-
Approximability of open k -monopoly problems Theory Comput. Syst. (IF 0.497) Pub Date : 2021-01-14 Sounaka Mishra, B. Arjuna Krishna, Shijin Rajakrishnan
We consider approximability of two optimization problems called Minimum Open k-Monopoly (Min-Open-k-Monopoly) and Minimum Partial Open k-Monopoly (Min-P-Open-k-Monopoly), where k is a fixed positive integer. The objective, in Min-Open-k-Monopoly, is to find a minimum cardinality vertex set \(S \subseteq V\) in a given graph G = (V,E) such that \(|N(v) \cap S| \geq \frac {1}{2} |N(v)| + k\), for every
-
On the Complexity of the Clone Membership Problem Theory Comput. Syst. (IF 0.497) Pub Date : 2021-01-20 Emil Jeřábek
We investigate the complexity of the Boolean clone membership problem (CMP): given a set of Boolean functions F and a Boolean function f, determine if f is in the clone generated by F, i.e., if it can be expressed by a circuit with F-gates. Here, f and elements of F are given as circuits or formulas over the usual De Morgan basis. Böhler and Schnoor (Theory Comput. Syst. 41(4):753–777, 2007) proved
-
Minimum Reload Cost Graph Factors Theory Comput. Syst. (IF 0.497) Pub Date : 2021-01-18 Julien Baste, Didem Gözüpek, Mordechai Shalom, Dimitrios M. Thilikos
The concept of Reload cost in a graph refers to the cost that occurs while traversing a vertex via two of its incident edges. This cost is uniquely determined by the colors of the two edges. This concept has various applications in transportation networks, communication networks, and energy distribution networks. Various problems using this model are defined and studied in the literature. The problem
-
Parameterized Complexity of Conflict-Free Set Cover Theory Comput. Syst. (IF 0.497) Pub Date : 2021-01-12 Ashwin Jacob, Diptapriyo Majumdar, Venkatesh Raman
Set Cover is one of the well-known classical NP-hard problems. We study the conflict-free version of the Set Cover problem. Here we have a universe \(\mathcal {U}\), a family \(\mathcal {F}\) of subsets of \(\mathcal {U}\) and a graph \(G_{\mathcal {F}}\) on the vertex set \(\mathcal {F}\) and we look for a subfamily \(\mathcal {F}^{\prime } \subseteq \mathcal {F}\) of minimum size that covers \(\mathcal
-
Correction to: On the Expressive Power of Linear Algebra on Graphs Theory Comput. Syst. (IF 0.497) Pub Date : 2021-01-11 Floris Geerts
A Correction to this paper has been published: https://doi.org/10.1007/s00224-020-10020-x
-
Managing Multiple Mobile Resources Theory Comput. Syst. (IF 0.497) Pub Date : 2021-01-11 Björn Feldkord, Till Knollmann, Manuel Malatyali, Friedhelm Meyer auf der Heide
We extend the Mobile Server problem introduced in Feldkord and Meyer auf der Heide (TOPC 6(3), 14:1–14:17 2019) to a model where k identical mobile resources, here named servers, answer requests appearing at points in the Euclidean space. To reduce communication costs, the positions of the servers can be adapted by a limited distance ms per round for each server. The costs are measured similarly to
-
Constructing Antidictionaries of Long Texts in Output-Sensitive Space Theory Comput. Syst. (IF 0.497) Pub Date : 2020-12-14 Lorraine A.K. Ayad, Golnaz Badkobeh, Gabriele Fici, Alice Héliou, Solon P. Pissis
A word x that is absent from a word y is called minimal if all its proper factors occur in y. Given a collection of k words y1, … , yk over an alphabet Σ, we are asked to compute the set \(\mathrm {M}^{\ell }_{\{y_1,\ldots ,y_k\}}\) of minimal absent words of length at most ℓ of the collection {y1, … , yk}. The set \(\mathrm {M}^{\ell }_{\{y_1,\ldots ,y_k\}}\) contains all the words x such that x is
-
Stable Divisorial Gonality is in NP Theory Comput. Syst. (IF 0.497) Pub Date : 2020-12-07 Hans L. Bodlaender, Marieke van der Wegen, Tom C. van der Zanden
Divisorial gonality and stable divisorial gonality are graph parameters, which have an origin in algebraic geometry. Divisorial gonality of a connected graph G can be defined with help of a chip firing game on G. The stable divisorial gonality of G is the minimum divisorial gonality over all subdivisions of edges of G. In this paper we prove that deciding whether a given connected graph has stable
-
Computability of Products of Chainable Continua Theory Comput. Syst. (IF 0.497) Pub Date : 2020-11-13 Matea Čelar, Zvonko Iljazović
We examine conditions under which a semicomputable set in a computable topological space is computable. In particular, we examine topological pairs (A, B) with the following property: if X is a computable topological space and \(f:A\rightarrow X\) is an embedding such that f(A) and f(B) are semicomputable sets in X, then f(A) is a computable set in X. Such pairs (A, B) are said to have computable type
-
On the Complexity of the Smallest Grammar Problem over Fixed Alphabets Theory Comput. Syst. (IF 0.497) Pub Date : 2020-11-13 Katrin Casel, Henning Fernau, Serge Gaspers, Benjamin Gras, Markus L. Schmid
In the smallest grammar problem, we are given a word w and we want to compute a preferably small context-free grammar G for the singleton language {w} (where the size of a grammar is the sum of the sizes of its rules, and the size of a rule is measured by the length of its right side). It is known that, for unbounded alphabets, the decision variant of this problem is NP-hard and the optimisation variant
-
Streaming Algorithms for Bin Packing and Vector Scheduling Theory Comput. Syst. (IF 0.497) Pub Date : 2020-11-12 Graham Cormode, Pavel Veselý
Problems involving the efficient arrangement of simple objects, as captured by bin packing and makespan scheduling, are fundamental tasks in combinatorial optimization. These are well understood in the traditional online and offline cases, but have been less well-studied when the volume of the input is truly massive, and cannot even be read into memory. This is captured by the streaming model of computation
-
Fixed-Parameter Tractability of ( n − k ) List Coloring Theory Comput. Syst. (IF 0.497) Pub Date : 2020-11-07 Aritra Banik, Ashwin Jacob, Vijay Kumar Paliwal, Venkatesh Raman
We consider the list-coloring problem from the perspective of parameterized complexity. In the classical graph coloring problem we are given an undirected graph and the goal is to color the vertices of the graph with minimum number of colors so that end points of each edge get different colors. In list-coloring, each vertex is given a list of allowed colors with which it can be colored. An interesting
-
Index-based, High-dimensional, Cosine Threshold Querying with Optimality Guarantees Theory Comput. Syst. (IF 0.497) Pub Date : 2020-10-26 Yuliang Li, Jianguo Wang, Benjamin Pullman, Nuno Bandeira, Yannis Papakonstantinou
Given a database of vectors, a cosine threshold query returns all vectors in the database having cosine similarity to a query vector above a given threshold θ. These queries arise naturally in many applications, such as document retrieval, image search, and mass spectrometry. The paper considers the efficient evaluation of such queries, as well as of the closely related top-k cosine similarity queries
-
Faster Parameterized Algorithm for Cluster Vertex Deletion Theory Comput. Syst. (IF 0.497) Pub Date : 2020-10-24 Dekel Tsur
In the Cluster Vertex Deletion problem the input is a graph G and an integer k. The goal is to decide whether there is a set of vertices S of size at most k such that the deletion of the vertices of S from G results in a graph in which every connected component is a clique. We give an algorithm for Cluster Vertex Deletion whose running time is O∗(1.811k).
-
Fast Scheduling in Distributed Transactional Memory Theory Comput. Syst. (IF 0.497) Pub Date : 2020-10-23 Costas Busch, Maurice Herlihy, Miroslav Popovic, Gokarna Sharma
We investigate scheduling algorithms for distributed transactional memory systems where transactions residing at nodes of a communication graph operate on shared, mobile objects. A transaction requests the objects it needs, executes once those objects have been assembled, and then possibly forwards those objects to other waiting transactions. Minimizing execution time in this model is known to be NP-hard
-
Nearly Linear Time Isomorphism Algorithms for Some Nonabelian Group Classes Theory Comput. Syst. (IF 0.497) Pub Date : 2020-10-21 Bireswar Das, Shivdutt Sharma
The isomorphism problem for groups, when the groups are given by their Cayley tables is a well-studied problem. This problem has been studied for various restricted classes of groups. Kavitha gave a linear time isomorphism algorithm for abelian groups (JCSS 2007). Although there are isomorphism algorithms for certain nonabelian group classes represented by their Cayley tables, the complexities of those
-
On Tseitin Formulas, Read-Once Branching Programs and Treewidth Theory Comput. Syst. (IF 0.497) Pub Date : 2020-10-09 Ludmila Glinskih, Dmitry Itsykson
We show that any nondeterministic read-once branching program that decides a satisfiable Tseitin formula based on an n × n grid graph has size at least 2Ω(n). Then using the Excluded Grid Theorem by Robertson and Seymour we show that for an arbitrary graph G(V, E) any nondeterministic read-once branching program that computes a satisfiable Tseitin formula based on G has size at least \(2^{\Omega (\text
-
On the Expressive Power of Linear Algebra on Graphs Theory Comput. Syst. (IF 0.497) Pub Date : 2020-10-04 Floris Geerts
There is a long tradition in understanding graphs by investigating their adjacency matrices by means of linear algebra. Similarly, logic-based graph query languages are commonly used to explore graph properties. In this paper, we bridge these two approaches by regarding linear algebra as a graph query language. More specifically, we consider MATLANG, a matrix query language recently introduced, in
-
The Containment Problem for Unambiguous Register Automata and Unambiguous Timed Automata Theory Comput. Syst. (IF 0.497) Pub Date : 2020-09-15 Antoine Mottet, Karin Quaas
We investigate the complexity of the containment problem “Does \(L(\mathcal {A})\subseteq L({\mathscr{B}})\) hold?” for register automata and timed automata, where \({\mathscr{B}}\) is assumed to be unambiguous and \(\mathcal {A}\) is arbitrary. We prove that the problem is decidable in the case of register automata over \((\mathbb N,=)\), in the case of register automata over \((\mathbb Q,<)\) when
-
The Non-hardness of Approximating Circuit Size Theory Comput. Syst. (IF 0.497) Pub Date : 2020-09-12 Eric Allender, Rahul Ilango, Neekon Vafa
The Minimum Circuit Size Problem (MCSP) has been the focus of intense study recently; MCSP is hard for SZK under rather powerful reductions (Allender and Das Inf. Comput. 256, 2–8, 2017), and is provably not hard under “local” reductions computable in TIME(n0.49) (Murray and Williams Theory Comput. 13(1), 1–22, 2017). The question of whether MCSP is NP-hard (or indeed, hard even for small subclasses
-
Characterizing Tractability of Simple Well-Designed Pattern Trees with Projection Theory Comput. Syst. (IF 0.497) Pub Date : 2020-09-10 Stefan Mengel, Sebastian Skritek
We study the complexity of evaluating well-designed pattern trees, a query language extending conjunctive queries with the possibility to define parts of the query to be optional. This possibility of optional parts is important for obtaining meaningful results over incomplete data sources as it is common in semantic web settings. Recently, a structural characterization of the classes of well-designed
-
Analyzing Clustering and Partitioning Problems in Selected VLSI Models Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-22 Z. Donovan, K. Subramani, V. Mkrtchyan
As the modern integrated circuit continues to grow in complexity, the design of very large-scale integrated (VLSI) circuits involves massive teams employing state-of-the-art computer-aided design (CAD) tools. An old yet significant CAD problem for VLSI circuits is physical design automation. In physical design automation, we need to compute the best physical layout of millions to billions of circuit
-
On the Relation Between Structured d -DNNFs and SDDs Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-17 Beate Bollig, Martin Farenholtz
Structured d-DNNFs and SDDs are restricted negation normal form circuits used in knowledge compilation as target languages into which propositional theories are compiled. Structuredness is imposed by so-called vtrees. By definition SDDs are restricted structured d-DNNFs. Beame and Liew (2015) as well as Bova and Szeider (2017) mentioned the question whether structured d-DNNFs are really more general
-
Semi-Oblivious Chase Termination: The Sticky Case Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-17 Marco Calautti, Andreas Pieris
The chase procedure is a fundamental algorithmic tool in database theory with a variety of applications. A key problem concerning the chase procedure is all-instances termination: for a given set of tuple-generating dependencies (TGDs), is it the case that the chase terminates for every input database? In view of the fact that this problem is undecidable, it is natural to ask whether known well-behaved
-
Derandomization for Sliding Window Algorithms with Strict Correctness ∗ Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-14 Moses Ganardi, Danny Hucke, Markus Lohrey
In the sliding window streaming model the goal is to compute an output value that only depends on the last n symbols from the data stream. Thereby, only space sublinear in the window size n should be used. Quite often randomization is used in order to achieve this goal. In the literature, one finds two different correctness criteria for randomized sliding window algorithms: (i) one can require that
-
Preservation of Normality by Non-Oblivious Group Selection Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-14 Olivier Carton, Joseph Vandehey
We give two different proofs of the fact that non-oblivious selection via regular group sets preserves normality. Non-oblivious here means that whether or not a symbol is selected can depend on the symbol itself. One proof relies on the incompressibility of normal sequences, the other on the use of augmented dynamical systems.
-
Exploration of Dynamic Cactuses with Sub-logarithmic Overhead Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-14 David Ilcinkas, Ahmed M. Wade
We study the problem of exploration by a mobile entity (agent) of a class of dynamic networks, namely constantly connected dynamic graphs. This problem has already been studied in the case where the agent knows the dynamics of the graph and the underlying graph is a ring of n vertices (Ilcinkas and Wade 2018). In this paper, we consider the same problem and we suppose that the underlying graph is a
-
On Decidability of Theories of Regular Languages Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-13 Sergey Dudakov, Boris Karlov
This paper is dedicated to studying decidability properties of theories of regular languages with classical operations: union, concatenation, and the Kleene star. The theory with union only is a theory of some Boolean algebra, so it is decidable. We prove that the theory of regular languages with the Kleene star only is decidable. If we use union and concatenation simultaneously, then the theory becomes
-
Computing the k -Visibility Region of a Point in a Polygon Theory Comput. Syst. (IF 0.497) Pub Date : 2020-08-11 Yeganeh Bahoo, Prosenjit Bose, Stephane Durocher, Thomas C. Shermer
Two points p and q in a simple polygon P are k-visible when the line segment pq crosses the boundary of P at most k times. Given a query point q, a positive integer k, and a polygon P, we design an algorithm that computes the region of P that is k-visible from q in O(nk) time, where n denotes the number of vertices of P. This region is called the k-visibility region of q. This is the first algorithm
-
Satisfiability Algorithm for Syntactic Read- k -times Branching Programs Theory Comput. Syst. (IF 0.497) Pub Date : 2020-07-27 Atsuki Nagao, Kazuhisa Seto, Junichi Teruyama
The satisfiability of a given branching program is to determine whether there exists a consistent path from the root to 1-sink. In a syntactic read-k-times branching program, each variable appears at most k times in any path from the root to a sink. In a preliminary version of this paper, we provide a satisfiability algorithm for syntactic read-k-times branching programs with n variables and m edges
-
Space Lower Bounds for the Signal Detection Problem Theory Comput. Syst. (IF 0.497) Pub Date : 2020-07-20 Faith Ellen, Rati Gelashvili, Philipp Woelfel, Leqi Zhu
Many shared memory algorithms have to deal with the problem of determining whether the value of a shared object has changed in between two successive accesses of that object by a process when the responses from both are the same. Motivated by this problem, we define the signal detection problem, which can be studied on a purely combinatorial level. Consider a system with n + 1 processes consisting
-
On the Average Case of MergeInsertion Theory Comput. Syst. (IF 0.497) Pub Date : 2020-06-30 Florian Stober, Armin Weiß
MergeInsertion, also known as the Ford-Johnson algorithm, is a sorting algorithm which, up to today, for many input sizes achieves the best known upper bound on the number of comparisons. Indeed, it gets extremely close to the information-theoretic lower bound. While the worst-case behavior is well understood, only little is known about the average case. This work takes a closer look at the average
-
Consistent Query Answering for Primary Keys in Datalog Theory Comput. Syst. (IF 0.497) Pub Date : 2020-06-30 Paraschos Koutris, Jef Wijsen
We study the complexity of consistent query answering on databases that may violate primary key constraints. A repair of such a database is any consistent database that can be obtained by deleting a minimal set of tuples. For every Boolean query q, CERTAINTY(q) is the problem that takes a database as input and asks whether q evaluates to true on every repair. In Koutris and Wijsen (ACM Trans. Database
-
Belga B-Trees Theory Comput. Syst. (IF 0.497) Pub Date : 2020-06-27 Erik D. Demaine, John Iacono, Grigorios Koumoutsos, Stefan Langerman
We revisitself-adjustingexternal memory tree data structures, which combine the optimal (and practical) worst-case I/O performances of B-trees, while adapting to the online distribution of queries. Our approach is analogous to undergoing efforts in the BST model, where Tango Trees (Demaine et al., SIAM J. Comput. 37(1), 240–251, 2007) were shown to be \(O(\log \log N)\)-competitive with the runtime
-
Forward Looking Huffman Coding Theory Comput. Syst. (IF 0.497) Pub Date : 2020-06-25 Shmuel T. Klein, Shoham Saadia, Dana Shapira
Huffman coding is known to be optimal, yet its dynamic version may yield smaller compressed files. The best known bound is that the number of bits used by dynamic Huffman coding in order to encode a message of n characters is at most larger by n bits than the size of the file required by static Huffman coding. In particular, dynamic Huffman coding can also generate a larger encoded file than the static
-
Dichotomy for Holant ∗ Problems on the Boolean Domain Theory Comput. Syst. (IF 0.497) Pub Date : 2020-06-22 Jin-Yi Cai, Pinyan Lu, Mingji Xia
Holant problems are a general framework to study counting problems. Both counting constraint satisfaction problems (#CSP) and graph homomorphisms are special cases. We prove a complexity dichotomy theorem for \(\text {Holant}^{*}(\mathcal {F})\), where \({\mathcal {F}}\) is a set of constraint functions on Boolean variables and taking complex values. The constraint functions need not be symmetric functions
-
On Envy-Free Revenue Approximation for Combinatorial Buyers with Budgets Theory Comput. Syst. (IF 0.497) Pub Date : 2020-06-09 Evangelos Markakis, Apostolos Ntokos, Orestis Telelis
We study the computation of revenue-maximizing envy-free outcomes, in a monopoly market with budgeted buyers. Departing from previous works, we focus on buyers with combinatorial valuation functions, that are defined over subsets of distinct goods. Our results concern several classes of valuation functions. For single-minded budgeted buyers, we show a best possible polynomial-time approximation of
-
Complexity and Algorithms for Semipaired Domination in Graphs Theory Comput. Syst. (IF 0.497) Pub Date : 2020-06-06 Michael A. Henning, Arti Pandey, Vikash Tripathi
For a graph G = (V, E) with no isolated vertices, a set \(D\subseteq V\) is called a semipaired dominating set of G if (i)D is a dominating set of G, and (ii)D can be partitioned into two element subsets such that the vertices in each two element set are at distance at most two. The minimum cardinality of a semipaired dominating set of G is called the semipaired domination number of G, and is denoted
-
Parameterized Complexity of Min-Power Asymmetric Connectivity Theory Comput. Syst. (IF 0.497) Pub Date : 2020-05-23 Matthias Bentert, Roman Haag, Christian Hofer, Tomohiro Koana, André Nichterlein
We investigate parameterized algorithms for the NP-hard problem Min-Power Asymmetric Connectivity (MinPAC) that has applications in wireless sensor networks. Given a directed arc-weighted graph, MinPAC asks for a strongly connected spanning subgraph minimizing the summed vertex costs. Here, the cost of each vertex is the weight of its heaviest outgoing arc in the chosen subgraph. We present linear-time
-
Multiplication Algorithm Based on Collatz Function Theory Comput. Syst. (IF 0.497) Pub Date : 2020-05-15 David Barina
This article presents a new multiplication algorithm based on the Collatz function. Assuming the validity of the Collatz conjecture, the time complexity of multiplying two n-digit numbers is O(kn), where the k is the number of odd steps in the Collatz trajectory of the first multiplicand. Most likely, the algorithm is only of theoretical interest.
-
Fast Algorithms for the Shortest Unique Palindromic Substring Problem on Run-Length Encoded Strings Theory Comput. Syst. (IF 0.497) Pub Date : 2020-05-09 Kiichi Watanabe, Yuto Nakashima, Shunsuke Inenaga, Hideo Bannai, Masayuki Takeda
For a string S, a palindromic substring S[i..j] is said to be a shortest unique palindromic substring (SUPS) for an interval [s,t] in S, if S[i..j] occurs exactly once in S, the interval [i,j] contains [s,t], and every palindromic substring containing [s,t] which is shorter than S[i..j] occurs at least twice in S. In this paper, we study the problem of answering SUPS queries on run-length encoded strings
-
Unpopularity Factor in the Marriage and Roommates Problems Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-28 Suthee Ruangwises, Toshiya Itoh
Given a set A of n people, with each person having a preference list that ranks a subset of A as his/her acceptable partners in order of preference, we consider the Roommates Problem (rp) and the Marriage Problem (mp) of matching people with their partners. In rp there is no further restriction, while in mp only people of opposite genders can be acceptable partners. For a pair of matchings X and Y
-
An Improved FPT Algorithm for Independent Feedback Vertex Set Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-25 Shaohua Li, Marcin Pilipczuk
We study the Independent Feedback Vertex Set problem — a variant of the classic Feedback Vertex Set problem where, given a graph G and an integer k, the problem is to decide whether there exists a vertex set \(S\subseteq V(G)\) such that G ∖ S is a forest and S is an independent set of size at most k. We present an \(\mathcal {O}^{\ast }((1+\varphi ^{2})^{k})\)-time FPT algorithm for this problem,
-
Santha-Vazirani sources, deterministic condensers and very strong extractors Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-23 Dmitry Gavinsky; Pavel Pudlák
The notion of semi-random sources, also known as Santha-Vazirani (SV) sources, stands for a sequence of n bits, where the dependence of the i’th bit on the previousi − 1 bits is limited for every i ∈ [n]. If the dependence of the i’th bit on the remainingn − 1 bits is limited, then this is a strongSV-source. Even the strong SV -sources are known not to admit (universal) deterministic extractors, but
-
Transition Property for Cube-Free Words Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-21 Elena A. Petrova, Arseny M. Shur
We study cube-free words over arbitrary non-unary finite alphabets and prove the following structural property: for every pair (u, v) of d-ary cube-free words, if u can be infinitely extended to the right and v can be infinitely extended to the left respecting the cube-freeness property, then there exists a “transition” word w over the same alphabet such that uwv is cube free. The crucial case is the
-
Effective Categoricity of Automatic Equivalence and Nested Equivalence Structures Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-08 Jacob Carson; Douglas Cenzer; Jeffrey B. Remmel
We study automatic equivalence and nested equivalence structures. The goal is to compare and contrast these automatic structures with computable equivalence and nested equivalence structures. Equivalence structures \(\mathcal {A}\) may be characterized by their characters \(\chi ({\mathcal {A}})\) which encodes the number of equivalence classes of any given size. The characters of computably categorical
-
Complexity of Fall Coloring for Restricted Graph Classes Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-08 Juho Lauri, Christodoulos Mitillos
We strengthen a result by Laskar and Lyle (Discrete Appl. Math. 157, 330–338 2009) by proving that it is NP-complete to decide whether a bipartite planar graph can be partitioned into three independent dominating sets. In contrast, we show that this is always possible for every maximal outerplanar graph with at least three vertices. Moreover, we extend their previous result by proving that deciding
-
On the Fixed-Parameter Tractability of the Maximum Connectivity Improvement Problem Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-07 Federico Corò; Gianlorenzo D’Angelo; Vahan Mkrtchyan
In the Maximum Connectivity Improvement (MCI) problem, we are given a directed graph G = (V,E) and an integer B and we are asked to find B new edges to be added to G in order to maximize the number of connected pairs of vertices in the resulting graph. The MCI problem has been studied from the approximation point of view. In this paper, we approach it from the parameterized complexity perspective in
-
First-Order Orbit Queries Theory Comput. Syst. (IF 0.497) Pub Date : 2020-04-04 Shaull Almagor, Joël Ouaknine, James Worrell
Orbit Problems are a class of fundamental reachability questions that arise in the analysis of discrete-time linear dynamical systems such as automata, Markov chains, recurrence sequences, and linear while loops. Instances of the problem comprise a dimension \(d\in \mathbb {N}\), a square matrix \(A\in \mathbb {Q}^{d\times d}\), and a query regarding the behaviour of some sets under repeated applications
-
Conflict Free Version of Covering Problems on Graphs: Classical and Parameterized Theory Comput. Syst. (IF 0.497) Pub Date : 2020-02-28 Pallavi Jain; Lawqueen Kanesh; Pranabendu Misra
Let π be a family of graphs. In the classical π-Vertex Deletion problem, given a graph G and a positive integer k, the objective is to check whether there exists a subset S of at most k vertices such that G − S is in π. In this paper, we introduce the conflict free version of this classical problem, namely Conflict Free π-Vertex Deletion (CF-π-VD), and study this problem from the viewpoint of classical
-
Correction to: Special Issue on Approximation and Online Algorithms Theory Comput. Syst. (IF 0.497) Pub Date : 2020-02-28 Leah Epstein, Thomas Erlebach
The original version of the article was inadvertently published with misinterpretations on author’s proof corrections on mathematical expressions.
-
Longest Increasing Subsequence under Persistent Comparison Errors Theory Comput. Syst. (IF 0.497) Pub Date : 2020-02-20 Barbara Geissmann
We study the problem of computing a longest increasing subsequence in a sequence S of n distinct elements in the presence of persistent comparison errors. In this model, Braverman and Mossel (Noisy sorting without resampling, SODA 2008, pages 268–276, 2008) every comparison between two elements can return the wrong result with some fixed (small) probability p, and comparisons cannot be repeated. Computing
-
Approximating Node-Weighted k -MST on Planar Graphs Theory Comput. Syst. (IF 0.497) Pub Date : 2020-02-03 Jarosław Byrka; Mateusz Lewandowski; Joachim Spoerhase
We study the problem of finding a minimum weight connected subgraph spanning at least k vertices on planar, node-weighted graphs. We give a (4 + ε)-approximation algorithm for this problem. We achieve this by utilizing the recent Lagrangian-multiplier preserving (LMP) primal-dual 3-approximation for the node-weighted prize-collecting Steiner tree problem by Byrka et al. (SWAT’16) and adopting an approach
-
Correction to: Connecting Knowledge Compilation Classes and Width Parameters Theory Comput. Syst. (IF 0.497) Pub Date : 2020-01-25 Antoine Amarilli, Florent Capelli, Mikaël Monet, Pierre Senellart
The article title in the original publication contains an error. The correct title is presented in this Erratum. The online version of the original article can be found at: https://doi.org/10.1007/s00224-019-09930-2
-
Dependences in Strategy Logic Theory Comput. Syst. (IF 0.497) Pub Date : 2020-01-08 Patrick Gardy; Patricia Bouyer; Nicolas Markey
Strategy Logic (SL) is a very expressive temporal logic for specifying and verifying properties of multi-agent systems: in SL, one can quantify over strategies, assign them to agents, and express LTL properties of the resulting plays. Such a powerful framework has two drawbacks: first, model checking SL has non-elementary complexity; second, the exact semantics of SL is rather intricate, and may not
-
Deterministic Min-Cost Matching with Delays Theory Comput. Syst. (IF 0.497) Pub Date : 2020-01-06 Yossi Azar; Amit Jacob Fanani
We consider the online Minimum-Cost Perfect Matching with Delays (MPMD) problem introduced by Emek et al. (STOC 2016), in which a general metric space is given, and requests for points in space are submitted in different times in this space by an adversary. The goal is to match requests, while minimizing the sum of distances between matched pairs in addition to the time intervals passed from the moment
-
Countable Sofic Shifts with a Periodic Direction Theory Comput. Syst. (IF 0.497) Pub Date : 2019-12-27 Ilkka Törmä
As a variant of the equal entropy cover problem, we ask whether all multidimensional sofic shifts with countably many configurations have SFT covers with countably many configurations. We answer this question in the negative by presenting explicit counterexamples. We formulate necessary conditions for a vertically periodic shift space to have a countable SFT cover, and prove that they are sufficient
-
Generalized Graph k -Coloring Games Theory Comput. Syst. (IF 0.497) Pub Date : 2019-12-20 Raffaello Carosi; Gianpiero Monaco
We investigate pure Nash equilibria in generalized graphk-coloring games where we are given an edge-weighted undirected graph together with a set of k colors. Nodes represent players and edges capture their mutual interests. The strategy set of each player consists of k colors. The utility of a player v in a given state or coloring is given by the sum of the weights of edges {v, u} incident to v such
-
Periodicity in Data Streams with Wildcards Theory Comput. Syst. (IF 0.497) Pub Date : 2019-12-20 Funda Ergün; Elena Grigorescu; Erfan Sadeqi Azer; Samson Zhou
We investigate the problem of detecting periodic trends within a string S of length n, arriving in the streaming model, containing at most k wildcard characters, where k = o(n). A wildcard character is a special character that can be assigned any other character. We say that S has wildcard-period p if there exists an assignment to each of the wildcard characters so that in the resulting stream the
-
Optimizing Social Welfare for Network Bargaining Games in the Face of Instability, Greed and Idealism Theory Comput. Syst. (IF 0.497) Pub Date : 2019-12-04 T.-H. Hubert Chan; Fei Chen; Li Ning
Stable and balanced outcomes of network bargaining games have been investigated recently, but the existence of such outcomes requires that the linear program relaxation of a certain maximum matching problem have integral optimal solution. We propose an alternative model for network bargaining games in which each edge acts as a player, who proposes how to split the weight of the edge among the two incident
Contents have been reproduced by permission of the publishers.