Algorithmica最新文献

筛选
英文 中文
Semi-streaming Algorithms for Submodular Function Maximization Under b-Matching, Matroid, and Matchoid Constraints b-匹配、Matroid 和 Matchoid 约束条件下的次模态函数最大化半流算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-14 DOI: 10.1007/s00453-024-01272-x
Chien-Chung Huang, François Sellier
{"title":"Semi-streaming Algorithms for Submodular Function Maximization Under b-Matching, Matroid, and Matchoid Constraints","authors":"Chien-Chung Huang,&nbsp;François Sellier","doi":"10.1007/s00453-024-01272-x","DOIUrl":"10.1007/s00453-024-01272-x","url":null,"abstract":"<div><p>We consider the problem of maximizing a non-negative submodular function under the <i>b</i>-matching constraint, in the semi-streaming model. When the function is linear, monotone, and non-monotone, we obtain the approximation ratios of <span>(2+varepsilon )</span>, <span>(3 + 2 sqrt{2} approx 5.828)</span>, and <span>(4 + 2 sqrt{3} approx 7.464)</span>, respectively. We also consider a generalized problem, where a <i>k</i>-uniform hypergraph is given, along with an extra matroid or a <span>(k')</span>-matchoid constraint imposed on the edges, with the same goal of finding a <i>b</i>-matching that maximizes a submodular function. When the extra constraint is a matroid, we obtain the approximation ratios of <span>(k + 1 + varepsilon )</span>, <span>(k + 2sqrt{k+1} + 2)</span>, and <span>(k + 2sqrt{k + 2} + 3)</span> for linear, monotone and non-monotone submodular functions, respectively. When the extra constraint is a <span>(k')</span>-matchoid, we attain the approximation ratio <span>(frac{8}{3}k+ frac{64}{9}k' + O(1))</span> for general submodular functions.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3598 - 3628"},"PeriodicalIF":0.9,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142248533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Parameterized Complexity of Compact Set Packing 论紧凑集合打包的参数化复杂性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-13 DOI: 10.1007/s00453-024-01269-6
Ameet Gadekar
{"title":"On the Parameterized Complexity of Compact Set Packing","authors":"Ameet Gadekar","doi":"10.1007/s00453-024-01269-6","DOIUrl":"10.1007/s00453-024-01269-6","url":null,"abstract":"<div><p>The <span>Set Packing</span> problem is, given a collection of sets <span>(mathcal {S})</span> over a ground set <i>U</i>, to find a maximum collection of sets that are pairwise disjoint. The problem is among the most fundamental NP-hard optimization problems that have been studied extensively in various computational regimes. The focus of this work is on parameterized complexity, <span>Parameterized Set Packing</span> (<span>PSP</span>): Given parameter <span>(r in {mathbb N})</span>, is there a collection <span>( mathcal {S}' subseteq mathcal {S}: |mathcal {S}'| = r)</span> such that the sets in <span>(mathcal {S}')</span> are pairwise disjoint? Unfortunately, the problem is not fixed parameter tractable unless <span>(textsf {W[1]} = textsf {FPT} )</span>, and, in fact, an “enumerative” running time of <span>(|mathcal {S}|^{Omega (r)})</span> is required unless the exponential time hypothesis (ETH) fails. This paper is a quest for tractable instances of <span>Set Packing</span> from parameterized complexity perspectives. We say that the input <span>(({U},mathcal {S}))</span> is “compact” if <span>(|{U}| = f(r)cdot textsf {poly} ( log |mathcal {S}|))</span>, for some <span>(f(r) ge r)</span>. In the <span>Compact PSP</span> problem, we are given a compact instance of <span>PSP</span>. In this direction, we present a “dichotomy” result of <span>PSP</span>: When <span>(|{U}| = f(r)cdot o(log |mathcal {S}|))</span>, <span>PSP</span> is in <span>FPT</span>, while for <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>, the problem is <span>W[1]</span>-hard; moreover, assuming ETH, <span>Compact PSP</span> does not admit <span>(|mathcal {S}|^{o(r/log r)})</span> time algorithm even when <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>. Although certain results in the literature imply hardness of compact versions of related problems such as <span>Set</span> <span>(r)</span><span>-Covering</span> and <span>Exact</span> <span>(r)</span><span>-Covering</span>, these constructions fail to extend to <span>Compact PSP</span>. A novel contribution of our work is the identification and construction of a gadget, which we call Compatible Intersecting Set System pair, that is crucial in obtaining the hardness result for <span>Compact PSP</span>. Finally, our framework can be extended to obtain improved running time lower bounds for <span>Compact</span> <span>(r)</span><span>-VectorSum</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3579 - 3597"},"PeriodicalIF":0.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01269-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ultimate Greedy Approximation of Independent Sets in Subcubic Graphs 子立方图中独立集的终极贪婪逼近
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-12 DOI: 10.1007/s00453-024-01268-7
Piotr Krysta, Mathieu Mari, Nan Zhi
{"title":"Ultimate Greedy Approximation of Independent Sets in Subcubic Graphs","authors":"Piotr Krysta,&nbsp;Mathieu Mari,&nbsp;Nan Zhi","doi":"10.1007/s00453-024-01268-7","DOIUrl":"10.1007/s00453-024-01268-7","url":null,"abstract":"<div><p>We study the approximability of the maximum size independent set (MIS) problem in bounded degree graphs. This is one of the most classic and widely studied NP-hard optimization problems. It is known for its inherent hardness of approximation. We focus on the well known minimum-degree greedy algorithm for this problem. This algorithm iteratively chooses a minimum degree vertex in the graph, adds it to the solution and removes its neighbors, until the remaining graph is empty. The approximation ratios of this algorithm have been widely studied, where it is augmented with an advice that tells the greedy algorithm which minimum degree vertex to choose if it is not unique. Our main contribution is a new mathematical theory for the design of such greedy algorithms for MIS with efficiently computable advice and for the analysis of their approximation ratios. Using this theory we obtain the ultimate approximation ratio of 5/4 for greedy algorithms on graphs with maximum degree 3, which completely solves an open problem from the paper by Halldórsson and Yoshihara (in: Staples, Eades, Katoh, Moffat (eds) Algorithms and computations—ISAAC ’95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995) . Our algorithm is the fastest currently known algorithm for MIS with this approximation ratio on such graphs. We also obtain a simple and short proof of the <span>((Delta +2)/3)</span>-approximation ratio of any greedy algorithms on graphs with maximum degree <span>(Delta )</span>, the result proved previously by Halldórsson and Radhakrishnan (Nord J Comput 1:475–492, 1994) . We almost match this ratio by showing a lower bound of <span>((Delta +1)/3)</span> on the ratio of a greedy algorithm that can use an advice. We apply our new algorithm to the minimum vertex cover problem on graphs with maximum degree 3 to obtain a substantially faster 6/5-approximation algorithm than the one currently known. We complement our algorithmic, upper bound results with lower bound results, which show that the problem of designing good advice for greedy algorithms for MIS is computationally hard and even hard to approximate on various classes of graphs. These results significantly improve on the previously known hardness results. Moreover, these results suggest that obtaining the upper bound results on the design and analysis of the greedy advice is non-trivial.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3518 - 3578"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing Connectedness of Images 测试图像的关联性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-12 DOI: 10.1007/s00453-024-01248-x
Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache
{"title":"Testing Connectedness of Images","authors":"Piotr Berman,&nbsp;Meiram Murzabulatov,&nbsp;Sofya Raskhodnikova,&nbsp;Dragos-Florian Ristache","doi":"10.1007/s00453-024-01248-x","DOIUrl":"10.1007/s00453-024-01248-x","url":null,"abstract":"<div><p>We investigate algorithms for testing whether an image is connected. Given a proximity parameter <span>({epsilon }in (0,1))</span> and query access to a black-and-white image represented by an <span>(ntimes n)</span> matrix of Boolean pixel values, a (1-sided error) connectedness tester accepts if the image is connected and rejects with probability at least 2/3 if the image is <span>({epsilon })</span>-far from connected. We show that connectedness can be tested nonadaptively with <span>(OBig (frac{1}{{epsilon }^2}Big ))</span> queries and adaptively with <span>(OBig (frac{1}{{epsilon }^{3/2}} sqrt{log frac{1}{{epsilon }}}Big ))</span> queries. The best connectedness tester to date, by Berman, Raskhodnikova, and Yaroslavtsev (STOC 2014) had query complexity <span>(OBig (frac{1}{{epsilon }^2}log frac{1}{{epsilon }}Big ))</span> and was adaptive. We also prove that every nonadaptive, 1-sided error tester for connectedness must make <span>(Omega Big (frac{1}{{epsilon }}log frac{1}{{epsilon }}Big ))</span> queries.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3496 - 3517"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Romeo and Juliet Meeting in Forest Like Regions 罗密欧与朱丽叶在森林般的地区相遇
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-03 DOI: 10.1007/s00453-024-01264-x
Neeldhara Misra, Manas Mulpuri, Prafullkumar Tale, Gaurav Viramgami
{"title":"Romeo and Juliet Meeting in Forest Like Regions","authors":"Neeldhara Misra,&nbsp;Manas Mulpuri,&nbsp;Prafullkumar Tale,&nbsp;Gaurav Viramgami","doi":"10.1007/s00453-024-01264-x","DOIUrl":"10.1007/s00453-024-01264-x","url":null,"abstract":"<div><p>The game of rendezvous with adversaries is a game on a graph played by two players: <i>Facilitator</i> and <i>Divider</i>. Facilitator has two agents and Divider has a team of <span>(k ge 1)</span> agents. While the initial positions of Facilitator’s agents are fixed, Divider gets to select the initial positions of his agents. Then, they take turns to move their agents to adjacent vertices (or stay put) with Facilitator’s goal to bring both her agents at same vertex and Divider’s goal to prevent it. The computational question of interest is to determine if Facilitator has a winning strategy against Divider with <i>k</i> agents. Fomin, Golovach, and Thilikos [WG, 2021] introduced this game and proved that it is <span>PSPACE</span>-<span>hard</span> and <span>co</span>-<span>W</span>[2]-<span>hard</span> parameterized by the number of agents. This hardness naturally motivates the structural parameterization of the problem. The authors proved that it admits an <span>FPT</span> algorithm when parameterized by the modular width and the number of allowed rounds. However, they left open the complexity of the problem from the perspective of other structural parameters. In particular, they explicitly asked whether the problem admits an <span>FPT</span> or <span>XP</span>-algorithm with respect to the treewidth of the input graph. We answer this question in the negative and show that <span>Rendezvous</span> is <span>co</span>-<span>NP</span>-<span>hard</span> even for graphs of constant treewidth. Further, we show that the problem is <span>co</span>-<span>W</span>[1]-<span>hard</span> when parameterized by the feedback vertex set number and the number of agents, and is unlikely to admit a polynomial kernel when parameterized by the vertex cover number and the number of agents. Complementing these hardness results, we show that the <span>Rendezvous</span> is <span>FPT</span> when parameterized by both the vertex cover number and the solution size. Finally, for graphs of treewidth at most two and girds, we show that the problem can be solved in polynomial time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3465 - 3495"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connected k-Center and k-Diameter Clustering 连接的 k 中心和 k 直径聚类
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-02 DOI: 10.1007/s00453-024-01266-9
Lukas Drexler, Jan Eube, Kelin Luo, Dorian Reineccius, Heiko Röglin, Melanie Schmidt, Julian Wargalla
{"title":"Connected k-Center and k-Diameter Clustering","authors":"Lukas Drexler,&nbsp;Jan Eube,&nbsp;Kelin Luo,&nbsp;Dorian Reineccius,&nbsp;Heiko Röglin,&nbsp;Melanie Schmidt,&nbsp;Julian Wargalla","doi":"10.1007/s00453-024-01266-9","DOIUrl":"10.1007/s00453-024-01266-9","url":null,"abstract":"<div><p>Motivated by an application from geodesy, we study the <i>connected k-center problem</i> and the <i>connected k-diameter problem</i>. The former problem has been introduced by Ge et al. (ACM Trans Knowl Discov Data 2(2):1–35, 2008. https://doi.org/10.1145/1376815.1376816) to model clustering of data sets with both attribute and relationship data. These problems arise from the classical <i>k</i>-center and <i>k</i>-diameter problems by adding a side constraint. For the side constraint, we are given an undirected <i>connectivity graph</i> <i>G</i> on the input points, and a clustering is now only feasible if every cluster induces a connected subgraph in <i>G</i>. Usually in clustering problems one assumes that the clusters are pairwise disjoint. We study this case but additionally also the case that clusters are allowed to be non-disjoint. This can help to satisfy the connectivity constraints. Our main result is an <span>(O(log ^2k))</span>-approximation algorithm for the disjoint connected <i>k</i>-center and <i>k</i>-diameter problem. For Euclidean spaces of constant dimension and for metrics with constant doubling dimension, the approximation factor improves to <i>O</i>(1). Our algorithm works by computing a non-disjoint connected clustering first and transforming it into a disjoint connected clustering. We complement these upper bounds by several upper and lower bounds for variations and special cases of the model.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3425 - 3464"},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01266-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithmic Meta-Theorems for Combinatorial Reconfiguration Revisited 再论组合重组的算法元定理
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-09-02 DOI: 10.1007/s00453-024-01261-0
Tatsuya Gima, Takehiro Ito, Yasuaki Kobayashi, Yota Otachi
{"title":"Algorithmic Meta-Theorems for Combinatorial Reconfiguration Revisited","authors":"Tatsuya Gima,&nbsp;Takehiro Ito,&nbsp;Yasuaki Kobayashi,&nbsp;Yota Otachi","doi":"10.1007/s00453-024-01261-0","DOIUrl":"10.1007/s00453-024-01261-0","url":null,"abstract":"<div><p>Given a graph and two vertex sets satisfying a certain feasibility condition, a reconfiguration problem asks whether we can reach one vertex set from the other by repeating prescribed modification steps while maintaining feasibility. In this setting, as reported by Mouawad et al. (IPEC, Springer, Berlin, 2014) presented an algorithmic meta-theorem for reconfiguration problems that says if the feasibility can be expressed in monadic second-order logic (MSO), then the problem is fixed-parameter tractable parameterized by <span>(text {treewidth} + ell )</span>, where <span>(ell )</span> is the number of steps allowed to reach the target set. On the other hand, it is shown by Wrochna (J Comput Syst Sci 93:1–10, 2018). https://doi.org/10.1016/j.jcss.2017.11.003) that if <span>(ell )</span> is not part of the parameter, then the problem is PSPACE-complete even on graphs of constant bandwidth. In this paper, we present the first algorithmic meta-theorems for the case where <span>(ell )</span> is not part of the parameter, using some structural graph parameters incomparable with bandwidth. We show that if the feasibility is defined in MSO, then the reconfiguration problem under the so-called token jumping rule is fixed-parameter tractable parameterized by neighborhood diversity. We also show that the problem is fixed-parameter tractable parameterized by <span>(text {treedepth} + k)</span>, where <i>k</i> is the size of sets being transformed. We finally complement the positive result for treedepth by showing that the problem is PSPACE-complete on forests of depth 3.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3395 - 3424"},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Adversarial Streaming Via Differential Privacy and Difference Estimators 通过差分隐私和差分估计器实现对抗流的框架
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-08-31 DOI: 10.1007/s00453-024-01259-8
Idan Attias, Edith Cohen, Moshe Shechner, Uri Stemmer
{"title":"A Framework for Adversarial Streaming Via Differential Privacy and Difference Estimators","authors":"Idan Attias,&nbsp;Edith Cohen,&nbsp;Moshe Shechner,&nbsp;Uri Stemmer","doi":"10.1007/s00453-024-01259-8","DOIUrl":"10.1007/s00453-024-01259-8","url":null,"abstract":"<div><p>Classical streaming algorithms operate under the (not always reasonable) assumption that the input stream is fixed in advance. Recently, there is a growing interest in designing <i>robust streaming algorithms</i> that provide provable guarantees even when the input stream is chosen adaptively as the execution progresses. We propose a new framework for robust streaming that combines techniques from two recently suggested frameworks by Hassidim et al. (NeurIPS 2020) and by Woodruff and Zhou (FOCS 2021). These recently suggested frameworks rely on very different ideas, each with its own strengths and weaknesses. We combine these two frameworks into a single hybrid framework that obtains the “best of both worlds”, thereby solving a question left open by Woodruff and Zhou.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3339 - 3394"},"PeriodicalIF":0.9,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01259-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfiguring Shortest Paths in Graphs 重新配置图中的最短路径
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-08-27 DOI: 10.1007/s00453-024-01263-y
Kshitij Gajjar, Agastya Vibhuti Jha, Manish Kumar, Abhiruk Lahiri
{"title":"Reconfiguring Shortest Paths in Graphs","authors":"Kshitij Gajjar,&nbsp;Agastya Vibhuti Jha,&nbsp;Manish Kumar,&nbsp;Abhiruk Lahiri","doi":"10.1007/s00453-024-01263-y","DOIUrl":"10.1007/s00453-024-01263-y","url":null,"abstract":"<div><p>Reconfiguring two shortest paths in a graph means modifying one shortest path to the other by changing one vertex at a time so that all the intermediate paths are also shortest paths. This problem has several natural applications, namely: (a) repaving road networks, (b) rerouting data packets in a synchronous multiprocessing setting, (c) the shipping container stowage problem, and (d) the train marshalling problem. When modelled as graph problems, (a) is the most general case while (b), (c), (d) are restrictions to different graph classes. We show that (a) does not admit polynomial-time algorithms (assuming <span>({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {NP}},}})</span>), even for relaxed variants of the problem (assuming <span>({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {PSPACE}},}})</span>). For (b), (c), (d), we present polynomial-time algorithms to solve the respective problems. We also generalize the problem to when at most <i>k</i> (for a fixed integer <span>(kge 2)</span>) contiguous vertices on a shortest path can be changed at a time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3309 - 3338"},"PeriodicalIF":0.9,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01263-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized Complexity of Reconfiguration of Atoms 原子重构的参数化复杂性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-08-26 DOI: 10.1007/s00453-024-01262-z
Alexandre Cooper, Stephanie Maaz, Amer E. Mouawad, Naomi Nishimura
{"title":"Parameterized Complexity of Reconfiguration of Atoms","authors":"Alexandre Cooper,&nbsp;Stephanie Maaz,&nbsp;Amer E. Mouawad,&nbsp;Naomi Nishimura","doi":"10.1007/s00453-024-01262-z","DOIUrl":"10.1007/s00453-024-01262-z","url":null,"abstract":"<div><p>Our work is motivated by the challenges presented in preparing arrays of atoms for use in quantum simulation. The recently-developed process of loading atoms into traps results in approximately half of the traps being filled. To consolidate the atoms so that they form a dense and regular arrangement, such as all locations in a grid, atoms are rearranged using moving optical tweezers. Time is of the essence, as the longer that the process takes and the more that atoms are moved, the higher the chance that atoms will be lost in the process. Viewed as a problem on graphs, we wish to solve the problem of reconfiguring one arrangement of tokens (representing atoms) to another using as few moves as possible. Because the problem is <span>NP</span>-complete on general graphs as well as on grids, we focus on the parameterized complexity for various parameters, considering both undirected and directed graphs, and tokens with and without labels. For unlabelled tokens, the problem is fixed-parameter tractable when parameterized by the number of tokens, the number of moves, or the number of moves plus the number of vertices without tokens in either the source or target configuration, but intractable when parameterized by the difference between the number of moves and the number of differences in the placement of tokens in the source and target configurations. When labels are added to tokens, however, most of the tractability results are replaced by hardness results.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3284 - 3308"},"PeriodicalIF":0.9,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信