Information Processing Letters最新文献

筛选
英文 中文
Improving compressed matrix multiplication using control variate method 利用控制变量法改进压缩矩阵乘法
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-06-12 DOI: 10.1016/j.ipl.2024.106517
Bhisham Dev Verma , Punit Pankaj Dubey , Rameshwar Pratap , Manoj Thakur
{"title":"Improving compressed matrix multiplication using control variate method","authors":"Bhisham Dev Verma ,&nbsp;Punit Pankaj Dubey ,&nbsp;Rameshwar Pratap ,&nbsp;Manoj Thakur","doi":"10.1016/j.ipl.2024.106517","DOIUrl":"10.1016/j.ipl.2024.106517","url":null,"abstract":"<div><p>The seminal work by Pagh <span>[1]</span> proposed a matrix multiplication algorithm for real-valued squared matrices called Compressed Matrix Multiplication (CMM) having a sparse matrix output product. The algorithm is based on a popular sketching technique called Count-Sketch <span>[2]</span> and Fast Fourier Transform (FFT). For input square matrices <strong>A</strong> and <strong>B</strong> of order <em>n</em> and the product matrix <strong>AB</strong> with Frobenius norm <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msub><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow></msub></math></span>, the algorithm offers an unbiased estimate for each entry, <em>i.e.</em>, <span><math><msub><mrow><mo>(</mo><mrow><mi>AB</mi></mrow><mo>)</mo></mrow><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></math></span> of the product matrix <strong>AB</strong> with a variance bounded by <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msubsup><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow><mrow><mn>2</mn></mrow></msubsup><mo>/</mo><mi>b</mi></math></span>, where <em>b</em> is the compressed bucket size. Thus, the variance will eventually become high for a small bucket size. In this work, we address the high variance problem of CMM with the help of a simple and practical technique based on classical variance reduction methods in statistics. Our techniques rely on the Control Variate (CV) method. We suggest rigorous theoretical analysis for variance reduction and complement it via supporting empirical evidence.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106517"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging parameterized Chernoff bounds for simplified algorithm analyses 利用参数化切尔诺夫边界简化算法分析
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-06-12 DOI: 10.1016/j.ipl.2024.106516
Michael Dillencourt , Michael T. Goodrich , Michael Mitzenmacher
{"title":"Leveraging parameterized Chernoff bounds for simplified algorithm analyses","authors":"Michael Dillencourt ,&nbsp;Michael T. Goodrich ,&nbsp;Michael Mitzenmacher","doi":"10.1016/j.ipl.2024.106516","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106516","url":null,"abstract":"<div><p>In this paper, we derive parameterized Chernoff bounds and show their applications for simplifying the analysis of some well-known probabilistic algorithms and data structures. The parameterized Chernoff bounds we provide give probability bounds that are powers of two, with a clean formulation of the relation between the constant in the exponent and the relative distance from the mean. In addition, we provide new simplified analyses with these bounds for hash tables, randomized routing, and a simplified, non-recursive adaptation of the Floyd-Rivest selection algorithm.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106516"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000462/pdfft?md5=67dfff867dbb54118accce695281b16f&pid=1-s2.0-S0020019024000462-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A note on the k-restriction problem 关于 k 限制问题的说明
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-06-03 DOI: 10.1016/j.ipl.2024.106515
Jing-You Lin, Shi-Chun Tsai
{"title":"A note on the k-restriction problem","authors":"Jing-You Lin,&nbsp;Shi-Chun Tsai","doi":"10.1016/j.ipl.2024.106515","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106515","url":null,"abstract":"<div><p>Consider a set of demands, each taking length-<em>k</em> strings as input. The <em>k</em>-restriction problem is to construct a small set of length-<em>m</em> strings, such that given any <em>k</em> positions and any demand, there exists a string in the set satisfying the demand at these positions. The <em>k</em>-restriction problem relates to many problems, such as <em>k</em>-independent sets, covering arrays, and many other combinatorial applications. By considering the VC-dimension of demands, we prove bounds independent of the number of demands with the Lovász Local Lemma. As a result, we can prove better bounds for demands with finite VC-dimension.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106515"},"PeriodicalIF":0.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduced meet over labelling-based semantics in abstract argumentation 在抽象论证中减少对基于标签的语义的满足
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-05-31 DOI: 10.1016/j.ipl.2024.106514
Lixing Tan , Zhaohui Zhu , Jinjin Zhang
{"title":"Reduced meet over labelling-based semantics in abstract argumentation","authors":"Lixing Tan ,&nbsp;Zhaohui Zhu ,&nbsp;Jinjin Zhang","doi":"10.1016/j.ipl.2024.106514","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106514","url":null,"abstract":"<div><p>The labelling-based approach of <em>abstract argumentation frameworks</em> (AAFs) is beneficial for various applications requiring different levels of decisiveness. For labelling-based semantics, this paper provides an operator so-called reduced meet modulo an ultrafilter, which is inspired by its counterpart over extensions. All criteria involved in the definitions of fundamental labelling-based semantics in AAFs are shown to be closed under this operator. Based on this fact, this paper develops a simple and uniform way for exploring common properties of labelling-based semantics in AAFs, including the compactness of extensibility, the Dcpo and Lindenbaum properties, etc.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106514"},"PeriodicalIF":0.5,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spanners under the Hausdorff and Fréchet distances 豪斯多夫距离和弗雷谢特距离下的跨距
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-05-16 DOI: 10.1016/j.ipl.2024.106513
Tsuri Farhana, Matthew J. Katz
{"title":"Spanners under the Hausdorff and Fréchet distances","authors":"Tsuri Farhana,&nbsp;Matthew J. Katz","doi":"10.1016/j.ipl.2024.106513","DOIUrl":"10.1016/j.ipl.2024.106513","url":null,"abstract":"<div><p>We initiate the study of spanners under the Hausdorff and Fréchet distances. Let <em>S</em> be a set of points in <span><math><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span> and <em>ε</em> a non-negative real number. A subgraph <em>H</em> of the Euclidean graph over <em>S</em> is an <em>ε-Hausdorff-spanner</em> (resp., an <em>ε-Fréchet-spanner</em>) of <em>S</em>, if for any two points <span><math><mi>u</mi><mo>,</mo><mi>v</mi><mo>∈</mo><mi>S</mi></math></span> there exists a path <span><math><mi>P</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> in <em>H</em> between <em>u</em> and <em>v</em>, such that the Hausdorff distance (resp., the Fréchet distance) between <span><math><mi>P</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> and <span><math><mover><mrow><mi>u</mi><mi>v</mi></mrow><mo>‾</mo></mover></math></span> is at most <em>ε</em>. We show that any <em>t</em>-spanner of a planar point-set <em>S</em> is a <span><math><mfrac><mrow><msqrt><mrow><msup><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>−</mo><mn>1</mn></mrow></msqrt></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>-Hausdorff-spanner and a <span><math><mi>min</mi><mo>⁡</mo><mo>{</mo><mfrac><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></mfrac><mo>,</mo><mfrac><mrow><msqrt><mrow><mn>5</mn><msup><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>−</mo><mn>2</mn><mi>t</mi><mo>−</mo><mn>3</mn></mrow></msqrt></mrow><mrow><mn>4</mn></mrow></mfrac><mo>}</mo></math></span>-Fréchet spanner. We also prove that for any <span><math><mi>t</mi><mo>&gt;</mo><mn>1</mn></math></span>, there exist a set of points <em>S</em> and an <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>-Hausdorff-spanner of <em>S</em> and an <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span>-Fréchet-spanner of <em>S</em>, where <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> and <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> are constants, such that neither of them is a <em>t</em>-spanner.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106513"},"PeriodicalIF":0.5,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141046033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal randomized algorithms of weakly-balanced multi-branching AND-OR trees 弱平衡多分支 AND-OR 树的最优随机算法
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-05-10 DOI: 10.1016/j.ipl.2024.106512
Fuki Ito
{"title":"Optimal randomized algorithms of weakly-balanced multi-branching AND-OR trees","authors":"Fuki Ito","doi":"10.1016/j.ipl.2024.106512","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106512","url":null,"abstract":"<div><p>This article treats AND-OR tree computation in terms of query complexity. We are interested in the cases where assignments (inputs) or algorithms are randomized. For the former case, it is known that there is a unique randomized assignment achieving the distributional complexity of balanced trees. On the other hand, the dual problem has the opposite result; the optimal randomized algorithms for balanced trees are not unique. We extend the latter study on randomized algorithms to weakly-balanced trees, and see that the uniqueness still fails.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106512"},"PeriodicalIF":0.5,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lower and upper bounds on graph communicabilities 图通信能力的下限和上限
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-05-08 DOI: 10.1016/j.ipl.2024.106501
Amir Hossein Ghodrati , Mohammad Ali Hosseinzadeh
{"title":"Lower and upper bounds on graph communicabilities","authors":"Amir Hossein Ghodrati ,&nbsp;Mohammad Ali Hosseinzadeh","doi":"10.1016/j.ipl.2024.106501","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106501","url":null,"abstract":"<div><p>In this paper, some lower and upper bounds for the subgraph centrality and communicability of a graph are proved. The expected value of the normalized total communicability of a random <span><math><mi>G</mi><mo>(</mo><mi>n</mi><mo>,</mo><mi>p</mi><mo>)</mo></math></span> graph is also considered and asymptotically determined. Moreover, some computational results are presented to compare the bounds obtained in this paper with some other bounds in the literature.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106501"},"PeriodicalIF":0.5,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140905396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On conflict-free cuts: Algorithms and complexity 关于无冲突切割:算法与复杂性
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-05-08 DOI: 10.1016/j.ipl.2024.106503
Johannes Rauch , Dieter Rautenbach , Uéverton S. Souza
{"title":"On conflict-free cuts: Algorithms and complexity","authors":"Johannes Rauch ,&nbsp;Dieter Rautenbach ,&nbsp;Uéverton S. Souza","doi":"10.1016/j.ipl.2024.106503","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106503","url":null,"abstract":"<div><p>One way to define the <span>Matching Cut</span> problem is: Given a graph <em>G</em>, is there an edge-cut <em>M</em> of <em>G</em> such that <em>M</em> is an independent set in the line graph of <em>G</em>? We propose the more general <span>Conflict-Free Cut</span> problem: Together with the graph <em>G</em>, we are given a so-called conflict graph <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> on the edges of <em>G</em>, and we ask for an edge-cutset <em>M</em> of <em>G</em> that is independent in <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span>. Since conflict-free settings are popular generalizations of classical optimization problems and <span>Conflict-Free Cut</span> was not considered in the literature so far, we start the study of the problem. We show that the problem is <span><math><mi>NP</mi></math></span>-complete even when the maximum degree of <em>G</em> is 5 and <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is 1-regular. The same reduction implies an exponential lower bound on the solvability based on the Exponential Time Hypothesis. We also give parameterized complexity results: We show that the problem is fixed-parameter tractable with the vertex cover number of <em>G</em> as a parameter, and we show <span><math><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></math></span>-hardness even when <em>G</em> has a feedback vertex set of size one, and the clique cover number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is the parameter. Since the clique cover number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is an upper bound on the independence number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> and thus the solution size, this implies <span><math><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></math></span>-hardness when parameterized by the cut size. We list polynomial-time solvable cases and interesting open problems. At last, we draw a connection to a symmetric variant of <span>SAT</span>.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106503"},"PeriodicalIF":0.5,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000334/pdfft?md5=245b78d016a76de957fec713f0824a46&pid=1-s2.0-S0020019024000334-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved lower bound for differentially private facility location 不同私人设施位置的改进下限
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-05-07 DOI: 10.1016/j.ipl.2024.106502
Pasin Manurangsi
{"title":"Improved lower bound for differentially private facility location","authors":"Pasin Manurangsi","doi":"10.1016/j.ipl.2024.106502","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106502","url":null,"abstract":"<div><p>We consider the differentially private (DP) facility location problem in the so called <em>super-set output</em> setting proposed by Gupta et al. <span>[13]</span>. The current best known expected approximation ratio for an <em>ϵ</em>-DP algorithm is <span><math><mi>O</mi><mrow><mo>(</mo><mfrac><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow><mrow><msqrt><mrow><mi>ϵ</mi></mrow></msqrt></mrow></mfrac><mo>)</mo></mrow></math></span> due to Cohen-Addad et al. <span>[3]</span> where <em>n</em> denote the size of the metric space, meanwhile the best known lower bound is <span><math><mi>Ω</mi><mo>(</mo><mn>1</mn><mo>/</mo><msqrt><mrow><mi>ϵ</mi></mrow></msqrt><mo>)</mo></math></span> <span>[8]</span>.</p><p>In this short note, we give a lower bound of <span><math><mover><mrow><mi>Ω</mi></mrow><mrow><mo>˜</mo></mrow></mover><mrow><mo>(</mo><mi>min</mi><mo>⁡</mo><mrow><mo>{</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>,</mo><msqrt><mrow><mfrac><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow><mrow><mi>ϵ</mi></mrow></mfrac></mrow></msqrt><mo>}</mo></mrow><mo>)</mo></mrow></math></span> on the expected approximation ratio of any <em>ϵ</em>-DP algorithm, which is the first evidence that the approximation ratio has to grow with the size of the metric space.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106502"},"PeriodicalIF":0.5,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is this network proper forest-based? 这个网络是以森林为基础的吗?
IF 0.5 4区 计算机科学
Information Processing Letters Pub Date : 2024-05-06 DOI: 10.1016/j.ipl.2024.106500
Katharina T. Huber , Leo van Iersel , Vincent Moulton , Guillaume E. Scholz
{"title":"Is this network proper forest-based?","authors":"Katharina T. Huber ,&nbsp;Leo van Iersel ,&nbsp;Vincent Moulton ,&nbsp;Guillaume E. Scholz","doi":"10.1016/j.ipl.2024.106500","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106500","url":null,"abstract":"<div><p>In evolutionary biology, networks are becoming increasingly used to represent evolutionary histories for species that have undergone non-treelike or reticulate evolution. Such networks are essentially directed acyclic graphs with a leaf set that corresponds to a collection of species, and in which non-leaf vertices with indegree 1 correspond to speciation events and vertices with indegree greater than 1 correspond to reticulate events such as gene transfer. Recently forest-based networks have been introduced, which are essentially (multi-rooted) networks that can be formed by adding some arcs to a collection of phylogenetic trees (or phylogenetic forest), where each arc is added in such a way that its ends always lie in two different trees in the forest. In this paper, we consider the complexity of deciding whether a given network is proper forest-based, that is, whether it can be formed by adding arcs to some underlying phylogenetic forest which contains the same number of trees as there are roots in the network. More specifically, we show that it is NP-complete to decide whether a tree-child network with <em>m</em> roots is proper forest-based, for each <span><math><mi>m</mi><mo>≥</mo><mn>2</mn></math></span>. Moreover, for binary networks the problem remains NP-complete when <span><math><mi>m</mi><mo>≥</mo><mn>3</mn></math></span> but becomes polynomial-time solvable for <span><math><mi>m</mi><mo>=</mo><mn>2</mn></math></span>. We also give a fixed parameter tractable (FPT) algorithm, with parameters the maximum outdegree of a vertex, the number of roots, and the number of indegree 2 vertices, for deciding if a semi-binary network is proper forest-based. A key element in proving our results is a new characterization for when a network with <em>m</em> roots is proper forest-based in terms of certain <em>m</em>-colorings.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106500"},"PeriodicalIF":0.5,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000309/pdfft?md5=6bb24ac246fe9301af0f20ad64b94c09&pid=1-s2.0-S0020019024000309-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信