{"title":"Improving compressed matrix multiplication using control variate method","authors":"Bhisham Dev Verma , Punit Pankaj Dubey , Rameshwar Pratap , Manoj Thakur","doi":"10.1016/j.ipl.2024.106517","DOIUrl":"10.1016/j.ipl.2024.106517","url":null,"abstract":"<div><p>The seminal work by Pagh <span>[1]</span> proposed a matrix multiplication algorithm for real-valued squared matrices called Compressed Matrix Multiplication (CMM) having a sparse matrix output product. The algorithm is based on a popular sketching technique called Count-Sketch <span>[2]</span> and Fast Fourier Transform (FFT). For input square matrices <strong>A</strong> and <strong>B</strong> of order <em>n</em> and the product matrix <strong>AB</strong> with Frobenius norm <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msub><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow></msub></math></span>, the algorithm offers an unbiased estimate for each entry, <em>i.e.</em>, <span><math><msub><mrow><mo>(</mo><mrow><mi>AB</mi></mrow><mo>)</mo></mrow><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></math></span> of the product matrix <strong>AB</strong> with a variance bounded by <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msubsup><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow><mrow><mn>2</mn></mrow></msubsup><mo>/</mo><mi>b</mi></math></span>, where <em>b</em> is the compressed bucket size. Thus, the variance will eventually become high for a small bucket size. In this work, we address the high variance problem of CMM with the help of a simple and practical technique based on classical variance reduction methods in statistics. Our techniques rely on the Control Variate (CV) method. We suggest rigorous theoretical analysis for variance reduction and complement it via supporting empirical evidence.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106517"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Dillencourt , Michael T. Goodrich , Michael Mitzenmacher
{"title":"Leveraging parameterized Chernoff bounds for simplified algorithm analyses","authors":"Michael Dillencourt , Michael T. Goodrich , Michael Mitzenmacher","doi":"10.1016/j.ipl.2024.106516","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106516","url":null,"abstract":"<div><p>In this paper, we derive parameterized Chernoff bounds and show their applications for simplifying the analysis of some well-known probabilistic algorithms and data structures. The parameterized Chernoff bounds we provide give probability bounds that are powers of two, with a clean formulation of the relation between the constant in the exponent and the relative distance from the mean. In addition, we provide new simplified analyses with these bounds for hash tables, randomized routing, and a simplified, non-recursive adaptation of the Floyd-Rivest selection algorithm.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106516"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000462/pdfft?md5=67dfff867dbb54118accce695281b16f&pid=1-s2.0-S0020019024000462-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A note on the k-restriction problem","authors":"Jing-You Lin, Shi-Chun Tsai","doi":"10.1016/j.ipl.2024.106515","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106515","url":null,"abstract":"<div><p>Consider a set of demands, each taking length-<em>k</em> strings as input. The <em>k</em>-restriction problem is to construct a small set of length-<em>m</em> strings, such that given any <em>k</em> positions and any demand, there exists a string in the set satisfying the demand at these positions. The <em>k</em>-restriction problem relates to many problems, such as <em>k</em>-independent sets, covering arrays, and many other combinatorial applications. By considering the VC-dimension of demands, we prove bounds independent of the number of demands with the Lovász Local Lemma. As a result, we can prove better bounds for demands with finite VC-dimension.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106515"},"PeriodicalIF":0.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduced meet over labelling-based semantics in abstract argumentation","authors":"Lixing Tan , Zhaohui Zhu , Jinjin Zhang","doi":"10.1016/j.ipl.2024.106514","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106514","url":null,"abstract":"<div><p>The labelling-based approach of <em>abstract argumentation frameworks</em> (AAFs) is beneficial for various applications requiring different levels of decisiveness. For labelling-based semantics, this paper provides an operator so-called reduced meet modulo an ultrafilter, which is inspired by its counterpart over extensions. All criteria involved in the definitions of fundamental labelling-based semantics in AAFs are shown to be closed under this operator. Based on this fact, this paper develops a simple and uniform way for exploring common properties of labelling-based semantics in AAFs, including the compactness of extensibility, the Dcpo and Lindenbaum properties, etc.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106514"},"PeriodicalIF":0.5,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spanners under the Hausdorff and Fréchet distances","authors":"Tsuri Farhana, Matthew J. Katz","doi":"10.1016/j.ipl.2024.106513","DOIUrl":"10.1016/j.ipl.2024.106513","url":null,"abstract":"<div><p>We initiate the study of spanners under the Hausdorff and Fréchet distances. Let <em>S</em> be a set of points in <span><math><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span> and <em>ε</em> a non-negative real number. A subgraph <em>H</em> of the Euclidean graph over <em>S</em> is an <em>ε-Hausdorff-spanner</em> (resp., an <em>ε-Fréchet-spanner</em>) of <em>S</em>, if for any two points <span><math><mi>u</mi><mo>,</mo><mi>v</mi><mo>∈</mo><mi>S</mi></math></span> there exists a path <span><math><mi>P</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> in <em>H</em> between <em>u</em> and <em>v</em>, such that the Hausdorff distance (resp., the Fréchet distance) between <span><math><mi>P</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> and <span><math><mover><mrow><mi>u</mi><mi>v</mi></mrow><mo>‾</mo></mover></math></span> is at most <em>ε</em>. We show that any <em>t</em>-spanner of a planar point-set <em>S</em> is a <span><math><mfrac><mrow><msqrt><mrow><msup><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>−</mo><mn>1</mn></mrow></msqrt></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>-Hausdorff-spanner and a <span><math><mi>min</mi><mo></mo><mo>{</mo><mfrac><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></mfrac><mo>,</mo><mfrac><mrow><msqrt><mrow><mn>5</mn><msup><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>−</mo><mn>2</mn><mi>t</mi><mo>−</mo><mn>3</mn></mrow></msqrt></mrow><mrow><mn>4</mn></mrow></mfrac><mo>}</mo></math></span>-Fréchet spanner. We also prove that for any <span><math><mi>t</mi><mo>></mo><mn>1</mn></math></span>, there exist a set of points <em>S</em> and an <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>-Hausdorff-spanner of <em>S</em> and an <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span>-Fréchet-spanner of <em>S</em>, where <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> and <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> are constants, such that neither of them is a <em>t</em>-spanner.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106513"},"PeriodicalIF":0.5,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141046033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal randomized algorithms of weakly-balanced multi-branching AND-OR trees","authors":"Fuki Ito","doi":"10.1016/j.ipl.2024.106512","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106512","url":null,"abstract":"<div><p>This article treats AND-OR tree computation in terms of query complexity. We are interested in the cases where assignments (inputs) or algorithms are randomized. For the former case, it is known that there is a unique randomized assignment achieving the distributional complexity of balanced trees. On the other hand, the dual problem has the opposite result; the optimal randomized algorithms for balanced trees are not unique. We extend the latter study on randomized algorithms to weakly-balanced trees, and see that the uniqueness still fails.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106512"},"PeriodicalIF":0.5,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lower and upper bounds on graph communicabilities","authors":"Amir Hossein Ghodrati , Mohammad Ali Hosseinzadeh","doi":"10.1016/j.ipl.2024.106501","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106501","url":null,"abstract":"<div><p>In this paper, some lower and upper bounds for the subgraph centrality and communicability of a graph are proved. The expected value of the normalized total communicability of a random <span><math><mi>G</mi><mo>(</mo><mi>n</mi><mo>,</mo><mi>p</mi><mo>)</mo></math></span> graph is also considered and asymptotically determined. Moreover, some computational results are presented to compare the bounds obtained in this paper with some other bounds in the literature.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106501"},"PeriodicalIF":0.5,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140905396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Johannes Rauch , Dieter Rautenbach , Uéverton S. Souza
{"title":"On conflict-free cuts: Algorithms and complexity","authors":"Johannes Rauch , Dieter Rautenbach , Uéverton S. Souza","doi":"10.1016/j.ipl.2024.106503","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106503","url":null,"abstract":"<div><p>One way to define the <span>Matching Cut</span> problem is: Given a graph <em>G</em>, is there an edge-cut <em>M</em> of <em>G</em> such that <em>M</em> is an independent set in the line graph of <em>G</em>? We propose the more general <span>Conflict-Free Cut</span> problem: Together with the graph <em>G</em>, we are given a so-called conflict graph <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> on the edges of <em>G</em>, and we ask for an edge-cutset <em>M</em> of <em>G</em> that is independent in <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span>. Since conflict-free settings are popular generalizations of classical optimization problems and <span>Conflict-Free Cut</span> was not considered in the literature so far, we start the study of the problem. We show that the problem is <span><math><mi>NP</mi></math></span>-complete even when the maximum degree of <em>G</em> is 5 and <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is 1-regular. The same reduction implies an exponential lower bound on the solvability based on the Exponential Time Hypothesis. We also give parameterized complexity results: We show that the problem is fixed-parameter tractable with the vertex cover number of <em>G</em> as a parameter, and we show <span><math><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></math></span>-hardness even when <em>G</em> has a feedback vertex set of size one, and the clique cover number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is the parameter. Since the clique cover number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is an upper bound on the independence number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> and thus the solution size, this implies <span><math><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></math></span>-hardness when parameterized by the cut size. We list polynomial-time solvable cases and interesting open problems. At last, we draw a connection to a symmetric variant of <span>SAT</span>.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106503"},"PeriodicalIF":0.5,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000334/pdfft?md5=245b78d016a76de957fec713f0824a46&pid=1-s2.0-S0020019024000334-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved lower bound for differentially private facility location","authors":"Pasin Manurangsi","doi":"10.1016/j.ipl.2024.106502","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106502","url":null,"abstract":"<div><p>We consider the differentially private (DP) facility location problem in the so called <em>super-set output</em> setting proposed by Gupta et al. <span>[13]</span>. The current best known expected approximation ratio for an <em>ϵ</em>-DP algorithm is <span><math><mi>O</mi><mrow><mo>(</mo><mfrac><mrow><mi>log</mi><mo></mo><mi>n</mi></mrow><mrow><msqrt><mrow><mi>ϵ</mi></mrow></msqrt></mrow></mfrac><mo>)</mo></mrow></math></span> due to Cohen-Addad et al. <span>[3]</span> where <em>n</em> denote the size of the metric space, meanwhile the best known lower bound is <span><math><mi>Ω</mi><mo>(</mo><mn>1</mn><mo>/</mo><msqrt><mrow><mi>ϵ</mi></mrow></msqrt><mo>)</mo></math></span> <span>[8]</span>.</p><p>In this short note, we give a lower bound of <span><math><mover><mrow><mi>Ω</mi></mrow><mrow><mo>˜</mo></mrow></mover><mrow><mo>(</mo><mi>min</mi><mo></mo><mrow><mo>{</mo><mi>log</mi><mo></mo><mi>n</mi><mo>,</mo><msqrt><mrow><mfrac><mrow><mi>log</mi><mo></mo><mi>n</mi></mrow><mrow><mi>ϵ</mi></mrow></mfrac></mrow></msqrt><mo>}</mo></mrow><mo>)</mo></mrow></math></span> on the expected approximation ratio of any <em>ϵ</em>-DP algorithm, which is the first evidence that the approximation ratio has to grow with the size of the metric space.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106502"},"PeriodicalIF":0.5,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Katharina T. Huber , Leo van Iersel , Vincent Moulton , Guillaume E. Scholz
{"title":"Is this network proper forest-based?","authors":"Katharina T. Huber , Leo van Iersel , Vincent Moulton , Guillaume E. Scholz","doi":"10.1016/j.ipl.2024.106500","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106500","url":null,"abstract":"<div><p>In evolutionary biology, networks are becoming increasingly used to represent evolutionary histories for species that have undergone non-treelike or reticulate evolution. Such networks are essentially directed acyclic graphs with a leaf set that corresponds to a collection of species, and in which non-leaf vertices with indegree 1 correspond to speciation events and vertices with indegree greater than 1 correspond to reticulate events such as gene transfer. Recently forest-based networks have been introduced, which are essentially (multi-rooted) networks that can be formed by adding some arcs to a collection of phylogenetic trees (or phylogenetic forest), where each arc is added in such a way that its ends always lie in two different trees in the forest. In this paper, we consider the complexity of deciding whether a given network is proper forest-based, that is, whether it can be formed by adding arcs to some underlying phylogenetic forest which contains the same number of trees as there are roots in the network. More specifically, we show that it is NP-complete to decide whether a tree-child network with <em>m</em> roots is proper forest-based, for each <span><math><mi>m</mi><mo>≥</mo><mn>2</mn></math></span>. Moreover, for binary networks the problem remains NP-complete when <span><math><mi>m</mi><mo>≥</mo><mn>3</mn></math></span> but becomes polynomial-time solvable for <span><math><mi>m</mi><mo>=</mo><mn>2</mn></math></span>. We also give a fixed parameter tractable (FPT) algorithm, with parameters the maximum outdegree of a vertex, the number of roots, and the number of indegree 2 vertices, for deciding if a semi-binary network is proper forest-based. A key element in proving our results is a new characterization for when a network with <em>m</em> roots is proper forest-based in terms of certain <em>m</em>-colorings.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106500"},"PeriodicalIF":0.5,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000309/pdfft?md5=6bb24ac246fe9301af0f20ad64b94c09&pid=1-s2.0-S0020019024000309-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}