{"title":"Preface to “Computation over Compressed Data” at DCC 2022","authors":"Travis Gagie , Nicola Prezza","doi":"10.1016/j.ic.2024.105165","DOIUrl":"10.1016/j.ic.2024.105165","url":null,"abstract":"","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"302 ","pages":"Article 105165"},"PeriodicalIF":0.8,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143152254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixed-parameter algorithms for Fair Hitting Set problems","authors":"Tanmay Inamdar , Lawqueen Kanesh , Madhumita Kundu , Nidhi Purohit , Saket Saurabh","doi":"10.1016/j.ic.2024.105261","DOIUrl":"10.1016/j.ic.2024.105261","url":null,"abstract":"<div><div>Selection of a group of representatives satisfying certain fairness constraints, is a commonly occurring scenario. Motivated by this, we initiate a systematic algorithmic study of a <em>fair</em> version of <span>Hitting Set</span>. In the classical <span>Hitting Set</span> problem, the input is a universe <span><math><mi>U</mi></math></span>, a family <span><math><mi>F</mi></math></span> of subsets of <span><math><mi>U</mi></math></span>, and a non-negative integer <em>k</em>. The goal is to determine whether there exists a subset <span><math><mi>S</mi><mo>⊆</mo><mi>U</mi></math></span> of size <em>k</em> that <em>hits</em> (i.e., intersects) every set in <span><math><mi>F</mi></math></span>. Inspired by several recent works, we formulate a fair version of this problem, as follows. The input additionally contains a family <span><math><mi>B</mi></math></span> of subsets of <span><math><mi>U</mi></math></span>, where each subset in <span><math><mi>B</mi></math></span> can be thought of as the group of elements of the same <em>type</em>. We want to find a set <span><math><mi>S</mi><mo>⊆</mo><mi>U</mi></math></span> of size <em>k</em> that (i) hits all sets of <span><math><mi>F</mi></math></span>, and (ii) does not contain <em>too many</em> elements of each type. We call this problem <span>Fair Hitting Set</span>, and chart out its tractability boundary from both classical as well as multivariate perspective. Our results use a multitude of techniques from parameterized complexity including classical to advanced tools, such as, methods of representative sets for matroids, <span>FO</span> model checking, and a generalization of best known kernel for <span>Hitting Set</span>.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"302 ","pages":"Article 105261"},"PeriodicalIF":0.8,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143152251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nondeterminism and the clique problem","authors":"Oded Shmueli","doi":"10.1016/j.ic.2024.105260","DOIUrl":"10.1016/j.ic.2024.105260","url":null,"abstract":"<div><div>The Clique problem is known to be NP-Complete and the question whether P=NP is unresolved. This paper examines the relative power of nondeterminism versus determinism in a restricted setting. Specifically, we consider solving the clique problem using non-deterministic and deterministic Turing machines. We impose a (reasonable) format in which a problem instance is encoded. We also impose constraints on the computation of both deterministic and non-deterministic Turing machines: both have two tapes, the input tape is read-only and one-way, and once a certain <em>stop point</em> in the input tape is reached, no additional writing on the work tape is allowed. We consider two cases for the position of the stop point: immediately after the number of graph nodes and the size of the clique are specified, or controlled by a parameter <em>q</em> that indicates what portion of the graph nodes' edge specifications have been scanned. The parameter <em>q</em> may be arbitrarily close to 1, e.g., <span><math><mi>q</mi><mo>=</mo><mn>0.99999</mn></math></span>. We show, for both cases in our setting, that a non-deterministic Turing machine can solve the problem in <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></math></span> time whereas no deterministic Turing machine can solve the problem in polynomial time. However, we exhibit an exponential time deterministic single work tape, two-heads Turing machine that solves the clique problem in our setting.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105260"},"PeriodicalIF":0.8,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143100141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maksim Gladyshev , Natasha Alechina , Mehdi Dastani , Dragan Doder
{"title":"Reasoning about group responsibility for exceeding risk threshold in one-shot games","authors":"Maksim Gladyshev , Natasha Alechina , Mehdi Dastani , Dragan Doder","doi":"10.1016/j.ic.2024.105257","DOIUrl":"10.1016/j.ic.2024.105257","url":null,"abstract":"<div><div>Tracing and analysing the responsibility for unsafe outcomes of actors' decisions in multi-agent settings have been studied in recent years. These studies often focus on deterministic scenarios and assume that the unsafe outcomes for which actors can be held responsible are actually realized. This paper considers a broader notion of responsibility where unsafe outcomes are not necessarily realized, but their probabilities are unacceptably high. We present a logic combining strategic, probabilistic and temporal primitives designed to express concepts such as the risk of an undesirable outcome and being responsible for exceeding a risk threshold in one-shot games. We demonstrate that the proposed logic is (weakly) complete, decidable and has an efficient model-checking procedure. Finally, we define a probabilistic notion of responsibility and study its formal properties in the proposed logic setting.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105257"},"PeriodicalIF":0.8,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143156628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algebraic attack on the key exchange protocol based upon a modified tropical structure","authors":"J. Jackson, R. Perumal","doi":"10.1016/j.ic.2024.105259","DOIUrl":"10.1016/j.ic.2024.105259","url":null,"abstract":"<div><div>In this paper, we analyze the key exchange protocol based on an algebraic structure derived from a tropical semiring. The security of this key exchange scheme depends on an attacker's inability to solve a system of non-linear equations to obtain the private parameters. However, we propose an algebraic attack on this key exchange scheme using only the public parameters. We thoroughly evaluate the protocol's security against algebraic attacks through comprehensive cryptanalysis. We study the behavior of matrix sequences produced during key exchange, looking for any almost linear periodicity property that could affect the cryptanalysis. We provide the algorithm and an example to illustrate our attack, demonstrating that this key exchange protocol is not secure. Additionally, we examine how different parameter selections and matrix sizes impact the protocol's security. Ultimately, this cryptanalysis enhances tropical cryptography by expanding our understanding of the security implications of modified tropical semiring-based key exchange protocols.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105259"},"PeriodicalIF":0.8,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142759453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending CL-reducibility on array noncomputable degrees","authors":"Nan Fang , Wolfgang Merkle","doi":"10.1016/j.ic.2024.105258","DOIUrl":"10.1016/j.ic.2024.105258","url":null,"abstract":"<div><div>Given a function <em>f</em>, <em>f</em>-bounded-Turing (<em>f</em>-bT-) reducibility is the Turing reducibility with use function bounded by <em>f</em>. In the special case where <span><math><mi>f</mi><mo>=</mo><mrow><mi>id</mi></mrow><mo>+</mo><mi>c</mi></math></span> (with id being the identity function and <em>c</em> a constant), this is referred to as cl-reducibility. In a work by Barmpalias, Fang, and Lewis-Pye, it was proven that there exist two left-c.e. reals such that no left-c.e. real <span><math><mo>(</mo><mrow><mi>id</mi></mrow><mo>+</mo><mi>g</mi><mo>)</mo></math></span>-bT-computes both of them whenever <em>g</em> is computable, nondecreasing, and satisfies <span><math><msub><mrow><mo>∑</mo></mrow><mrow><mi>n</mi></mrow></msub><msup><mrow><mn>2</mn></mrow><mrow><mo>−</mo><mi>g</mi><mo>(</mo><mi>n</mi><mo>)</mo></mrow></msup><mo>=</mo><mo>∞</mo></math></span>. Moreover, such maximal pairs exist precisely within every array noncomputable degree. This result generalizes a prior result on cl-reducibility, which states that there exist two left-c.e. reals such that no left-c.e. real cl-computes both of them. An open question remained as to whether a similar extension could apply to another result on cl-reducibility, which asserts that there exists a left-c.e. real not cl-reducible to any random left-c.e. real. We answer this question affirmatively, providing a simpler proof compared to previous works. Additionally, we streamline the proof of the initial extension.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105258"},"PeriodicalIF":0.8,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143100143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic judgment aggregation with conditional independence constraints","authors":"Magdalena Ivanovska , Marija Slavkovik","doi":"10.1016/j.ic.2024.105256","DOIUrl":"10.1016/j.ic.2024.105256","url":null,"abstract":"<div><div>Probabilistic judgment aggregation is concerned with aggregating judgments about probabilities of logically related issues. It takes as input imprecise probabilistic judgments over the issues given by a group of agents and defines rules of aggregating the individual judgments into a collective opinion representative for the group. The process of aggregation can be subject to constraints, i.e., aggregation rules can be required to satisfy certain properties. We explore how probabilistic independence constraints can be represented and incorporated into the aggregation process.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105256"},"PeriodicalIF":0.8,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143100142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Benjamin Aminof , Giuseppe De Giacomo , Antonio Di Stasio , Hugo Francon , Sasha Rubin , Shufang Zhu
{"title":"ltlf synthesis under environment specifications for reachability and safety properties","authors":"Benjamin Aminof , Giuseppe De Giacomo , Antonio Di Stasio , Hugo Francon , Sasha Rubin , Shufang Zhu","doi":"10.1016/j.ic.2024.105255","DOIUrl":"10.1016/j.ic.2024.105255","url":null,"abstract":"<div><div>In this paper, we study <span>ltl</span><sub><em>f</em></sub> synthesis under environment specifications for arbitrary reachability and safety properties. We consider both kinds of properties for both agent tasks and environment specifications, providing a complete landscape of synthesis algorithms. For each case, we devise a specific algorithm (optimal wrt complexity of the problem) and prove its correctness. The algorithms combine common building blocks in different ways. While some cases are already studied in literature others are studied here for the first time.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105255"},"PeriodicalIF":0.8,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143100144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed fractional local ratio and independent set approximation","authors":"Magnús M. Halldórsson , Dror Rawitz","doi":"10.1016/j.ic.2024.105238","DOIUrl":"10.1016/j.ic.2024.105238","url":null,"abstract":"<div><div>We consider the <span>Maximum Weight Independent Set</span> problem, with a focus on obtaining good approximations for graphs of small maximum degree Δ. We give deterministic local algorithms running in time <span><math><mi>poly</mi><mo>(</mo><mi>Δ</mi><mo>,</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> that come close to matching the best centralized results known and improve the previous distributed approximations by a factor of about 2. More precisely, we obtain approximations below <span><math><mfrac><mrow><mi>Δ</mi><mo>+</mo><mn>1</mn><mo>/</mo><mn>2</mn></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>, and a further improvement to <span><math><mn>8</mn><mo>/</mo><mn>5</mn><mo>+</mo><mi>ε</mi></math></span> when <span><math><mi>Δ</mi><mo>=</mo><mn>3</mn></math></span>.</div><div>Technically, this is achieved by leveraging the <em>fractional local ratio</em> technique, for a first application in a distributed setting.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105238"},"PeriodicalIF":0.8,"publicationDate":"2024-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142723840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A parallel algorithm for counting parse trees","authors":"Margarita Mikhelson, Alexander Okhotin","doi":"10.1016/j.ic.2024.105237","DOIUrl":"10.1016/j.ic.2024.105237","url":null,"abstract":"<div><div>A parallel algorithm for computing the number of parse trees of a given string according to a fixed context-free grammar is defined. More generally, the algorithm applies to computing the weight of a string in a weighted grammar over any semiring. The algorithm is first implemented on an arithmetic circuit of depth at most <span><math><mn>6</mn><msup><mrow><mo>(</mo><msub><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msub><mo></mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>2</mn></mrow></msup><mo>+</mo><mi>O</mi><mo>(</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> and with <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>6</mn></mrow></msup><mo>)</mo></math></span> elements, where the constant factors in the big-O notation depend on the grammar. Then, the circuit is improved using fast matrix multiplication to use only <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>5.38</mn></mrow></msup><mo>)</mo></math></span> elements, while preserving depth <span><math><mi>O</mi><mo>(</mo><msup><mrow><mo>(</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span>.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"303 ","pages":"Article 105237"},"PeriodicalIF":0.8,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142723839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}