Algorithmica最新文献

筛选
英文 中文
Approximation Algorithms for Covering Vertices by Long Paths 用长路径覆盖顶点的近似算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-28 DOI: 10.1007/s00453-024-01242-3
Mingyang Gong, Brett Edgar, Jing Fan, Guohui Lin, Eiji Miyano
{"title":"Approximation Algorithms for Covering Vertices by Long Paths","authors":"Mingyang Gong,&nbsp;Brett Edgar,&nbsp;Jing Fan,&nbsp;Guohui Lin,&nbsp;Eiji Miyano","doi":"10.1007/s00453-024-01242-3","DOIUrl":"10.1007/s00453-024-01242-3","url":null,"abstract":"<div><p>Given a graph, the general problem to cover the maximum number of vertices by a collection of vertex-disjoint long paths seems to escape from the literature. A path containing at least <i>k</i> vertices is considered long. When <span>(k le 3)</span>, the problem is polynomial time solvable; when <i>k</i> is the total number of vertices, the problem reduces to the Hamiltonian path problem, which is NP-complete. For a fixed <span>(k ge 4)</span>, the problem is NP-hard and the best known approximation algorithm for the weighted set packing problem implies a <i>k</i>-approximation algorithm. To the best of our knowledge, there is no approximation algorithm directly designed for the general problem; when <span>(k = 4)</span>, the problem admits a 4-approximation algorithm which was presented recently. We propose the first <span>((0.4394 k + O(1)))</span>-approximation algorithm for the general problem and an improved 2-approximation algorithm when <span>(k = 4)</span>. Both algorithms are based on local improvement, and their theoretical performance analyses are done via amortization and their practical performance is examined through simulation studies.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2625 - 2651"},"PeriodicalIF":0.9,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141170080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parity Permutation Pattern Matching 奇偶校验模式匹配
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-22 DOI: 10.1007/s00453-024-01237-0
Virginia Ardévol Martínez, Florian Sikora, Stéphane Vialette
{"title":"Parity Permutation Pattern Matching","authors":"Virginia Ardévol Martínez,&nbsp;Florian Sikora,&nbsp;Stéphane Vialette","doi":"10.1007/s00453-024-01237-0","DOIUrl":"10.1007/s00453-024-01237-0","url":null,"abstract":"<div><p>Given two permutations, a pattern <span>(sigma )</span> and a text <span>(pi )</span>, <span>Parity Permutation Pattern Matching</span> asks whether there exists a parity and order preserving embedding of <span>(sigma )</span> into <span>(pi )</span>. While it is known that <span>Permutation Pattern Matching</span> is in <span>(textsc {FPT})</span>, we show that adding the parity constraint to the problem makes it <span>(textsc {W}[1])</span>-hard, even for alternating permutations or for 4321-avoiding patterns. However, the problem remains in <span>(textsc {FPT})</span> if <span>(pi )</span> avoids a fixed permutation, thanks to a recent meta-theorem on twin-width. On the other hand, as for the classical version, <span>Parity Permutation Pattern Matching</span> remains polynomial-time solvable when the pattern is separable, or if both permutations are 321-avoiding, but <span>NP</span>-hard if <span>(sigma )</span> is 321-avoiding and <span>(pi )</span> is 4321-avoiding.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2605 - 2624"},"PeriodicalIF":0.9,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions 超越不可交函数,通过推广原初-双重方法改进逼近算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-20 DOI: 10.1007/s00453-024-01235-2
Ishan Bansal, Joseph Cheriyan, Logan Grout, Sharat Ibrahimpur
{"title":"Improved Approximation Algorithms by Generalizing the Primal-Dual Method Beyond Uncrossable Functions","authors":"Ishan Bansal,&nbsp;Joseph Cheriyan,&nbsp;Logan Grout,&nbsp;Sharat Ibrahimpur","doi":"10.1007/s00453-024-01235-2","DOIUrl":"10.1007/s00453-024-01235-2","url":null,"abstract":"<div><p>We address long-standing open questions raised by Williamson, Goemans, Vazirani and Mihail pertaining to the design of approximation algorithms for problems in network design via the primal-dual method (Williamson et al. in Combinatorica 15(3):435–454, 1995. https://doi.org/10.1007/BF01299747). Williamson et al. prove an approximation ratio of two for connectivity augmentation problems where the connectivity requirements can be specified by uncrossable functions. They state: “Extending our algorithm to handle non-uncrossable functions remains a challenging open problem. The key feature of uncrossable functions is that there exists an optimal dual solution which is laminar ... A larger open issue is to explore further the power of the primal-dual approach for obtaining approximation algorithms for other combinatorial optimization problems.” Our main result proves that the primal-dual algorithm of Williamson et al. achieves an approximation ratio of <span>(16)</span> for a class of functions that generalizes the notion of an uncrossable function. There exist instances that can be handled by our methods where none of the optimal dual solutions has a laminar support. We present three applications of our main result to problems in the area of network design. (1)  A <span>(16)</span>-approximation algorithm for augmenting a family of small cuts of a graph <i>G</i>. The previous best approximation ratio was <span>(O(log {|V(G)|}))</span>. (2)  A <span>(16cdot {lceil k/u_{min} rceil })</span>-approximation algorithm for the Cap-<i>k</i>-ECSS problem which is as follows: Given an undirected graph <span>(G = (V,E))</span> with edge costs <span>(c in {mathbb {Q}}_{ge 0}^E)</span> and edge capacities <span>(u in {mathbb {Z}}_{ge 0}^E)</span>, find a minimum-cost subset of the edges <span>(Fsubseteq E)</span> such that the capacity of any cut in (<i>V</i>, <i>F</i>) is at least <i>k</i>; <span>(u_{min})</span> (respectively, <span>(u_{max})</span>) denotes the minimum (respectively, maximum) capacity of an edge in <i>E</i>, and w.l.o.g. <span>(u_{max} le k)</span>. The previous best approximation ratio was <span>(min (O(log {|V|}), k, 2u_{max}))</span>. (3)  A <span>(20)</span>-approximation algorithm for the model of (<i>p</i>, 2)-Flexible Graph Connectivity. The previous best approximation ratio was <span>(O(log {|V(G)|}))</span>, where <i>G</i> denotes the input graph.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2575 - 2604"},"PeriodicalIF":0.9,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141153393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized Approximation Algorithms and Lower Bounds for k-Center Clustering and Variants k 中心聚类及其变体的参数化近似算法和下限
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-13 DOI: 10.1007/s00453-024-01236-1
Sayan Bandyapadhyay, Zachary Friggstad, Ramin Mousavi
{"title":"Parameterized Approximation Algorithms and Lower Bounds for k-Center Clustering and Variants","authors":"Sayan Bandyapadhyay,&nbsp;Zachary Friggstad,&nbsp;Ramin Mousavi","doi":"10.1007/s00453-024-01236-1","DOIUrl":"10.1007/s00453-024-01236-1","url":null,"abstract":"<div><p><i>k</i>-center is one of the most popular clustering models. While it admits a simple 2-approximation in polynomial time in general metrics, the Euclidean version is NP-hard to approximate within a factor of 1.82, even in the plane, if one insists the dependence on <i>k</i> in the running time be polynomial. Without this restriction, a classic algorithm by Agarwal and Procopiuc [Algorithmica 2002] yields an <span>(O(nlog k)+(1/epsilon )^{O(2^dk^{1-1/d}log k)})</span>-time <span>((1+epsilon ))</span>-approximation for Euclidean <i>k</i>-center, where <i>d</i> is the dimension. We show for a closely related problem, <i>k</i>-supplier, the double-exponential dependence on dimension is unavoidable if one hopes to have a sub-linear dependence on <i>k</i> in the exponent. We also derive similar algorithmic results to the ones by Agarwal and Procopiuc for both <i>k</i>-center and <i>k</i>-supplier. We use a relatively new tool, called Voronoi separator, which makes our algorithms and analyses substantially simpler. Furthermore we consider a well-studied generalization of <i>k</i>-center, called Non-uniform <i>k</i>-center (NUkC), where we allow different radii clusters. NUkC is NP-hard to approximate within any factor, even in the Euclidean case. We design a <span>(2^{O(klog k)}n^2)</span> time 3-approximation for NUkC in general metrics, and a <span>(2^{O((klog k)/epsilon )}dn)</span> time <span>((1+epsilon ))</span>-approximation for Euclidean NUkC. The latter time bound matches the bound for <i>k</i>-center.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2557 - 2574"},"PeriodicalIF":0.9,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sample-Based Distance-Approximation for Subsequence-Freeness 基于样本的无后续距离近似法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-13 DOI: 10.1007/s00453-024-01233-4
Omer Cohen Sidon, Dana Ron
{"title":"Sample-Based Distance-Approximation for Subsequence-Freeness","authors":"Omer Cohen Sidon,&nbsp;Dana Ron","doi":"10.1007/s00453-024-01233-4","DOIUrl":"10.1007/s00453-024-01233-4","url":null,"abstract":"<div><p>In this work, we study the problem of approximating the distance to subsequence-freeness in the sample-based distribution-free model. For a given subsequence (word) <span>(w = w_1 ldots w_k)</span>, a sequence (text) <span>(T = t_1 ldots t_n)</span> is said to contain <i>w</i> if there exist indices <span>(1 le i_1&lt; cdots &lt; i_k le n)</span> such that <span>(t_{i_{j}} = w_j)</span> for every <span>(1 le j le k)</span>. Otherwise, <i>T</i> is <i>w</i>-free. Ron and Rosin (ACM Trans Comput Theory 14(4):1–31, 2022) showed that the number of samples both necessary and sufficient for one-sided error testing of subsequence-freeness in the sample-based distribution-free model is <span>(Theta (k/epsilon ))</span>. Denoting by <span>(Delta (T,w,p))</span> the distance of <i>T</i> to <i>w</i>-freeness under a distribution <span>(p:[n]rightarrow [0,1])</span>, we are interested in obtaining an estimate <span>(widehat{Delta })</span>, such that <span>(|widehat{Delta }- Delta (T,w,p)| le delta )</span> with probability at least 2/3, for a given error parameter <span>(delta )</span>. Our main result is a sample-based distribution-free algorithm whose sample complexity is <span>(tilde{O}(k^2/delta ^2))</span>. We first present an algorithm that works when the underlying distribution <i>p</i> is uniform, and then show how it can be modified to work for any (unknown) distribution <i>p</i>. We also show that a quadratic dependence on <span>(1/delta )</span> is necessary.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2519 - 2556"},"PeriodicalIF":0.9,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01233-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fourier Analysis Meets Runtime Analysis: Precise Runtimes on Plateaus 傅立叶分析与运行时间分析的结合:高原上的精确运行时间
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-10 DOI: 10.1007/s00453-024-01232-5
Benjamin Doerr, Andrew James Kelley
{"title":"Fourier Analysis Meets Runtime Analysis: Precise Runtimes on Plateaus","authors":"Benjamin Doerr,&nbsp;Andrew James Kelley","doi":"10.1007/s00453-024-01232-5","DOIUrl":"10.1007/s00453-024-01232-5","url":null,"abstract":"<div><p>We propose a new method based on discrete Fourier analysis to analyze the time evolutionary algorithms spend on plateaus. This immediately gives a concise proof of the classic estimate of the expected runtime of the <span>((1+1))</span> evolutionary algorithm on the Needle problem due to Garnier et al. (Evol Comput 7:173–203, 1999). We also use this method to analyze the runtime of the <span>((1+1))</span> evolutionary algorithm on a benchmark consisting of <span>(n/ell )</span> plateaus of effective size <span>(2^ell -1)</span> which have to be optimized sequentially in a LeadingOnes fashion. Using our new method, we determine the precise expected runtime both for static and fitness-dependent mutation rates. We also determine the asymptotically optimal static and fitness-dependent mutation rates. For <span>(ell = o(n))</span>, the optimal static mutation rate is approximately 1.59/<i>n</i>. The optimal fitness dependent mutation rate, when the first <i>k</i> fitness-relevant bits have been found, is asymptotically <span>(1/(k+1))</span>. These results, so far only proven for the single-instance problem LeadingOnes, thus hold for a much broader class of problems. We expect similar extensions to be true for other important results on LeadingOnes. We are also optimistic that the Fourier analysis approach can be applied to other plateau problems as well.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2479 - 2518"},"PeriodicalIF":0.9,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Planar Drawings with Few Slopes of Halin Graphs and Nested Pseudotrees 哈林图和嵌套伪树的少斜率平面图
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-09 DOI: 10.1007/s00453-024-01230-7
Steven Chaplick, Giordano Da Lozzo, Emilio Di Giacomo, Giuseppe Liotta, Fabrizio Montecchiani
{"title":"Planar Drawings with Few Slopes of Halin Graphs and Nested Pseudotrees","authors":"Steven Chaplick,&nbsp;Giordano Da Lozzo,&nbsp;Emilio Di Giacomo,&nbsp;Giuseppe Liotta,&nbsp;Fabrizio Montecchiani","doi":"10.1007/s00453-024-01230-7","DOIUrl":"10.1007/s00453-024-01230-7","url":null,"abstract":"<div><p>The <i>planar slope number</i> <span>({{,textrm{psn},}}(G))</span> of a planar graph <i>G</i> is the minimum number of edge slopes in a planar straight-line drawing of <i>G</i>. It is known that <span>({{,textrm{psn},}}(G) in O(c^{Delta }))</span> for every planar graph <i>G</i> of maximum degree <span>(Delta )</span>. This upper bound has been improved to <span>(O(Delta ^5))</span> if <i>G</i> has treewidth three, and to <span>(O(Delta ))</span> if <i>G</i> has treewidth two. In this paper we prove <span>({{,textrm{psn},}}(G) le max {4,Delta })</span> when <i>G</i> is a Halin graph, and thus has treewidth three. Furthermore, we present the first polynomial upper bound on the planar slope number for a family of graphs having treewidth four. Namely we show that <span>(O(Delta ^2))</span> slopes suffice for nested pseudotrees.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2413 - 2447"},"PeriodicalIF":0.9,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01230-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nearly Time-Optimal Kernelization Algorithms for the Line-Cover Problem with Big Data 大数据中线路覆盖问题的近乎时间最优核化算法
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-09 DOI: 10.1007/s00453-024-01231-6
Jianer Chen, Qin Huang, Iyad Kanj, Ge Xia
{"title":"Nearly Time-Optimal Kernelization Algorithms for the Line-Cover Problem with Big Data","authors":"Jianer Chen,&nbsp;Qin Huang,&nbsp;Iyad Kanj,&nbsp;Ge Xia","doi":"10.1007/s00453-024-01231-6","DOIUrl":"10.1007/s00453-024-01231-6","url":null,"abstract":"<div><p>Based on well-known complexity theory conjectures, any polynomial-time kernelization algorithm for the NP-hard <span>Line-</span><span>Cover</span> problem produces a kernel of size <span>(Omega (k^2))</span>, where <i>k</i> is the size of the sought line cover. Motivated by the current research in massive data processing, we study the existence of kernelization algorithms with limited space and time complexity for <span>Line-</span><span>Cover</span>. We prove that every kernelization algorithm for <span>Line-Cover</span> takes time <span>(Omega (n log k + k^2 log k))</span>, and present a randomized kernelization algorithm for <span>Line-</span><span>Cover</span> that produces a kernel of size bounded by <span>(k^2)</span>, and runs in time <span>({mathcal {O}}(n log k + k^2 (log k log log k)^2))</span> and space <span>({mathcal {O}}(k^2log ^{2} k))</span>. Our techniques are also useful for developing deterministic kernelization algorithms for <span>Line-</span><span>Cover</span> with limited space and improved running time, and for developing streaming kernelization algorithms for <span>Line-</span><span>Cover</span> with near-optimal update-time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2448 - 2478"},"PeriodicalIF":0.9,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Multiset Submodular Cover 在线多集次模态覆盖
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-05-08 DOI: 10.1007/s00453-024-01234-3
Magnús M. Halldórsson, Dror Rawitz
{"title":"Online Multiset Submodular Cover","authors":"Magnús M. Halldórsson,&nbsp;Dror Rawitz","doi":"10.1007/s00453-024-01234-3","DOIUrl":"10.1007/s00453-024-01234-3","url":null,"abstract":"<div><p>We study the <span>Online Multiset Submodular Cover</span> problem (<span>OMSC</span>), where we are given a universe <i>U</i> of elements and a collection of subsets <span>(mathcal {S}subseteq 2^U)</span>. Each element <span>(u_j in U)</span> is associated with a nonnegative, nondecreasing, submodular polynomially computable set function <span>(f_j)</span>. Initially, the elements are uncovered, and therefore we pay a penalty per each unit of uncovered element. Subsets with various coverage and cost arrive online. Upon arrival of a new subset, the online algorithm must decide how many copies of the arriving subset to add to the solution. This decision is irrevocable, in the sense that the algorithm will not be able to add more copies of this subset in the future. On the other hand, the algorithm can drop copies of a subset, but such copies cannot be retrieved later. The goal is to minimize the total cost of subsets taken plus penalties for uncovered elements. We present an <span>(O(sqrt{rho _{max }}))</span>-competitive algorithm for <span>OMSC</span> that does not dismiss subset copies that were taken into the solution, but relies on prior knowledge of the value of <span>(rho _{max })</span>, where <span>(rho _{max })</span> is the maximum ratio, over all subsets, between the penalties covered by a subset and its cost. We provide an <span>(Oleft( log (rho _{max }) sqrt{rho _{max }} right) )</span>-competitive algorithm for <span>OMSC</span> that does not rely on advance knowledge of <span>(rho _{max })</span> but uses dismissals of previously taken subsets. Finally, for the capacitated versions of the <span>Online Multiset Multicover</span> problem, we obtain an <span>(O(sqrt{rho _{max }'}))</span>-competitive algorithm when <span>(rho _{max }')</span> is known and an <span>(Oleft( log (rho _{max }') sqrt{rho _{max }'} right) )</span>-competitive algorithm when <span>(rho _{max }')</span> is unknown, where <span>(rho _{max }')</span> is the maximum ratio over all subset incarnations between the penalties covered by this incarnation and its cost.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2393 - 2411"},"PeriodicalIF":0.9,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01234-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Runtime Analysis of Competitive Co-evolutionary Algorithms for Maximin Optimisation of a Bilinear Function 双线性函数最大优化的竞争性协同进化算法的运行分析
IF 0.9 4区 计算机科学
Algorithmica Pub Date : 2024-04-27 DOI: 10.1007/s00453-024-01218-3
Per Kristian Lehre
{"title":"Runtime Analysis of Competitive Co-evolutionary Algorithms for Maximin Optimisation of a Bilinear Function","authors":"Per Kristian Lehre","doi":"10.1007/s00453-024-01218-3","DOIUrl":"10.1007/s00453-024-01218-3","url":null,"abstract":"<div><p>Co-evolutionary algorithms have a wide range of applications, such as in hardware design, evolution of strategies for board games, and patching software bugs. However, these algorithms are poorly understood and applications are often limited by pathological behaviour, such as loss of gradient, relative over-generalisation, and mediocre objective stasis. It is an open challenge to develop a theory that can predict when co-evolutionary algorithms find solutions efficiently and reliable. This paper provides a first step in developing runtime analysis for population-based competitive co-evolutionary algorithms. We provide a mathematical framework for describing and reasoning about the performance of co-evolutionary processes. To illustrate the framework, we introduce a population-based co-evolutionary algorithm called PDCoEA, and prove that it obtains a solution to a bilinear maximin optimisation problem in expected polynomial time. Finally, we describe settings where PDCoEA needs exponential time with overwhelmingly high probability to obtain a solution.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2352 - 2392"},"PeriodicalIF":0.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01218-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140812477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信