{"title":"如何隐藏小团体?","authors":"Uriel Feige, Vadim Grinberg","doi":"10.1007/s00224-024-10167-x","DOIUrl":null,"url":null,"abstract":"<p>In the well known planted clique problem, a clique (or alternatively, an independent set) of size <i>k</i> is planted at random in an Erdos-Renyi random <i>G</i>(<i>n</i>, <i>p</i>) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size <span>\\(k = \\sqrt{n}\\)</span> planted in a random <span>\\(G(n, \\frac{1}{2})\\)</span> graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size <span>\\(k=\\frac{n}{2}\\)</span> in a <i>G</i>(<i>n</i>, <i>p</i>) graph with <span>\\(p = n^{-\\frac{1}{2}}\\)</span>, there is no polynomial time algorithm that finds an independent set of size <i>k</i>, unless NP has randomized polynomial time algorithms.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.6000,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How to Hide a Clique?\",\"authors\":\"Uriel Feige, Vadim Grinberg\",\"doi\":\"10.1007/s00224-024-10167-x\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In the well known planted clique problem, a clique (or alternatively, an independent set) of size <i>k</i> is planted at random in an Erdos-Renyi random <i>G</i>(<i>n</i>, <i>p</i>) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size <span>\\\\(k = \\\\sqrt{n}\\\\)</span> planted in a random <span>\\\\(G(n, \\\\frac{1}{2})\\\\)</span> graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size <span>\\\\(k=\\\\frac{n}{2}\\\\)</span> in a <i>G</i>(<i>n</i>, <i>p</i>) graph with <span>\\\\(p = n^{-\\\\frac{1}{2}}\\\\)</span>, there is no polynomial time algorithm that finds an independent set of size <i>k</i>, unless NP has randomized polynomial time algorithms.</p>\",\"PeriodicalId\":22832,\"journal\":{\"name\":\"Theory of Computing Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2024-04-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Theory of Computing Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s00224-024-10167-x\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theory of Computing Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s00224-024-10167-x","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
In the well known planted clique problem, a clique (or alternatively, an independent set) of size k is planted at random in an Erdos-Renyi random G(n, p) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size \(k = \sqrt{n}\) planted in a random \(G(n, \frac{1}{2})\) graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size \(k=\frac{n}{2}\) in a G(n, p) graph with \(p = n^{-\frac{1}{2}}\), there is no polynomial time algorithm that finds an independent set of size k, unless NP has randomized polynomial time algorithms.
期刊介绍:
TOCS is devoted to publishing original research from all areas of theoretical computer science, ranging from foundational areas such as computational complexity, to fundamental areas such as algorithms and data structures, to focused areas such as parallel and distributed algorithms and architectures.