Information and Computation最新文献

筛选
英文 中文
SENDAI: A framework for joint reasoning about sensor data acquisition and sensor data analytics 仙台:传感器数据采集和传感器数据分析联合推理框架
IF 1 4区 计算机科学
Information and Computation Pub Date : 2025-08-11 DOI: 10.1016/j.ic.2025.105335
Søren Kejser Jensen , Josefine Kejser , Federico Chiariotti , Christian Thomsen , Anders Ellersgaard Kalør , Petar Popovski , Beatriz Soret , Torben Bach Pedersen
{"title":"SENDAI: A framework for joint reasoning about sensor data acquisition and sensor data analytics","authors":"Søren Kejser Jensen ,&nbsp;Josefine Kejser ,&nbsp;Federico Chiariotti ,&nbsp;Christian Thomsen ,&nbsp;Anders Ellersgaard Kalør ,&nbsp;Petar Popovski ,&nbsp;Beatriz Soret ,&nbsp;Torben Bach Pedersen","doi":"10.1016/j.ic.2025.105335","DOIUrl":"10.1016/j.ic.2025.105335","url":null,"abstract":"<div><div>Sensors are increasingly being deployed to monitor critical infrastructure. However, as the number of sensors being deployed increases, so does the amount of sensor data that must be transmitted, stored, and analyzed. Thus, a significant number of methods have been proposed to improve sensor data acquisition and analytics. However, the proposed strategies and methods generally focus exclusively on <em>either</em> sensor data acquisition or analytics, thus ignoring the possible optimization that can be performed by taking a holistic view. To explore this opportunity, this paper provides an overview of sensor data acquisition and analytics and an analysis of two very different use cases, specifically monitoring wind turbines and measuring utility consumption using smart meters. Based on this analysis, the Framework for joint Sensory Data Acquisition and Analytics (SENDAI) is proposed, an integrated framework that models sensor data acquisition and analytics together, thus enabling holistic reasoning about sensor data acquisition and analytics. To demonstrate how the information in SENDAI can be used to reason about sensor data acquisition and analytics together, we show how sensor data acquisition can be optimized to respond efficiently to query workloads.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105335"},"PeriodicalIF":1.0,"publicationDate":"2025-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144864272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear-time safe-alternating DFS and SCCs 线性-时间-安全交替DFS和SCCs
IF 1 4区 计算机科学
Information and Computation Pub Date : 2025-08-11 DOI: 10.1016/j.ic.2025.105334
Carlo Comin, Romeo Rizzi
{"title":"Linear-time safe-alternating DFS and SCCs","authors":"Carlo Comin,&nbsp;Romeo Rizzi","doi":"10.1016/j.ic.2025.105334","DOIUrl":"10.1016/j.ic.2025.105334","url":null,"abstract":"<div><div>An alternating graph is a directed graph whose vertex set is partitioned into two colour classes, existential and universal.</div><div>This forms the basic arena for well-known models in formal verification, discrete optimal control, and infinite duration two-player games where Player □ and Player ○ alternate in a turn-based sliding of a pebble along the arcs they control.</div><div>We study alternating strongly-connectedness on alternating graphs as a generalization of strongly-connectedness in directed graphs, aiming at providing a linear-time decomposition and a sound structural graph characterization. For this a novel notion of alternating reachability is introduced: Player □ attempts to reach vertices without leaving a prescribed subset of the vertices while Player ○ works against. This is named <em>safe-alternating reachability</em>. It is shown that every alternating graph uniquely decomposes into <em>safe-alternating strongly-connected components</em>, where Player □ can visit each vertex within a given component infinitely often without having to ever leave out the component itself.</div><div>Our main result is a linear-time algorithm for computing this alternating graph decomposition. Both the underlying graph structures and the algorithm generalize the classical decomposition of a directed graph into strongly-connected components, building on the algorithms devised by Tarjan in 1972.</div><div>Our theory has direct applications e.g. solving well-known infinite duration pebble games faster. Dinneen and Khoussainov showed in 1999 that deciding a given Update Game costs <span><math><mi>O</mi><mo>(</mo><mi>m</mi><mi>n</mi><mo>)</mo></math></span> time, where <em>n</em> is the number of vertices and <em>m</em> is that of arcs. We solve that task in <span><math><mi>Θ</mi><mo>(</mo><mi>m</mi><mo>+</mo><mi>n</mi><mo>)</mo></math></span> linear time. In turn the complexity of Explicit McNaughton-Müller Games improves from cubic to quadratic.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105334"},"PeriodicalIF":1.0,"publicationDate":"2025-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144864273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computable one-way functions on the reals 实数上可计算的单向函数
IF 1 4区 计算机科学
Information and Computation Pub Date : 2025-07-22 DOI: 10.1016/j.ic.2025.105327
George Barmpalias, Xiaoyan Zhang
{"title":"Computable one-way functions on the reals","authors":"George Barmpalias,&nbsp;Xiaoyan Zhang","doi":"10.1016/j.ic.2025.105327","DOIUrl":"10.1016/j.ic.2025.105327","url":null,"abstract":"<div><div>A major open problem in computational complexity is the existence of a one-way function, namely a function from strings to strings which is computationally easy to compute but hard to invert. Levin (2023) formulated the notion of one-way functions from reals (infinite bit-sequences) to reals in terms of computability, and asked whether partial computable one-way functions exist. We give a strong positive answer using the hardness of the halting problem and exhibiting a total computable one-way function.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105327"},"PeriodicalIF":1.0,"publicationDate":"2025-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144722058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue on 10th international workshop Weighted Automata: Theory and Applications (WATA 2020) 第十届加权自动机:理论与应用国际研讨会特刊(WATA 2020)
IF 1 4区 计算机科学
Information and Computation Pub Date : 2025-07-16 DOI: 10.1016/j.ic.2025.105331
Manfred Droste , Paul Gastin , Benjamin Monmege
{"title":"Special issue on 10th international workshop Weighted Automata: Theory and Applications (WATA 2020)","authors":"Manfred Droste ,&nbsp;Paul Gastin ,&nbsp;Benjamin Monmege","doi":"10.1016/j.ic.2025.105331","DOIUrl":"10.1016/j.ic.2025.105331","url":null,"abstract":"","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105331"},"PeriodicalIF":1.0,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144738459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rauzy complexity and block entropy 混沌复杂性和块熵
IF 0.8 4区 计算机科学
Information and Computation Pub Date : 2025-07-15 DOI: 10.1016/j.ic.2025.105330
Verónica Becher , Olivier Carton , Santiago Figueira
{"title":"Rauzy complexity and block entropy","authors":"Verónica Becher ,&nbsp;Olivier Carton ,&nbsp;Santiago Figueira","doi":"10.1016/j.ic.2025.105330","DOIUrl":"10.1016/j.ic.2025.105330","url":null,"abstract":"<div><div>In 1976, Rauzy studied two complexity functions, <span><math><munder><mrow><mi>β</mi></mrow><mo>_</mo></munder></math></span> and <span><math><mover><mrow><mi>β</mi></mrow><mo>‾</mo></mover></math></span>, for infinite sequences over a finite alphabet. The function <span><math><munder><mrow><mi>β</mi></mrow><mo>_</mo></munder></math></span> achieves its maximum precisely for Borel normal sequences, while <span><math><mover><mrow><mi>β</mi></mrow><mo>‾</mo></mover></math></span> reaches its minimum for sequences that, when added to any Borel normal sequence, result in another Borel normal sequence. We establish a connection between Rauzy's complexity functions, <span><math><munder><mrow><mi>β</mi></mrow><mo>_</mo></munder></math></span> and <span><math><mover><mrow><mi>β</mi></mrow><mo>‾</mo></mover></math></span>, and the notions of non-aligned block entropy, <span><math><munder><mrow><mi>h</mi></mrow><mo>_</mo></munder></math></span> and <span><math><mover><mrow><mi>h</mi></mrow><mo>‾</mo></mover></math></span>, by providing sharp upper and lower bounds for <span><math><munder><mrow><mi>h</mi></mrow><mo>_</mo></munder></math></span> in terms of <span><math><munder><mrow><mi>β</mi></mrow><mo>_</mo></munder></math></span>, and sharp upper and lower bounds for <span><math><mover><mrow><mi>h</mi></mrow><mo>‾</mo></mover></math></span> in terms of <span><math><mover><mrow><mi>β</mi></mrow><mo>‾</mo></mover></math></span>. We adopt a probabilistic approach by considering an infinite sequence of random variables over a finite alphabet. The proof relies on a new characterization of non-aligned block entropies, <span><math><mover><mrow><mi>h</mi></mrow><mo>‾</mo></mover></math></span> and <span><math><munder><mrow><mi>h</mi></mrow><mo>_</mo></munder></math></span>, in terms of Shannon's conditional entropy. The bounds imply that sequences with <span><math><mover><mrow><mi>h</mi></mrow><mo>‾</mo></mover><mo>=</mo><mn>0</mn></math></span> coincide with those for which <span><math><mover><mrow><mi>β</mi></mrow><mo>‾</mo></mover><mo>=</mo><mn>0</mn></math></span>. We also show that the non-aligned block entropies, <span><math><munder><mrow><mi>h</mi></mrow><mo>_</mo></munder></math></span> and <span><math><mover><mrow><mi>h</mi></mrow><mo>‾</mo></mover></math></span>, are essentially subadditive.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105330"},"PeriodicalIF":0.8,"publicationDate":"2025-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144685871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Randomness and imprecision: From supermartingales to randomness tests 随机性和不精确性:从上鞅到随机性检验
IF 0.8 4区 计算机科学
Information and Computation Pub Date : 2025-07-09 DOI: 10.1016/j.ic.2025.105328
Gert de Cooman, Floris Persiau, Jasper De Bock
{"title":"Randomness and imprecision: From supermartingales to randomness tests","authors":"Gert de Cooman,&nbsp;Floris Persiau,&nbsp;Jasper De Bock","doi":"10.1016/j.ic.2025.105328","DOIUrl":"10.1016/j.ic.2025.105328","url":null,"abstract":"<div><div>We generalise the randomness test definitions in the literature for both the Martin-Löf and Schnorr randomness of a series of binary outcomes, in order to allow for interval-valued rather than merely precise forecasts for these outcomes, and prove that under some computability conditions on the forecasts, our definition of Martin-Löf test randomness is related to Levin's uniform randomness. We also show that these new randomness notions are, under some computability and non-degeneracy conditions on the forecasts, equivalent to the martingale-theoretic versions we introduced in earlier papers. In addition, we prove that our generalised notion of Martin-Löf randomness can be characterised by universal supermartingales and universal randomness tests.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105328"},"PeriodicalIF":0.8,"publicationDate":"2025-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144633342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pushdown and one-counter automata: Constant and non-constant memory usage 下推式和单计数器自动机:恒定和非恒定内存使用
IF 0.8 4区 计算机科学
Information and Computation Pub Date : 2025-07-09 DOI: 10.1016/j.ic.2025.105329
Giovanni Pighizzini , Luca Prigioniero
{"title":"Pushdown and one-counter automata: Constant and non-constant memory usage","authors":"Giovanni Pighizzini ,&nbsp;Luca Prigioniero","doi":"10.1016/j.ic.2025.105329","DOIUrl":"10.1016/j.ic.2025.105329","url":null,"abstract":"<div><div>It cannot be decided whether a one-counter automaton accepts each string in its language using a counter whose value is bounded, with respect to the length of the input, by a constant. Furthermore, when the counter is bounded by a constant, its value cannot be limited by any recursive function in the size of the machine.</div><div>By taking into account the costs of all computations (<span>strong</span> measure) or of all accepting computations (<span>accept</span> measure) instead of those of the least expensive accepting computations (<span>weak</span> measure), the above-mentioned problem becomes decidable for both pushdown automata and one-counter automata, while the bounds for the pushdown height or the value of the counter, when non constant, are recursive in the size of the machine.</div><div>We also prove that, under the <span>weak</span> measure, if a one-counter automaton accepts with a counter that, with respect to the input length, is not bounded by any constants, then the counter grows at least as a logarithmic function. This is in contrast with the case of pushdown automata in which the bound is a double-logarithmic function. For the <span>strong</span> and <span>accept</span> measures these bounds are shown to be linear, for both pushdown and one-counter automata.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105329"},"PeriodicalIF":0.8,"publicationDate":"2025-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144631879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On algorithms based on finitely many homomorphism counts 基于有限多同态计数的算法
IF 0.8 4区 计算机科学
Information and Computation Pub Date : 2025-06-30 DOI: 10.1016/j.ic.2025.105326
Yijia Chen , Jörg Flum , Mingjun Liu , Zhiyang Xun
{"title":"On algorithms based on finitely many homomorphism counts","authors":"Yijia Chen ,&nbsp;Jörg Flum ,&nbsp;Mingjun Liu ,&nbsp;Zhiyang Xun","doi":"10.1016/j.ic.2025.105326","DOIUrl":"10.1016/j.ic.2025.105326","url":null,"abstract":"&lt;div&gt;&lt;div&gt;It is a well-known result of Lovász that up to isomorphism a graph &lt;em&gt;G&lt;/em&gt; is determined by the homomorphism counts &lt;span&gt;&lt;math&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;, i.e., the number of homomorphisms from &lt;em&gt;F&lt;/em&gt; to &lt;em&gt;G&lt;/em&gt;, where &lt;em&gt;F&lt;/em&gt; ranges over all graphs. Thus, in principle, we can answer any query concerning &lt;em&gt;G&lt;/em&gt; with only accessing the &lt;span&gt;&lt;math&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mo&gt;⋅&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;'s instead of &lt;em&gt;G&lt;/em&gt; itself. In this paper, we deal with queries &lt;em&gt;φ&lt;/em&gt; for which there is a &lt;em&gt;hom algorithm&lt;/em&gt;, i.e., there are &lt;em&gt;finitely many&lt;/em&gt; graphs &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; such that for any graph &lt;em&gt;G&lt;/em&gt; whether it is a &lt;span&gt;Yes&lt;/span&gt;-instance of the query is already determined by the vector&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mover&gt;&lt;mrow&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;→&lt;/mo&gt;&lt;/mrow&gt;&lt;/mover&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;:&lt;/mo&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; where the graphs &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; only depend on &lt;em&gt;φ&lt;/em&gt;.&lt;/div&gt;&lt;div&gt;We observe that planarity of graphs and 3-colorability of graphs, properties expressible in monadic second-order logic, have no hom algorithm. We provide a characterization of the prefix classes of first-order logic with the property that each query definable by a sentence of the prefix class has a hom algorithm.&lt;/div&gt;&lt;div&gt;For &lt;em&gt;adaptive&lt;/em&gt; query algorithms, i.e., algorithms that again access &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mover&gt;&lt;mrow&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;→&lt;/mo&gt;&lt;/mrow&gt;&lt;/mover&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; but here &lt;span&gt;&lt;math&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; might depend on &lt;span&gt;&lt;math&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mtext&gt;hom&lt;/mtext&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/spa","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105326"},"PeriodicalIF":0.8,"publicationDate":"2025-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144571178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting pseudo-locality of interchange distance 利用交换距离的伪局部性
IF 0.8 4区 计算机科学
Information and Computation Pub Date : 2025-06-17 DOI: 10.1016/j.ic.2025.105324
Avivit Levy
{"title":"Exploiting pseudo-locality of interchange distance","authors":"Avivit Levy","doi":"10.1016/j.ic.2025.105324","DOIUrl":"10.1016/j.ic.2025.105324","url":null,"abstract":"<div><div>The goal of this paper is to examine how to exploit pseudo-locality in order to transform tools designed for the Hamming distance into tools adequate for the interchange distance, which is a pseudo-local metric. Intuitively, operators of <em>pseudo-local string rearrangement distance measures</em> have a bounded effect on the Hamming distance between the string prior to the operator application and after it. Specifically, we demonstrate a way to exploit pseudo-locality of the interchange distance combined with additional techniques to derive:<ul><li><span>1.</span><span><div>The <em>first</em> efficient approximate nearest-neighbor (ANN) data structure for the interchange distance, which is <span><math><mi>NP</mi></math></span>-hard to compute for general strings.</div></span></li><li><span>2.</span><span><div>The <em>first</em> linear-time <em>approximation</em> algorithm to compute approximate pattern matching with interchanges, which is a vast improvement from the <span><math><mi>Θ</mi><mo>(</mo><mi>n</mi><mi>m</mi><mo>)</mo></math></span>-time known algorithm, where <em>n</em> and <em>m</em> are the text and the pattern length, respectively.</div></span></li></ul></div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105324"},"PeriodicalIF":0.8,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144322511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear programming of monitoring the links of a fractional weighted network using distance 利用距离监测分数加权网络链路的线性规划
IF 0.8 4区 计算机科学
Information and Computation Pub Date : 2025-06-16 DOI: 10.1016/j.ic.2025.105323
Wen Li , Yaping Mao , Ralf Klasing
{"title":"Linear programming of monitoring the links of a fractional weighted network using distance","authors":"Wen Li ,&nbsp;Yaping Mao ,&nbsp;Ralf Klasing","doi":"10.1016/j.ic.2025.105323","DOIUrl":"10.1016/j.ic.2025.105323","url":null,"abstract":"<div><div>In 2022, Foucaud et al. initiated the study of a new graph-theoretic concept called distance-edge-monitoring number (DEM number for short), in the area of network monitoring. In this paper, we study linear programming for the distance-edge-monitoring problem. For a connected graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>,</mo><mi>E</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>)</mo></math></span>, let <em>h</em> be a function that assigns to each vertex <span><math><mi>v</mi><mo>∈</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo></math></span> a number in <span><math><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></math></span>. For a vertex subset <span><math><mi>X</mi><mo>⊆</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo></math></span>, denote <span><math><mi>h</mi><mo>(</mo><mi>X</mi><mo>)</mo><mo>=</mo><msub><mrow><mi>Σ</mi></mrow><mrow><mi>v</mi><mo>∈</mo><mi>X</mi></mrow></msub><mi>h</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span>. Then, the function <em>h</em> is called a monitoring function of <em>G</em>, if for any edge <em>e</em> in <em>G</em>, the weights of these vertices which monitoring the edge <em>e</em> are at least 1. The <em>fractional distance-edge-monitoring number</em> (FDEM number for short) of <em>G</em>, denoted by <span><math><msub><mrow><mi>dem</mi></mrow><mrow><mi>f</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span>, is given by <span><math><msub><mrow><mi>dem</mi></mrow><mrow><mi>f</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo><mo>=</mo><mi>min</mi><mo>⁡</mo><mo>{</mo><mi>H</mi><mspace></mspace><mo>|</mo><mspace></mspace><mi>h</mi><mspace></mspace><mtext>is a monitoring function of</mtext><mspace></mspace><mi>G</mi><mo>}</mo></math></span>, where <span><math><mi>H</mi><mo>=</mo><mi>h</mi><mo>(</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>)</mo></math></span>. In this paper, we obtain some bounds or exact values for the FDEM number of some specific graphs or networks. Moreover, we study the graphs where the FDEM number equals to the DEM number. Finally, we investigate the FDEM number of some convex polytopes.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"306 ","pages":"Article 105323"},"PeriodicalIF":0.8,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144322510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信