{"title":"使稳定配对适应强迫和禁止配对","authors":"Niclas Boehmer, Klaus Heeger","doi":"10.1016/j.jcss.2024.103579","DOIUrl":null,"url":null,"abstract":"<div><p>We introduce the problem of adapting a stable matching to forced and forbidden pairs. Given a stable matching <span><math><msub><mrow><mi>M</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>, a set <em>Q</em> of forced pairs, and a set <em>P</em> of forbidden pairs, we want to find a stable matching that includes all pairs from <em>Q</em>, no pair from <em>P</em>, and is as close as possible to <span><math><msub><mrow><mi>M</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>. We study this problem in four classic stable matching settings: <span>Stable Roommates (with Ties)</span> and <span>Stable Marriage (with Ties)</span>. Our main contribution is a polynomial-time algorithm, based on the theory of rotations, for adapting <span>Stable Roommates</span> matchings to forced pairs. In contrast, we show that the same problem for forbidden pairs is NP-hard. However, our polynomial-time algorithm for forced pairs can be extended to a fixed-parameter tractable algorithm with respect to the number of forbidden pairs. Moreover, we study the setting where preferences contain ties: Some of our algorithmic results can be extended while other problems become intractable.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"147 ","pages":"Article 103579"},"PeriodicalIF":1.1000,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000746/pdfft?md5=5e125ee369922694f684034bd2940b97&pid=1-s2.0-S0022000024000746-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Adapting stable matchings to forced and forbidden pairs\",\"authors\":\"Niclas Boehmer, Klaus Heeger\",\"doi\":\"10.1016/j.jcss.2024.103579\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>We introduce the problem of adapting a stable matching to forced and forbidden pairs. Given a stable matching <span><math><msub><mrow><mi>M</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>, a set <em>Q</em> of forced pairs, and a set <em>P</em> of forbidden pairs, we want to find a stable matching that includes all pairs from <em>Q</em>, no pair from <em>P</em>, and is as close as possible to <span><math><msub><mrow><mi>M</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>. We study this problem in four classic stable matching settings: <span>Stable Roommates (with Ties)</span> and <span>Stable Marriage (with Ties)</span>. Our main contribution is a polynomial-time algorithm, based on the theory of rotations, for adapting <span>Stable Roommates</span> matchings to forced pairs. In contrast, we show that the same problem for forbidden pairs is NP-hard. However, our polynomial-time algorithm for forced pairs can be extended to a fixed-parameter tractable algorithm with respect to the number of forbidden pairs. Moreover, we study the setting where preferences contain ties: Some of our algorithmic results can be extended while other problems become intractable.</p></div>\",\"PeriodicalId\":50224,\"journal\":{\"name\":\"Journal of Computer and System Sciences\",\"volume\":\"147 \",\"pages\":\"Article 103579\"},\"PeriodicalIF\":1.1000,\"publicationDate\":\"2024-08-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S0022000024000746/pdfft?md5=5e125ee369922694f684034bd2940b97&pid=1-s2.0-S0022000024000746-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer and System Sciences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0022000024000746\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"BUSINESS, FINANCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer and System Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0022000024000746","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"BUSINESS, FINANCE","Score":null,"Total":0}
Adapting stable matchings to forced and forbidden pairs
We introduce the problem of adapting a stable matching to forced and forbidden pairs. Given a stable matching , a set Q of forced pairs, and a set P of forbidden pairs, we want to find a stable matching that includes all pairs from Q, no pair from P, and is as close as possible to . We study this problem in four classic stable matching settings: Stable Roommates (with Ties) and Stable Marriage (with Ties). Our main contribution is a polynomial-time algorithm, based on the theory of rotations, for adapting Stable Roommates matchings to forced pairs. In contrast, we show that the same problem for forbidden pairs is NP-hard. However, our polynomial-time algorithm for forced pairs can be extended to a fixed-parameter tractable algorithm with respect to the number of forbidden pairs. Moreover, we study the setting where preferences contain ties: Some of our algorithmic results can be extended while other problems become intractable.
期刊介绍:
The Journal of Computer and System Sciences publishes original research papers in computer science and related subjects in system science, with attention to the relevant mathematical theory. Applications-oriented papers may also be accepted and they are expected to contain deep analytic evaluation of the proposed solutions.
Research areas include traditional subjects such as:
• Theory of algorithms and computability
• Formal languages
• Automata theory
Contemporary subjects such as:
• Complexity theory
• Algorithmic Complexity
• Parallel & distributed computing
• Computer networks
• Neural networks
• Computational learning theory
• Database theory & practice
• Computer modeling of complex systems
• Security and Privacy.