Algorithmica最新文献

筛选
英文 中文
Stagnation Detection in Highly Multimodal Fitness Landscapes 高度多模态健身景观中的停滞检测
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-07-02 DOI: 10.1007/s00453-024-01249-w
Amirhossein Rajabi, Carsten Witt
{"title":"Stagnation Detection in Highly Multimodal Fitness Landscapes","authors":"Amirhossein Rajabi,&nbsp;Carsten Witt","doi":"10.1007/s00453-024-01249-w","DOIUrl":"10.1007/s00453-024-01249-w","url":null,"abstract":"<div><p>Stagnation detection has been proposed as a mechanism for randomized search heuristics to escape from local optima by automatically increasing the size of the neighborhood to find the so-called gap size, i. e., the distance to the next improvement. Its usefulness has mostly been considered in simple multimodal landscapes with few local optima that could be crossed one after another. In multimodal landscapes with a more complex location of optima of similar gap size, stagnation detection suffers from the fact that the neighborhood size is frequently reset to  1 without using gap sizes that were promising in the past. In this paper, we investigate a new mechanism called <i>radius memory</i> which can be added to stagnation detection to control the search radius more carefully by giving preference to values that were successful in the past. We implement this idea in an algorithm called SD-RLS<span>(^{text {m}})</span> and show compared to previous variants of stagnation detection that it yields speed-ups for linear functions under uniform constraints and the minimum spanning tree problem. Moreover, its running time does not significantly deteriorate on unimodal functions and a generalization of the <span>Jump</span> benchmark. Finally, we present experimental results carried out to study SD-RLS<span>(^{text {m}})</span> and compare it with other algorithms.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 9","pages":"2929 - 2958"},"PeriodicalIF":0.9,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01249-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141550368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized Complexity of Streaming Diameter and Connectivity Problems 流媒体直径和连接问题的参数化复杂性
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-06-19 DOI: 10.1007/s00453-024-01246-z
Jelle J. Oostveen, Erik Jan van Leeuwen
{"title":"Parameterized Complexity of Streaming Diameter and Connectivity Problems","authors":"Jelle J. Oostveen,&nbsp;Erik Jan van Leeuwen","doi":"10.1007/s00453-024-01246-z","DOIUrl":"10.1007/s00453-024-01246-z","url":null,"abstract":"<div><p>We initiate the investigation of the parameterized complexity of <span>Diameter</span> and <span>Connectivity</span> in the streaming paradigm. On the positive end, we show that knowing a vertex cover of size <i>k</i> allows for algorithms in the Adjacency List (AL) streaming model whose number of passes is constant and memory is <span>(mathcal {O}(log n))</span> for any fixed <i>k</i>. Underlying these algorithms is a method to execute a breadth-first search in <span>(mathcal {O}(k))</span> passes and <span>(mathcal {O}(k log n))</span> bits of memory. On the negative end, we show that many other parameters lead to lower bounds in the AL model, where <span>(Omega (n/p))</span> bits of memory is needed for any <i>p</i>-pass algorithm even for constant parameter values. In particular, this holds for graphs with a known modulator (deletion set) of constant size to a graph that has no induced subgraph isomorphic to a fixed graph <i>H</i>, for most <i>H</i>. For some cases, we can also show one-pass, <span>(Omega (n log n))</span> bits of memory lower bounds. We also prove a much stronger <span>(Omega (n^2/p))</span> lower bound for <span>Diameter</span> on bipartite graphs. Finally, using the insights we developed into streaming parameterized graph exploration algorithms, we show a new streaming kernelization algorithm for computing a vertex cover of size <i>k</i>. This yields a kernel of 2<i>k</i> vertices (with <span>(mathcal {O}(k^2))</span> edges) produced as a stream in <span>(text {poly}(k))</span> passes and only <span>(mathcal {O}(k log n))</span> bits of memory.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 9","pages":"2885 - 2928"},"PeriodicalIF":0.9,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01246-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141550330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation Algorithms for the Two-Watchman Route in a Simple Polygon 简单多边形中双守望者路线的近似算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-06-19 DOI: 10.1007/s00453-024-01245-0
Bengt J. Nilsson, Eli Packer
{"title":"Approximation Algorithms for the Two-Watchman Route in a Simple Polygon","authors":"Bengt J. Nilsson,&nbsp;Eli Packer","doi":"10.1007/s00453-024-01245-0","DOIUrl":"10.1007/s00453-024-01245-0","url":null,"abstract":"<div><p>The <i>two-watchman route problem</i> is that of computing a pair of closed tours in an environment so that the two tours together see the whole environment and some length measure on the two tours is minimized. Two standard measures are: the minmax measure, where we want the tours where the longest of them has smallest length, and the minsum measure, where we want the tours for which the sum of their lengths is the smallest. It is known that computing a minmax two-watchman route is NP-hard for simple rectilinear polygons and thus also for simple polygons. Also, any <i>c</i>-approximation algorithm for the minmax two-watchman route is automatically a 2<i>c</i>-approximation algorithm for the minsum two-watchman route. We exhibit two constant factor approximation algorithms for computing minmax two-watchman routes in simple polygons with approximation factors 5.969 and 11.939, having running times <span>(O(n^8))</span> and <span>(O(n^4))</span> respectively, where <i>n</i> is the number of vertices of the polygon. We also use the same techniques to obtain a 6.922-approximation for the <i>fixed two-watchman route problem</i> running in <span>(O(n^2))</span> time, i.e., when two starting points of the two tours are given as input.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 9","pages":"2845 - 2884"},"PeriodicalIF":0.9,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01245-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141552997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithms for Matrix Multiplication via Sampling and Opportunistic Matrix Multiplication 通过采样和机会矩阵乘法的矩阵乘法算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-06-17 DOI: 10.1007/s00453-024-01247-y
David G. Harris
{"title":"Algorithms for Matrix Multiplication via Sampling and Opportunistic Matrix Multiplication","authors":"David G. Harris","doi":"10.1007/s00453-024-01247-y","DOIUrl":"10.1007/s00453-024-01247-y","url":null,"abstract":"<div><p>As proposed by Karppa and Kaski (in: Proceedings 30th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2019) a novel “broken\" or \"opportunistic\" matrix multiplication algorithm, based on a variant of Strassen’s algorithm, and used this to develop new algorithms for Boolean matrix multiplication, among other tasks. Their algorithm can compute Boolean matrix multiplication in <span>(O(n^{2.778}))</span> time. While asymptotically faster matrix multiplication algorithms exist, most such algorithms are infeasible for practical problems. We describe an alternative way to use the broken multiplication algorithm to approximately compute matrix multiplication, either for real-valued or Boolean matrices. In brief, instead of running multiple iterations of the broken algorithm on the original input matrix, we form a new larger matrix by sampling and run a single iteration of the broken algorithm on it. Asymptotically, our algorithm has runtime <span>(O(n^{2.763}))</span>, a slight improvement over the Karppa–Kaski algorithm. Since the goal is to obtain new practical matrix-multiplication algorithms, we also estimate the concrete runtime for our algorithm for some large-scale sample problems. It appears that for these parameters, further optimizations are still needed to make our algorithm competitive.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 9","pages":"2822 - 2844"},"PeriodicalIF":0.9,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141550367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Unit Profit Knapsack with Predictions 带预测的在线单位利润包
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-06-13 DOI: 10.1007/s00453-024-01239-y
Joan Boyar, Lene M. Favrholdt, Kim S. Larsen
{"title":"Online Unit Profit Knapsack with Predictions","authors":"Joan Boyar,&nbsp;Lene M. Favrholdt,&nbsp;Kim S. Larsen","doi":"10.1007/s00453-024-01239-y","DOIUrl":"10.1007/s00453-024-01239-y","url":null,"abstract":"<div><p>A variant of the online knapsack problem is considered in the setting of predictions. In Unit Profit Knapsack, the items have unit profit, i.e., the goal is to pack as many items as possible. For Online Unit Profit Knapsack, the competitive ratio is unbounded. In contrast, it is easy to find an optimal solution offline: Pack as many of the smallest items as possible into the knapsack. The prediction available to the online algorithm is the average size of those smallest items that fit in the knapsack. For the prediction error in this hard online problem, we use the ratio <span>(r=frac{a}{hat{a}})</span> where <i>a</i> is the actual value for this average size and <span>(hat{a})</span> is the prediction. We give an algorithm which is <span>(frac{e-1}{e})</span>-competitive, if <span>(r=1)</span>, and this is best possible among online algorithms knowing <i>a</i> and nothing else. More generally, the algorithm has a competitive ratio of <span>(frac{e-1}{e}r)</span>, if <span>(r le 1)</span>, and <span>(frac{e-r}{e}r)</span>, if <span>(1 le r &lt; e)</span>. Any algorithm with a better competitive ratio for some <span>(r&lt;1)</span> will have a worse competitive ratio for some <span>(r&gt;1)</span>. To obtain a positive competitive ratio for all <i>r</i>, we adjust the algorithm, resulting in a competitive ratio of <span>(frac{1}{2r})</span> for <span>(rge 1)</span> and <span>(frac{r}{2})</span> for <span>(rle 1)</span>. We show that improving the result for any <span>(r&lt; 1)</span> leads to a worse result for some <span>(r&gt;1)</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 9","pages":"2786 - 2821"},"PeriodicalIF":0.9,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01239-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141345495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate and Randomized Algorithms for Computing a Second Hamiltonian Cycle 计算第二哈密顿周期的近似算法和随机算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-06-12 DOI: 10.1007/s00453-024-01238-z
Argyrios Deligkas, George B. Mertzios, Paul G. Spirakis, Viktor Zamaraev
{"title":"Approximate and Randomized Algorithms for Computing a Second Hamiltonian Cycle","authors":"Argyrios Deligkas,&nbsp;George B. Mertzios,&nbsp;Paul G. Spirakis,&nbsp;Viktor Zamaraev","doi":"10.1007/s00453-024-01238-z","DOIUrl":"10.1007/s00453-024-01238-z","url":null,"abstract":"<div><p>In this paper we consider the following problem: Given a Hamiltonian graph <i>G</i>, and a Hamiltonian cycle <i>C</i> of <i>G</i>, can we compute a second Hamiltonian cycle <span>(C^{prime } ne C)</span> of <i>G</i>, and if yes, how quickly? If the input graph <i>G</i> satisfies certain conditions (e.g. if every vertex of <i>G</i> is odd, or if the minimum degree is large enough), it is known that such a second Hamiltonian cycle always exists. Despite substantial efforts, no subexponential-time algorithm is known for this problem. In this paper we relax the problem of computing a second Hamiltonian cycle in two ways. First, we consider <i>approximating</i> the length of a second longest cycle on <i>n</i>-vertex graphs with minimum degree <span>(delta )</span> and maximum degree <span>(Delta )</span>. We provide a linear-time algorithm for computing a cycle <span>(C^{prime } ne C)</span> of length at least <span>(n-4alpha (sqrt{n}+2alpha )+8)</span>, where <span>(alpha = frac{Delta -2}{delta -2})</span>. This results provides a constructive proof of a recent result by Girão, Kittipassorn, and Narayanan in the regime of <span>(frac{Delta }{delta } = o(sqrt{n}))</span>. Our second relaxation of the problem is probabilistic. We propose a randomized algorithm which computes a second Hamiltonian cycle <i>with high probability</i>, given that the input graph <i>G</i> has a large enough minimum degree. More specifically, we prove that for every <span>(0&lt;ple 0.02)</span>, if the minimum degree of <i>G</i> is at least <span>(frac{8}{p} log sqrt{8}n + 4)</span>, then a second Hamiltonian cycle can be computed with probability at least <span>(1 - frac{1}{n}left( frac{50}{p^4} + 1 right) )</span> in <span>(poly(n) cdot 2^{4pn})</span> time. This result implies that, when the minimum degree <span>(delta )</span> is sufficiently large, we can compute with high probability a second Hamiltonian cycle faster than any known deterministic algorithm. In particular, when <span>(delta = omega (log n))</span>, our probabilistic algorithm works in <span>(2^{o(n)})</span> time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 9","pages":"2766 - 2785"},"PeriodicalIF":0.9,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01238-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141351753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Geometric Covering and Piercing 在线几何图形覆盖和穿孔
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-06-03 DOI: 10.1007/s00453-024-01244-1
Minati De, Saksham Jain, Sarat Varma Kallepalli, Satyam Singh
{"title":"Online Geometric Covering and Piercing","authors":"Minati De,&nbsp;Saksham Jain,&nbsp;Sarat Varma Kallepalli,&nbsp;Satyam Singh","doi":"10.1007/s00453-024-01244-1","DOIUrl":"10.1007/s00453-024-01244-1","url":null,"abstract":"<div><p>We consider the online version of the piercing set problem, where geometric objects arrive one by one, and the online algorithm must maintain a valid piercing set for the already arrived objects by making irrevocable decisions. It is easy to observe that any deterministic algorithm solving this problem for intervals in <span>(mathbb {R})</span> has a competitive ratio of at least <span>(Omega (n))</span>. This paper considers the piercing set problem for similarly sized objects. We propose a deterministic online algorithm for similarly sized fat objects in <span>(mathbb {R}^d)</span>. For homothetic hypercubes in <span>(mathbb {R}^d)</span> with side length in the range [1, <i>k</i>], we propose a deterministic algorithm having a competitive ratio of at most <span>(3^dlceil log _2 krceil +2^d)</span>. In the end, we show deterministic lower bounds of the competitive ratio for similarly sized <span>(alpha )</span>-fat objects in <span>(mathbb {R}^2)</span> and homothetic hypercubes in <span>(mathbb {R}^d)</span>. Note that piercing translated copies of a convex object is equivalent to the unit covering problem, which is well-studied in the online setup. Surprisingly, no upper bound of the competitive ratio was known for the unit covering problem when the corresponding object is anything other than a ball or a hypercube. Our result yields an upper bound of the competitive ratio for the unit covering problem when the corresponding object is any convex object in <span>(mathbb {R}^d)</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 9","pages":"2739 - 2765"},"PeriodicalIF":0.9,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slim Tree-Cut Width 纤细的树形切割宽度
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-06-01 DOI: 10.1007/s00453-024-01241-4
Robert Ganian, Viktoriia Korchemna
{"title":"Slim Tree-Cut Width","authors":"Robert Ganian,&nbsp;Viktoriia Korchemna","doi":"10.1007/s00453-024-01241-4","DOIUrl":"10.1007/s00453-024-01241-4","url":null,"abstract":"<div><p>Tree-cut width is a parameter that has been introduced as an attempt to obtain an analogue of treewidth for edge cuts. Unfortunately, in spite of its desirable structural properties, it turned out that tree-cut width falls short as an edge-cut based alternative to treewidth in algorithmic aspects. This has led to the very recent introduction of a simple edge-based parameter called edge-cut width [WG 2022], which has precisely the algorithmic applications one would expect from an analogue of treewidth for edge cuts, but does not have the desired structural properties. In this paper, we study a variant of tree-cut width obtained by changing the threshold for so-called thin nodes in tree-cut decompositions from 2 to 1. We show that this “slim tree-cut width” satisfies all the requirements of an edge-cut based analogue of treewidth, both structural and algorithmic, while being less restrictive than edge-cut width. Our results also include an alternative characterization of slim tree-cut width via an easy-to-use spanning-tree decomposition akin to the one used for edge-cut width, a characterization of slim tree-cut width in terms of forbidden immersions as well as approximation algorithm for computing the parameter.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2714 - 2738"},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01241-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating Long Cycle Above Dirac’s Guarantee 逼近狄拉克保证之上的长周期
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-30 DOI: 10.1007/s00453-024-01240-5
Fedor V. Fomin, Petr A. Golovach, Danil Sagunov, Kirill Simonov
{"title":"Approximating Long Cycle Above Dirac’s Guarantee","authors":"Fedor V. Fomin,&nbsp;Petr A. Golovach,&nbsp;Danil Sagunov,&nbsp;Kirill Simonov","doi":"10.1007/s00453-024-01240-5","DOIUrl":"10.1007/s00453-024-01240-5","url":null,"abstract":"<div><p>Parameterization above (or below) a guarantee is a successful concept in parameterized algorithms. The idea is that many computational problems admit “natural” guarantees bringing to algorithmic questions whether a better solution (above the guarantee) could be obtained efficiently. For example, for every boolean CNF formula on <i>m</i> clauses, there is an assignment that satisfies at least <i>m</i>/2 clauses. How difficult is it to decide whether there is an assignment satisfying more than <span>(m/2 +k)</span> clauses? Or, if an <i>n</i>-vertex graph has a perfect matching, then its vertex cover is at least <i>n</i>/2. Is there a vertex cover of size at least <span>(n/2 +k)</span> for some <span>(kge 1)</span> and how difficult is it to find such a vertex cover? The above guarantee paradigm has led to several exciting discoveries in the areas of parameterized algorithms and kernelization. We argue that this paradigm could bring forth fresh perspectives on well-studied problems in approximation algorithms. Our example is the longest cycle problem. One of the oldest results in extremal combinatorics is the celebrated Dirac’s theorem from 1952. Dirac’s theorem provides the following guarantee on the length of the longest cycle: for every 2-connected <i>n</i>-vertex graph <i>G</i> with minimum degree <span>(delta (G)le n/2)</span>, the length of a longest cycle <i>L</i> is at least <span>(2delta (G))</span>. Thus the “essential” part in finding the longest cycle is in approximating the “offset” <span>(k = L - 2 delta (G))</span>. The main result of this paper is the above-guarantee approximation theorem for <i>k</i>. Informally, the theorem says that approximating the offset <i>k</i> is not harder than approximating the total length <i>L</i> of a cycle. In other words, for any (reasonably well-behaved) function <i>f</i>, a polynomial time algorithm constructing a cycle of length <i>f</i>(<i>L</i>) in an undirected graph with a cycle of length <i>L</i>, yields a polynomial time algorithm constructing a cycle of length <span>(2delta (G)+Omega (f(k)))</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2676 - 2713"},"PeriodicalIF":0.9,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01240-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Algorithms for Steiner Tree Reoptimization 斯坦纳树再优化的新算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-29 DOI: 10.1007/s00453-024-01243-2
Davide Bilò
{"title":"New Algorithms for Steiner Tree Reoptimization","authors":"Davide Bilò","doi":"10.1007/s00453-024-01243-2","DOIUrl":"10.1007/s00453-024-01243-2","url":null,"abstract":"<div><p><i>Reoptimization</i> is a setting in which we are given a good approximate solution of an optimization problem instance and a local modification that slightly changes the instance. The main goal is that of finding a good approximate solution of the modified instance. We investigate one of the most studied scenarios in reoptimization known as <i>Steiner tree reoptimization</i>. Steiner tree reoptimization is a collection of strongly <span>(textsf {NP})</span>-hard optimization problems that are defined on top of the classical Steiner tree problem and for which several constant-factor approximation algorithms have been designed in the last decades. In this paper we improve upon all these results by developing a novel technique that allows us to design <i>polynomial-time approximation schemes</i>. Remarkably, prior to this paper, no approximation algorithm better than recomputing a solution from scratch was known for the elusive scenario in which the cost of a single edge decreases. Our results are best possible since none of the problems addressed in this paper admits a fully polynomial-time approximation scheme, unless <span>(textsf {P}=textsf {NP})</span></p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2652 - 2675"},"PeriodicalIF":0.9,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01243-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141170110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信