{"title":"Logical equivalences, homomorphism indistinguishability, and forbidden minors","authors":"Tim Seppelt","doi":"10.1016/j.ic.2024.105224","DOIUrl":"10.1016/j.ic.2024.105224","url":null,"abstract":"<div><p>Two graphs <em>G</em> and <em>H</em> are <em>homomorphism indistinguishable</em> over a graph class <span><math><mi>F</mi></math></span> if for all graphs <span><math><mi>F</mi><mo>∈</mo><mi>F</mi></math></span> the number of homomorphisms from <em>F</em> to <em>G</em> is equal to the number of homomorphisms from <em>F</em> to <em>H</em>. Many graph isomorphism relaxations such as (quantum) isomorphism, spectral, and logical equivalences can be characterised as homomorphism indistinguishability relations over certain graph classes.</p><p>Abstracting from the wealth of such instances, we show in this paper that equivalences w.r.t. any <em>self-complementarity</em> logic admitting a characterisation as homomorphism indistinguishability relation can be characterised by homomorphism indistinguishability over a minor-closed graph class. Self-complementarity is a mild property satisfied by most well-studied logics.</p><p>Furthermore, we classify all graph classes which are in a sense finite and satisfy the maximality condition of being <em>homomorphism distinguishing closed</em>, i.e. adding any graph to the class strictly refines its homomorphism indistinguishability relation. Thereby, we answer various questions raised by Roberson (2022) on properties of the homomorphism distinguishing closure.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105224"},"PeriodicalIF":0.8,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000890/pdfft?md5=8f37aee0808075f72c988f0ff4dd0e3d&pid=1-s2.0-S0890540124000890-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multivariate to bivariate reduction for noncommutative polynomial factorization","authors":"V. Arvind , Pushkar S. Joglekar","doi":"10.1016/j.ic.2024.105223","DOIUrl":"10.1016/j.ic.2024.105223","url":null,"abstract":"<div><p>Based on Bergman's theorem, we show that multivariate noncommutative polynomial factorization is deterministic polynomial-time reducible to the factorization of bivariate noncommutative polynomials. More precisely,</p><ul><li><span>1.</span><span><p>Given an <em>n</em>-variate noncommutative polynomial <span><math><mi>f</mi><mo>∈</mo><mi>F</mi><mo>〈</mo><mi>X</mi><mo>〉</mo></math></span> over a field <span><math><mi>F</mi></math></span> as an arithmetic circuit, computing a complete factorization of <em>f</em> into irreducible factors is deterministic polynomial-time reducible to factorization of a noncommutative bivariate polynomial <span><math><mi>g</mi><mo>∈</mo><mi>F</mi><mo>〈</mo><mi>x</mi><mo>,</mo><mi>y</mi><mo>〉</mo></math></span>; the reduction transforms <em>f</em> into a circuit for <em>g</em>, and given a complete factorization of <em>g</em>, the reduction recovers a complete factorization of <em>f</em> in polynomial time.</p><p>The reduction works both in the white-box and the black-box setting.</p></span></li><li><span>2.</span><span><p>We show over the field of rationals that bivariate linear matrix factorization problem for <span><math><mn>4</mn><mo>×</mo><mn>4</mn></math></span> matrices is at least as hard as factoring square-free integers and for <span><math><mn>3</mn><mo>×</mo><mn>3</mn></math></span> matrices it is in polynomial time.</p></span></li></ul></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105223"},"PeriodicalIF":0.8,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entropic risk for turn-based stochastic games","authors":"Christel Baier , Krishnendu Chatterjee , Tobias Meggendorfer , Jakob Piribauer","doi":"10.1016/j.ic.2024.105214","DOIUrl":"10.1016/j.ic.2024.105214","url":null,"abstract":"<div><p><em>Entropic risk (ERisk)</em> is an established risk measure in finance, quantifying risk by an exponential re-weighting of rewards. We study ERisk for the first time in the context of turn-based stochastic games with the total reward objective. This gives rise to an objective function that demands the control of systems in a risk-averse manner. We show that the resulting games are determined and, in particular, admit optimal memoryless deterministic strategies. This contrasts risk measures that previously have been considered in the special case of Markov decision processes and that require randomization and/or memory. We provide several results on the decidability and the computational complexity of the threshold problem, i.e. whether the optimal value of ERisk exceeds a given threshold. Furthermore, an approximation algorithm for the optimal value of ERisk is provided.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105214"},"PeriodicalIF":0.8,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000798/pdfft?md5=78ded522945b9729ee929e475a58aeb3&pid=1-s2.0-S0890540124000798-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142040314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting causality in the presence of Byzantine processes: The case of synchronous systems","authors":"Anshuman Misra, Ajay D. Kshemkalyani","doi":"10.1016/j.ic.2024.105212","DOIUrl":"10.1016/j.ic.2024.105212","url":null,"abstract":"<div><p>Detecting causality or the “happens before” relation between events in a distributed system is a fundamental building block for distributed applications. It was recently proved that this problem cannot be solved in an asynchronous distributed system in the presence of Byzantine processes, irrespective of whether the communication mechanism is via unicasts, multicasts, or broadcasts. In light of this impossibility result, we turn attention to synchronous systems and examine the possibility of solving the causality detection problem in such systems. In this paper, we prove that causality detection between events can be solved in the presence of Byzantine processes in a synchronous distributed system. We prove the result by providing two algorithms. The first algorithm uses the Replicated State Machine (RSM) approach and vector clocks. The second algorithm is round-based and uses matrix clocks. The RSM-based algorithm can also run deterministically in partially synchronous systems.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105212"},"PeriodicalIF":0.8,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000774/pdfft?md5=0d87e39be95d1a37d231fdd1582347b0&pid=1-s2.0-S0890540124000774-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142020421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weighted automata and logics meet computational complexity","authors":"Peter Kostolányi","doi":"10.1016/j.ic.2024.105213","DOIUrl":"10.1016/j.ic.2024.105213","url":null,"abstract":"<div><p>Complexity classes such as <span><math><mi>#</mi><mi>P</mi></math></span>, <span><math><mo>⊕</mo><mi>P</mi></math></span>, <strong>GapP</strong>, <strong>OptP</strong>, <strong>NPMV</strong>, or the class of fuzzy languages realised by polynomial-time fuzzy nondeterministic Turing machines, can all be described in terms of a class <span><math><mrow><mi>NP</mi></mrow><mo>[</mo><mi>S</mi><mo>]</mo></math></span> for a suitable semiring <em>S</em>, defined via weighted Turing machines over <em>S</em> similarly as <strong>NP</strong> is defined in the unweighted setting. Other complexity classes can be lifted to the quantitative world as well, the resulting classes relating to the original ones in the same way as weighted automata or logics relate to their unweighted counterparts. The article surveys these too-little-known connexions implicit in the existing literature and suggests a systematic approach to the study of weighted complexity classes. An extension of <span><math><mi>SAT</mi></math></span> to weighted propositional logic is proved to be complete for <span><math><mrow><mi>NP</mi></mrow><mo>[</mo><mi>S</mi><mo>]</mo></math></span> when <em>S</em> is finitely generated. Moreover, a class <span><math><mrow><mi>FP</mi></mrow><mo>[</mo><mi>S</mi><mo>]</mo></math></span> is introduced for each semiring <em>S</em> as a counterpart to <strong>P</strong>, and the relations between <span><math><mrow><mi>FP</mi></mrow><mo>[</mo><mi>S</mi><mo>]</mo></math></span> and <span><math><mrow><mi>NP</mi></mrow><mo>[</mo><mi>S</mi><mo>]</mo></math></span> are considered.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105213"},"PeriodicalIF":0.8,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modification problems toward proper (Helly) circular-arc graphs","authors":"Yixin Cao , Hanchun Yuan , Jianxin Wang","doi":"10.1016/j.ic.2024.105211","DOIUrl":"10.1016/j.ic.2024.105211","url":null,"abstract":"<div><p>We present a <span><math><msup><mrow><mn>9</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm for the proper circular-arc vertex deletion problem, resolving an open problem of van 't Hof and Villanger [Algorithmica 2013] and Crespelle et al. [Computer Science Review 2023]. Our structural study also implies parameterized algorithms for modification problems toward proper Helly circular-arc graphs.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105211"},"PeriodicalIF":0.8,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141944893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giovanni Pagliarini , Simone Scaboro , Giuseppe Serra , Guido Sciavicco , Ionel Eduard Stan
{"title":"Neural-symbolic temporal decision trees for multivariate time series classification","authors":"Giovanni Pagliarini , Simone Scaboro , Giuseppe Serra , Guido Sciavicco , Ionel Eduard Stan","doi":"10.1016/j.ic.2024.105209","DOIUrl":"10.1016/j.ic.2024.105209","url":null,"abstract":"<div><p>Multivariate time series classification is an ubiquitous and widely studied problem. Due to their strong generalization capability, neural networks are suitable for this problem, but their intrinsic black-box nature often limits their applicability. Temporal decision trees are a relevant alternative to neural networks for the same task regarding classification performances while attaining higher levels of transparency and interpretability. In this work, we approach the problem of hybridizing these two techniques, and present three independent, natural hybridization solutions to study if, and in what measure, both the ability of neural networks to capture complex temporal patterns and the transparency and flexibility of temporal decision trees can be leveraged. To this end, we provide initial experimental results for several tasks in a binary classification setting, showing that our proposed neural-symbolic hybridization schemata may be a step towards accurate and interpretable models.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105209"},"PeriodicalIF":0.8,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000749/pdfft?md5=aee9f730063439e214c71730ad5c92be&pid=1-s2.0-S0890540124000749-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141944895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State complexity bounds for projection, shuffle, up- and downward closure and interior on commutative regular languages","authors":"Stefan Hoffmann","doi":"10.1016/j.ic.2024.105204","DOIUrl":"10.1016/j.ic.2024.105204","url":null,"abstract":"<div><div>We consider the state complexity of projection, shuffle, up- and downward closure and interior on commutative regular languages. We deduce the state complexity bound <span><math><msup><mrow><mi>n</mi></mrow><mrow><mo>|</mo><mi>Σ</mi><mo>|</mo></mrow></msup></math></span> for upward closure and downward interior, and <span><math><msup><mrow><mo>(</mo><mn>2</mn><mi>n</mi><mi>m</mi><mo>)</mo></mrow><mrow><mo>|</mo><mi>Σ</mi><mo>|</mo></mrow></msup></math></span>, <span><math><msup><mrow><mo>(</mo><mi>n</mi><mi>m</mi><mo>)</mo></mrow><mrow><mo>|</mo><mi>Σ</mi><mo>|</mo></mrow></msup></math></span>, <span><math><msup><mrow><mo>(</mo><mi>n</mi><mo>+</mo><mi>m</mi><mo>−</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>|</mo><mi>Σ</mi><mo>|</mo></mrow></msup></math></span> and <span><math><msup><mrow><mo>(</mo><mi>n</mi><mo>+</mo><mi>m</mi><mo>−</mo><mn>2</mn><mo>)</mo></mrow><mrow><mo>|</mo><mi>Σ</mi><mo>|</mo></mrow></msup></math></span> for the shuffle on commutative regular, group, aperiodic and finite languages, respectively, with state complexities <em>n</em> and <em>m</em> over the alphabet Σ. We do not know whether these bounds are sharp. For projection, downward closure and upward interior, we give the sharp bound <em>n</em>. Our results are obtained by using the index and period vectors of a regular language, which we introduce in the present work and investigate w.r.t. the above operations and also union and intersection. Furthermore, we characterize the commutative aperiodic and commutative group languages in terms of these parameters and prove that a commutative regular language equals a finite union of shuffle products of commutative finite and commutative group languages.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105204"},"PeriodicalIF":0.8,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142416802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symbolic computation in algebra, geometry, and differential equations","authors":"Franz Winkler","doi":"10.1016/j.ic.2024.105200","DOIUrl":"10.1016/j.ic.2024.105200","url":null,"abstract":"<div><p>In this survey article we describe how symbolic computation in algebra and geometry leads to symbolic, i.e., formula solutions of algebraic differential equations. Symbolic solutions of algebraic differential equations can be derived from parametrizations of corresponding algebraic varieties. Such parametrizations in turn can be computed by elimination methods, i.e., methods for solving systems of polynomial equations.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105200"},"PeriodicalIF":0.8,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000658/pdfft?md5=0b04bde55234c483e1cb8b3d2f7312e3&pid=1-s2.0-S0890540124000658-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141979196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Total (restrained) domination in unit disk graphs","authors":"Yu Yang , Cai-Xia Wang , Shou-Jun Xu","doi":"10.1016/j.ic.2024.105210","DOIUrl":"10.1016/j.ic.2024.105210","url":null,"abstract":"<div><p>The minimum total domination problem and the minimum total restrained domination problem are classical combinatorial optimization problems. In this paper, we first show that the decision versions of both the minimum total domination problem and the minimum total restrained domination problem are NP-complete for grid graphs (a subclass of unit disk graphs), thereby strengthening the result on the total domination decision problem in unit disk graphs established by Jena et al. (2021). Then, we present a linear-time 6.387-approximation algorithm for the minimum total domination problem in unit disk graphs, improving upon the previous algorithm with a ratio of 8 by Jena et al. (2021). Finally, we propose a linear-time 10.387-approximation algorithm and a PTAS for the minimum total restrained domination problem in unit disk graphs.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"300 ","pages":"Article 105210"},"PeriodicalIF":0.8,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141944894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}