegal instance, and for every certificate assignment, at least one process rejects. The verification of the certificates must be fast, and the certificates themselves must be small. A large quantity of results have been produced in this framework, each aiming at designing a distributed certification mechanism for specific boolean predicates. This paper presents a “meta-theorem”, applying to many boolean predicates at once. Specifically, we prove that, for every boolean predicate on graphs definable in the monadic second-order (MSO) logic of graphs, there exists a distributed certification mechanism using certificates on <span>(O(log ^2n))</span> bits in <i>n</i>-node graphs of bounded treewidth, with a verification protocol involving a single round of communication between neighbors.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"585 - 612"},"PeriodicalIF":0.9,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134973749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Randomized Strategies for Robust Combinatorial Optimization with Approximate Separation 近似分离的鲁棒组合优化随机策略
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-10-10 DOI: 10.1007/s00453-023-01175-3
Yasushi Kawase, Hanna Sumita
{"title":"Randomized Strategies for Robust Combinatorial Optimization with Approximate Separation","authors":"Yasushi Kawase,&nbsp;Hanna Sumita","doi":"10.1007/s00453-023-01175-3","DOIUrl":"10.1007/s00453-023-01175-3","url":null,"abstract":"<div><p>In this paper, we study the following robust optimization problem. Given a set family representing feasibility and candidate objective functions, we choose a feasible set, and then an adversary chooses one objective function, knowing our choice. The goal is to find a randomized strategy (i.e., a probability distribution over the feasible sets) that maximizes the expected objective value in the worst case. This problem is fundamental in wide areas such as artificial intelligence, machine learning, game theory, and optimization. To solve the problem, we provide a general framework based on the dual linear programming problem. In the framework, we utilize the ellipsoid algorithm with the approximate separation algorithm. We prove that there exists an <span>(alpha )</span>-approximation algorithm for our robust optimization problem if there exists an <span>(alpha )</span>-approximation algorithm for finding a (deterministic) feasible set that maximizes a nonnegative linear combination of the candidate objective functions. Using our result, we provide approximation algorithms for the max–min fair randomized allocation problem and the maximum cardinality robustness problem with a knapsack constraint.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 2","pages":"566 - 584"},"PeriodicalIF":0.9,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01175-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136295362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing Generalized Convolutions Faster Than Brute Force 比蛮力更快地计算广义卷积
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-10-06 DOI: 10.1007/s00453-023-01176-2
Barış Can Esmer, Ariel Kulik, Dániel Marx, Philipp Schepper, Karol Węgrzycki
{"title":"Computing Generalized Convolutions Faster Than Brute Force","authors":"Barış Can Esmer,&nbsp;Ariel Kulik,&nbsp;Dániel Marx,&nbsp;Philipp Schepper,&nbsp;Karol Węgrzycki","doi":"10.1007/s00453-023-01176-2","DOIUrl":"10.1007/s00453-023-01176-2","url":null,"abstract":"<div><p>In this paper, we consider a general notion of convolution. Let <span>(D)</span> be a finite domain and let <span>(D^n)</span> be the set of <i>n</i>-length vectors (tuples) of <span>(D)</span>. Let <span>(f :Dtimes Drightarrow D)</span> be a function and let <span>(oplus _f)</span> be a coordinate-wise application of <i>f</i>. The <span>(f)</span>-<span>Convolution</span> of two functions <span>(g,h :D^n rightarrow {-M,ldots ,M})</span> is </p><div><div><span>$$begin{aligned} (g mathbin {circledast _{f}}h)(textbf{v}) {:}{=}sum _{begin{array}{c} textbf{v}_g,textbf{v}_h in D^n text {s.t. } textbf{v}= textbf{v}_g oplus _f textbf{v}_h end{array}} g(textbf{v}_g) cdot h(textbf{v}_h) end{aligned}$$</span></div></div><p>for every <span>(textbf{v}in D^n)</span>. This problem generalizes many fundamental convolutions such as Subset Convolution, XOR Product, Covering Product or Packing Product, etc. For arbitrary function <i>f</i> and domain <span>(D)</span> we can compute <span>(f)</span>-<span>Convolution</span> via brute-force enumeration in <span>(widetilde{{mathcal {O}}}(|D|^{2n} cdot textrm{polylog}(M)))</span> time. Our main result is an improvement over this naive algorithm. We show that <span>(f)</span>-<span>Convolution</span> can be computed exactly in <span>(widetilde{{mathcal {O}}}( (c cdot |D|^2)^{n} cdot textrm{polylog}(M)))</span> for constant <span>(c {:}{=}3/4)</span> when <span>(D)</span> has even cardinality. Our main observation is that a <i>cyclic partition</i> of a function <span>(f :Dtimes Drightarrow D)</span> can be used to speed up the computation of <span>(f)</span>-<span>Convolution</span>, and we show that an appropriate cyclic partition exists for every <i>f</i>. Furthermore, we demonstrate that a single entry of the <span>(f)</span>-<span>Convolution</span> can be computed more efficiently. In this variant, we are given two functions <span>(g,h :D^n rightarrow {-M,ldots ,M})</span> alongside with a vector <span>(textbf{v}in D^n)</span> and the task of the <span>(f)</span>-<span>Query</span> problem is to compute integer <span>((g mathbin {circledast _{f}}h)(textbf{v}))</span>. This is a generalization of the well-known Orthogonal Vectors problem. We show that <span>(f)</span>-<span>Query</span> can be computed in <span>(widetilde{{mathcal {O}}}(|D|^{frac{omega }{2} n} cdot textrm{polylog}(M)))</span> time, where <span>(omega in [2,2.372))</span> is the exponent of currently fastest matrix multiplication algorithm.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 1","pages":"334 - 366"},"PeriodicalIF":0.9,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01176-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135350290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Parameterized Complexity of Binary Networked Public Goods Game 论二元网络公共产品博弈的参数化复杂性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2023-09-28 DOI: 10.1007/s00453-023-01174-4
Arnab Maiti, Palash Dey
{"title":"On Parameterized Complexity of Binary Networked Public Goods Game","authors":"Arnab Maiti,&nbsp;Palash Dey","doi":"10.1007/s00453-023-01174-4","DOIUrl":"10.1007/s00453-023-01174-4","url":null,"abstract":"<div><p>In the binary networked public goods (BNPG for short) game, every player needs to decide if she participates in a public project whose utility is shared equally by the community. We study the problem of deciding if there exists a pure strategy Nash equilibrium (PSNE) in such games. The problem is already known to be <span>(textsf{NP})</span>-complete. This casts doubt on predictive power of PSNE in BNPG games. We provide fine-grained analysis of this problem under the lens of parameterized complexity theory. We consider various natural graph parameters and show <span>(mathsf {W[1]})</span>-hardness, XP, and <span>(textsf{FPT})</span> results. Hence, our work significantly improves our understanding of BNPG games where PSNE serves as a reliable solution concept. We finally prove that some graph classes, for example path, cycle, bi-clique, and complete graph, always have a PSNE if the utility function of the players are same.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 1","pages":"307 - 333"},"PeriodicalIF":0.9,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135342993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Matrix Norm Sparsification 矩阵范数稀疏化的比较
IF 1.1 4区 计算机科学
Algorithmica Pub Date : 2023-09-25 DOI: 10.1007/s00453-023-01172-6
Robert Krauthgamer, Shay Sapir
{"title":"Comparison of Matrix Norm Sparsification","authors":"Robert Krauthgamer,&nbsp;Shay Sapir","doi":"10.1007/s00453-023-01172-6","DOIUrl":"10.1007/s00453-023-01172-6","url":null,"abstract":"<div><p>A well-known approach in the design of efficient algorithms, called matrix sparsification, approximates a matrix <i>A</i> with a sparse matrix <span>(A')</span>. Achlioptas and McSherry (J ACM 54(2):9-es, 2007) initiated a long line of work on spectral-norm sparsification, which aims to guarantee that <span>(Vert A'-AVert le epsilon Vert AVert )</span> for error parameter <span>(epsilon &gt;0)</span>. Various forms of matrix approximation motivate considering this problem with a guarantee according to the Schatten <i>p</i>-norm for general <i>p</i>, which includes the spectral norm as the special case <span>(p=infty )</span>. We investigate the relation between fixed but different <span>(pne q)</span>, that is, whether sparsification in the Schatten <i>p</i>-norm implies (existentially and/or algorithmically) sparsification in the Schatten <span>(qtext {-norm})</span> with similar sparsity. An affirmative answer could be tremendously useful, as it will identify which value of <i>p</i> to focus on. Our main finding is a surprising contrast between this question and the analogous case of <span>(ell _p)</span>-norm sparsification for vectors: For vectors, the answer is affirmative for <span>(p&lt;q)</span> and negative for <span>(p&gt;q)</span>, but for matrices we answer negatively for almost all sufficiently distinct <span>(pne q)</span>. In addition, our explicit constructions may be of independent interest.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"85 12","pages":"3957 - 3972"},"PeriodicalIF":1.1,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134797493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Subfield and Extended Codes of a Subclass of Optimal Three-Weight Cyclic Codes 一类最优三权循环码的子域和扩展码
IF 1.1 4区 计算机科学
Algorithmica Pub Date : 2023-09-25 DOI: 10.1007/s00453-023-01173-5
Félix Hernández, Gerardo Vega
{"title":"The Subfield and Extended Codes of a Subclass of Optimal Three-Weight Cyclic Codes","authors":"Félix Hernández,&nbsp;Gerardo Vega","doi":"10.1007/s00453-023-01173-5","DOIUrl":"10.1007/s00453-023-01173-5","url":null,"abstract":"<div><p>A class of optimal three-weight <span>([q^k-1,k+1,q^{k-1}(q-1)-1])</span> cyclic codes over <span>({mathrm{I!F}}_q)</span>, with <span>(kge 2)</span>, achieving the Griesmer bound, was presented by Heng and Yue (IEEE Trans Inf Theory 62(8):4501–4513, 2016. https://doi.org/10.1109/TIT.2016.2550029). In this paper we study some of the subfield codes of this class of optimal cyclic codes when <span>(k=2)</span>. The weight distributions of the subfield codes are settled. It turns out that some of these codes are optimal and others have the best known parameters. The duals of the subfield codes are also investigated and found to be almost optimal with respect to the sphere-packing bound. In addition, the covering structure for the studied subfield codes is determined. Some of these codes are found to have the important property that any nonzero codeword is minimal, which is a desirable property that is useful in the design of a secret sharing scheme based on a linear code. Moreover, a specific example of a secret sharing scheme based on one of these subfield codes is given. Finally, a class of optimal two-weight linear codes over <span>({mathrm{I!F}}_q)</span>, achieving the Griesmer bound, whose duals are almost optimal with respect to the sphere-packing bound is presented. Through a different approach, this class of optimal two-weight linear codes was reported very recently by Heng (IEEE Trans Inf Theory 69(2):978–994, 2023. https://doi.org/10.1109/TIT.2022.3203380). Furthermore, it is shown that these optimal codes can be used to construct strongly regular graphs.\u0000\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"85 12","pages":"3973 - 3995"},"PeriodicalIF":1.1,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01173-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134797494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信