当前期刊: Theoretical Computer Science Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • On the behavioral implications of differential privacy
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-15
    Gail Gilboa-Freedman; Rann Smorodinsky

    Differential privacy is commonly used in the computer science literature as a mathematical definition of privacy for the purpose of quantifying and bounding privacy loss. It induces a preference order over the set of privacy-jeopardizing mechanisms which, in turn, adhere to some properties of this order. We show that a set of five such properties uniquely captures the ordinal implications of prioritizing

    更新日期:2020-07-15
  • On fan-crossing graphs
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-15
    Franz J. Brandenburg

    A fan is a set of edges with a single common endpoint. A drawing of a graph in the plane is fan-crossing if each edge can only be crossed by edges of a fan. It is fan-planar if, in addition, the common endpoint is on the same side of the crossed edge. A drawing is adjacency-crossing if any two edges are adjacent if they cross the same edge. Then multiple independent crossings are excluded, in which

    更新日期:2020-07-15
  • Almost Envy-Freeness in Group Resource Allocation
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-15
    Maria Kyropoulou; Warut Suksompong; Alexandros A. Voudouris

    We study the problem of fairly allocating indivisible goods between groups of agents using the recently introduced relaxations of envy-freeness. We consider the existence of fair allocations under different assumptions on the valuations of the agents. In particular, our results cover cases of arbitrary monotonic, responsive, and additive valuations, while for the case of binary valuations we fully

    更新日期:2020-07-15
  • Gathering in the Plane of Location-Aware Robots in the Presence of Spies
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-14
    Jurek Czyzowicz; Ryan Killick; Evangelos Kranakis; Danny Krizanc; Oscar Morales-Ponce

    A set of mobile robots (represented as points) is distributed in the Cartesian plane. The collection contains an unknown subset of byzantine robots which are indistinguishable from the reliable ones. The reliable robots need to gather, i.e., arrive to a configuration in which at the same time, all of them occupy the same point on the plane. The robots are equipped with GPS devices and at the beginning

    更新日期:2020-07-14
  • The one-round multi-player discrete Voronoi game on grids and trees
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-10
    Xiaoming Sun; Yuan Sun; Zhiyu Xia; Jialin Zhang

    Basing on the two-player Voronoi game introduced by Ahn et al. [1] and the multi-player diffusion game introduced by Alon et al. [2], we investigate the following one-round multi-player discrete Voronoi game on grids and trees. There are n players playing this game on a graph G=(V,E). Each player chooses an initial vertex from the vertex set of the graph and tries to maximize the size of the nearest

    更新日期:2020-07-10
  • Running time analysis of the (1+1)-EA for robust linear optimization
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-09
    Chao Bian; Chao Qian; Ke Tang; Yang Yu

    Evolutionary algorithms (EAs) have found many successful real-world applications, where the optimization problems are often subject to a wide range of uncertainties. To understand the practical behaviors of EAs theoretically, there are a series of efforts devoted to analyzing the running time of EAs for optimization under uncertainties. Existing studies mainly focus on noisy and dynamic optimization

    更新日期:2020-07-10
  • Mixed fault tolerance in server assignment: Combining reinforcement and backup
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-08
    Tal Navon; David Peleg

    We study the mixed approach to fault tolerance in the general context of server assignment in networks. The approach is based on mixing two different existing strategies, namely, reinforcement and backup. The former strategy protects clients by reinforcing the servers assigned to them and making them fault-resistant, possibly at a high cost, while the latter protects clients by assigning to them alternate

    更新日期:2020-07-08
  • Cops and Robbers on Graphs with a Set of Forbidden Induced Subgraphs
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-07
    Masood Masjoody; Ladislav Stacho

    It is known that the class of all graphs not containing a graph H as an induced subgraph is cop-bounded if and only if H is a forest whose every component is a path [4]. In this paper, we characterize all sets H of graphs with bounded diameter, such that H-free graphs are cop-bounded. This, in particular, gives a characterization of cop-bounded classes of graphs defined by a finite set of connected

    更新日期:2020-07-07
  • Approximation algorithm for (connected) bounded-degree deletion problem on unit disk graphs
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-03
    Pengcheng Liu; Zhao Zhang; Xiaohui Huang

    In this paper, we study the minimum (connected) k-bounded-degree node deletion problem (Min(C)kBDND). For a connected graph G, a constant k and a weight function w:V→R+, a vertex set C⊆V(G) is a kBDND-set if the maximum degree of graph G−C is at most k. If furthermore, the subgraph of G induced by C is connected, then C is a CkBDND-set. The goal of MinWkBDND (resp. MinWCkBDND) is to find a kBDND-set

    更新日期:2020-07-05
  • A local characterization for perfect plane near-triangulations
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-03
    Sameera M. Salam; Jasine Babu; K. Murali Krishnan

    We derive a local criterion for a plane near-triangulated graph to be perfect. It is shown that a plane near-triangulated graph is perfect if and only if it does not contain either a vertex, an edge or a triangle, the neighbourhood of which has an odd hole as its boundary. The characterization leads to an O(n2) algorithm for checking perfectness of plane near-triangulations.

    更新日期:2020-07-03
  • Hardness results for three kinds of colored connections of graphs
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-03
    Zhong Huang; Xueliang Li

    The concept of rainbow connection number of a graph was introduced by Chartrand et al. in 2008. Inspired by this concept, other concepts on colored version of connectivity in graphs were introduced, such as the monochromatic connection number by Caro and Yuster in 2011, the proper connection number by Borozan et al. in 2012, and the conflict-free connection number by Czap et al. in 2018, as well as

    更新日期:2020-07-03
  • Approximation algorithms for spherical k-means problem using local search scheme
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-03
    Dongmei Zhang; Yukun Cheng; Min Li; Yishui Wang; Dachuan Xu

    In the spherical k-means problem (SKMP), which is a well-studied clustering problem in text mining, we are given an n-point set D in d-dimensional unit sphere Sd, and an integer k≤n. The goal is to find a center subset S⊂Sd with |S|≤k that minimizes the sum of cosine dissimilarity measure for each point in D to the nearest center. We prove that any γ-approximation algorithm for the k-means problem

    更新日期:2020-07-03
  • Fully persistent B-trees
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-07-02
    Gerth Stølting Brodal; Spyros Sioutas; Konstantinos Tsakalidis; Kostas Tsichlas

    We present efficient fully persistent B-trees in the I/O model with block size B that support range searches on t reported elements at any accessed version of size n in O(logB⁡n+t/B) I/Os and updates at any accessed version in O(logB⁡n+log2⁡B) amortized I/Os, using O(m/B) disk blocks after m updates. This improves both the query and update I/O-efficiency of the previous fully persistent B-trees of

    更新日期:2020-07-02
  • Hardness and efficiency on minimizing maximum distances in spanning trees
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-29
    Fernanda Couto; Luís Felipe I. Cunha

    The t-admissibility problem aims to decide whether a graph G has a spanning tree T in which the distance between any two adjacent vertices of G is at most t. Regarding its optimization version, the smallest t for which G is t-admissible is the stretch index of G, denoted by σT(G). The problem of deciding whether σT(G)≤t, t≥4 is NP-complete and polynomial-time solvable for t=2. However, deciding if

    更新日期:2020-06-29
  • A note on “Posets having continuous interval”
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-25
    Jarafe Abdala; Fagner Santana

    In this note we present a counterexample for a result in [2], where the concept of continuous interval posets (CI-posets for short) was introduced. A CI-poset is a poset in which every nonempty interval [x,y] is a continuous poset (in the restricted order) and the above mentioned result is about continuous functions spaces [X⟶P], where X is a core compact topological space and P is a CI-poset (with

    更新日期:2020-06-26
  • Who witnesses The Witness? Finding witnesses in The Witness is hard and sometimes impossible
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-25
    Zachary Abel; Jeffrey Bosboom; Michael Coulombe; Erik D. Demaine; Linus Hamilton; Adam Hesterberg; Justin Kopinsky; Jayson Lynch; Mikhail Rudoy; Clemens Thielen

    We analyze the computational complexity of the many types of pencil-and-paper-style puzzles featured in the 2016 puzzle video game The Witness. In all puzzles, the goal is to draw a simple path in a rectangular grid graph from a start vertex to a destination vertex. The different puzzle types place different constraints on the path: preventing some edges from being visited (broken edges); forcing some

    更新日期:2020-06-25
  • Parameterized complexity of happy coloring problems
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-25
    Akanksha Agrawal; N.R. Aravind; Subrahmanyam Kalyanasundaram; Anjeneya Swami Kare; Juho Lauri; Neeldhara Misra; I. Vinod Reddy

    In a vertex-colored graph, an edge is happy if its endpoints have the same color. Similarly, a vertex is happy if all its incident edges are happy. Motivated by the computation of homophily in social networks, we consider the algorithmic aspects of the following Maximum Happy Edges ( k-MHE ) problem: given a partially k-colored graph G and an integer ℓ, find an extended full k-coloring of G making

    更新日期:2020-06-25
  • Dynamic data structures for interval coloring
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-23
    J. Girish Raguvir; Manas Jyoti Kashyop; N.S. Narayanaswamy

    We consider the dynamic graph coloring problem restricted to the class of interval graphs in the incremental and fully dynamic setting. The input consists of a sequence of intervals that are to be either colored, or deleted, if previously colored. For the incremental setting, we consider the well studied optimal online algorithm (KT-algorithm) for interval coloring due to Kierstead and Trotter [1]

    更新日期:2020-06-23
  • Randomized approximation scheme for Steiner Multi Cycle in the Euclidean plane
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-22
    Carla N. Lintzmayer; Flávio K. Miyazawa; Phablo F.S. Moura; Eduardo C. Xavier

    We propose a randomized approximation scheme for the Euclidean Steiner Multi Cycle problem which runs in quasilinear time. In this problem, we are given a set of n pairs of points (terminals) T={{ti,ti′}}i=1n in the Euclidean plane, and the objective is to find a collection of cycles of minimum cost such that ti and ti′ belong to a same cycle, for each i∈{1,…,n}. This problem extends the Steiner Cycle

    更新日期:2020-06-23
  • Scheduling jobs with sizes and delivery times on identical parallel batch machines
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-22
    Yijie Li; Shuguang Li

    We consider the problem of scheduling jobs with sizes, release times and delivery times on identical parallel batch machines. All machines have the same capacity. Each machine can simultaneously process several jobs as a batch as long as the total size of these jobs does not exceed the capacity. The release time, processing time and delivery time of a batch are defined to be the latest release time

    更新日期:2020-06-23
  • Dynamical Behavior of Additive Cellular Automata over Finite Abelian Groups
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-20
    Alberto Dennunzio; Enrico Formenti; Darij Grinberg; Luciano Margara

    We study the dynamical behavior of additive D-dimensional (D≥1) cellular automata where the alphabet is any finite abelian group. This class of discrete time dynamical systems is a generalization of the systems extensively studied by many authors among which one may list [38], [44], [41]. Among our major contributions, there is the proof that topologically transitive additive D-dimensional cellular

    更新日期:2020-06-23
  • On the emergence of regularities on one-dimensional decreasing sandpiles
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-19
    Kévin Perrot; Éric Rémila

    Decreasing sandpiles model the dynamics of configurations where each position i∈N contains a finite number of stacked grains hi, such that hi≥hi+1 (decrease property). Grains move according to a decreasing local rule R=(r1,r2,…,rp) such that rj≥rj+1, meaning that rj grains move from columns i to i+j for all 1≤j≤p, if it does not contradict the decrease property. We are interested in the fixed point

    更新日期:2020-06-19
  • A Post-quantum Hybrid Encryption based on QC-LDPC codes in the Multi-User Setting
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-18
    Luping Wang; Jie Chen; Kai Zhang; Haifeng Qian

    The encryption schemes based on coding theory are one of the most accredited choices in post-quantum scenario, where QC-LDPC codes are usually employed to construct concrete schemes due to the well security and good efficiency. In this work, we introduce a new IND-CCA secure multi-instance framework for code-based hybrid encryption primitive in the random oracle model, which is derived from our new

    更新日期:2020-06-18
  • Expansive automata networks
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-18
    Florian Bridoux; Maximilien Gadouleau; Guillaume Theyssier

    An Automata Network is a map f:Qn→Qn where Q is a finite alphabet. It can be viewed as a network of n entities, each holding a state from Q, and evolving according to a deterministic synchronous update rule in such a way that each entity only depends on its neighbors in the network's graph, called interaction graph. In this work we introduce the following property called expansivity: the observation

    更新日期:2020-06-18
  • Hardness of Minimum Barrier Shrinkage and Minimum Installation Path
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-18
    Sergio Cabello; Éric Colin de Verdière

    In the Minimum Installation Path problem, we are given a graph G with edge weights w(⋅) and two vertices s,t of G. We want to assign a non-negative power p:V→R≥0 to the vertices of G, so that the activated edges {uv∈E(G)|p(u)+p(v)≥w(uv)} contain some s-t-path, and minimize the sum of assigned powers. In the Minimum Barrier Shrinkage problem, we are given, in the plane, a family of disks and two points

    更新日期:2020-06-18
  • The component (edge) connectivity of shuffle-cubes
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-18
    Tongtong Ding; Pingshan Li; Min Xu

    Component (edge) connectivity is a generalization of traditional (edge) connectivity. Let F be a vertex set (resp., an edge set), if G−F has at least g components, F is a g-component (edge) cut. The g-component (edge) connectivity of graph G is the minimum size of the g-component (edge) cut. In this paper, we study the g-component (edge) connectivity of shuffle-cubes for small g.

    更新日期:2020-06-18
  • Connectivity and super connectivity of the divide-and-swap cube
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-18
    Wantao Ning

    The divide-and-swap cube network is a new hypercube variant network proposed recently. Compared to hypercube, it keeps the same number of vertices and the same asymptotic performances for fundamental algorithms while reducing the network cost. Connectivity and super connectivity are important indices to measure the reliability of networks. In this work, we get the connectivity and super connectivity

    更新日期:2020-06-18
  • On Compatible Triangulations with a Minimum Number of Steiner Points
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-18
    Anna Lubiw; Debajyoti Mondal

    Two vertex-labelled polygons are compatible if they have the same clockwise cyclic ordering of vertices. The definition extends to polygonal regions (polygons with holes) and to triangulations—for every face, the clockwise cyclic order of vertices on the boundary must be the same. It is known that every pair of compatible n-vertex polygonal regions can be extended to compatible triangulations by adding

    更新日期:2020-06-18
  • Generalized abstraction-refinement for game-based CTL lifted model checking
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-17
    Aleksandar S. Dimovski; Axel Legay; Andrzej Wasowski

    System families (Software Product Lines) are becoming omnipresent in application areas ranging from embedded system domains to system-level software and communication protocols. Software Product Line methods and architectures allow effective building many custom variants of a software system in these domains. In many of the applications, their rigorous verification and quality assurance are of paramount

    更新日期:2020-06-17
  • Online Graph Exploration on a Restricted Graph Class: Optimal Solutions for Tadpole Graphs
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-16
    Sebastian Brandt; Klaus-Tycho Foerster; Jonathan Maurer; Roger Wattenhofer

    We study the problem of online graph exploration on undirected graphs, where a searcher has to visit every vertex and return to the origin. Once a new vertex is visited, the searcher learns of all neighboring vertices and the connecting edge weights. The goal of such an exploration is to minimize its total cost, where each edge traversal incurs a cost of the corresponding edge weight. We investigate

    更新日期:2020-06-16
  • Causality Analysis and Fault Ascription in Component-Based Systems
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-15
    Gregor Gössler; Jean-Bernard Stefani

    This article introduces a general framework for fault ascription, which consists in identifying, within a multi-component system, the components whose faulty behavior has caused the failure of said system. Our framework uses configuration structures as a general semantical model to handle truly concurrent executions, partial and distributed observations in a uniform way. As a first contribution, and

    更新日期:2020-06-15
  • Delivery Route Optimization with automated vehicle in smart urban environment
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-10
    Chuanwen Luo; Deying Li; Xingjian Ding; Weili Wu

    As a part of the smart urban construction, automated driving is introduced to improve the utilization efficiency of cars and roads, which not only reduces the incidence of traffic accidents, but also improves the environment quality. With the development of the smart urban, it is predictable that, in the city of the future, the service of package pickup and delivery or takeout will be supported mainly

    更新日期:2020-06-10
  • Fault tolerance of hypercube like networks: Spanning laceability under edge faults
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-09
    Min Xu; Kshirasagar Naik; Krishnaiyan Thulasiraman

    Given two vertices u and v in a connected undirected graph G, a w⁎-container C(u,v) is a set of w internally vertex disjoint paths between u and v spanning all the vertices in G. A bipartite graph G is w⁎-laceable if there exists a w⁎-container between any two vertices belonging to different partitions of G. In [8], [33] a class Bn′ of bipartite graphs called hypercube-like bipartite netwroks was defined

    更新日期:2020-06-09
  • Algorithms for visualizing phylogenetic networks
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-09
    Ioannis G. Tollis; Konstantinos G. Kakoulis

    We study the problem of visualizing phylogenetic networks, which are extensions of the Tree of Life in biology. We use a space filling visualization method, called DAGmaps, in order to obtain clear visualizations using limited space. In this paper, we first show that the general problem of drawing galled networks as DAGmaps is NP-complete. Next, we restrict our attention to galled trees and planar

    更新日期:2020-06-09
  • A note of vertex arboricity of planar graphs without 4-cycles intersecting with 6-cycles
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-08
    Xuyang Cui; Wenshun Teng; Xing Liu; Huijuan Wang

    The vertex arboricity va(G) of G is the smallest integer k which the acyclic partition of V(G) make the vertex set V(G) be partitioned into k subsets which each subset induces an acyclic graph. In this paper, we mainly study vertex arboricity of planar graphs, and we prove that if there is without 4-cycles intersecting with 6-cycles, then va(G)⩽2.

    更新日期:2020-06-08
  • Reprint of: Generalized Lyndon factorizations of infinite words
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-06
    Amanda Burcroff; Eric Winsor

    A generalized lexicographic order on words is a lexicographic order where the total order of the (possibly infinite) alphabet depends on the position of the comparison. A generalized Lyndon word is a finite word which is strictly smallest among its class of rotations with respect to a generalized lexicographic order. This notion can be extended to infinite words: an infinite generalized Lyndon word

    更新日期:2020-06-06
  • Target Users' Activation Probability Maximization with Different Seed Set Constraints in Social Networks
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-05
    Ruidong Yan; Hongwei Du; Yi Li; Wenping Chen; Yongcai Wang; Yuqing Zhu; Deying Li

    Influence Maximization (IM) over the online social networks have been widely explored in recent years, which selects a seed set from nodes in the network using a limited budget such that the expected number of nodes influenced by the seed set is maximized. However, how to activate a considered set of targeting users T, e.g., selling a product to a specific target group, is a more practical problem

    更新日期:2020-06-05
  • Tree path majority data structures
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-05
    Travis Gagie; Meng He; Gonzalo Navarro; Carlos Ochoa

    We present the first solution to finding τ-majorities on tree paths. Given a tree of n nodes, each with a label from [1..σ], and a fixed threshold 0<τ<1, such a query gives two nodes u and v and asks for all the labels that appear more than τ⋅|Puv| times in the path Puv from u to v, where |Puv| denotes the number of nodes in Puv. Note that the answer to any query is of size up to 1/τ. On a w-bit RAM

    更新日期:2020-06-05
  • A tight lower bound for the capture time of the Cops and Robbers game
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-05
    Sebastian Brandt; Yuval Emek; Jara Uitto; Roger Wattenhofer

    For the game of Cops and Robbers, it is known that in 1-cop-win graphs, the cop can capture the robber in O(n) time, and that there exist graphs in which this capture time is tight. When k≥2, a simple counting argument shows that in k-cop-win graphs, the capture time is at most O(nk+1), however, no non-trivial lower bounds were previously known; indeed, in their 2011 book, Bonato and Nowakowski ask

    更新日期:2020-06-05
  • Maximize a monotone function with a generic submodularity ratio
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-04
    Suning Gong; Qingqin Nong; Tao Sun; Qizhi Fang; Dingzhu Du; Xiaoyu Shao

    Generic submodularity ratio γ is a general measurement to characterize how close a nonnegative monotone set function is to be submodular. In this paper, we make a systematic analysis of greedy algorithms for maximizing a monotone and normalized set function with a generic submodularity ratio γ under Cardinality constraints, Knapsack constraints, Matroid constraints and K-intersection constraints.

    更新日期:2020-06-04
  • Lower Bounds for the Happy Coloring Problems
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-04
    Ivan Bliznets; Danil Sagunov

    In this paper, we study the Maximum Happy Vertices and the Maximum Happy Edges problems (MHV and MHE for short). Very recently, the problems attracted a lot of attention and were studied in Agrawal '18, Aravind et al. '16, Choudhari and Reddy '18, Misra and Reddy '18. Main focus of our work is lower bounds on the computational complexity of these problems. Established lower bounds can be divided into

    更新日期:2020-06-04
  • Reprint of: Palindromization and construction of Markoff triples
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-04
    Antoine Abram; Mélodie Lapointe; Christophe Reutenauer

    The Markoff equation is the Diophantine equation x2+y2+z2=3xyz. A solution is called a Markoff triple. We give a bijection between the free monoid on two letters and the set of Markoff triples, using the palindromization map of Aldo de Luca. In our construction, special Christoffel words appear, whose lengths are Markoff numbers; we study their standard and palindromic factorizations, and show that

    更新日期:2020-06-04
  • Polynomial algorithm for equivalence problem of deterministic multitape finite automata
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-04
    Hayk A. Grigoryan; Samvel K. Shoukourian

    An efficient algorithm for determining the equivalence of two deterministic multitape finite automata is suggested. It is based on an already published proof of solvibility for this problem. It is shown that the suggested algorithm has polynomial complexity. The asymptotic running time of the algorithm is bounded by k⁎sn+1, where k is some constant, n is the number of tapes and s is the sum of the

    更新日期:2020-06-04
  • Edge degeneracy: Algorithmic and structural results
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-04
    Stratis Limnios; Christophe Paul; Joanny Perret; Dimitrios M. Thilikos

    We consider a cops and robber game where the cops are blocking edges of a graph, while the robber occupies its vertices. At each round of the game, the cops choose some set of edges to block and right after the robber is obliged to move to another vertex traversing at most s unblocked edges (s can be seen as the speed of the robber). Both parts have complete knowledge of the opponent's moves and the

    更新日期:2020-06-04
  • On 1-factorizations of bipartite Kneser graphs
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-04
    Kai Jin

    It is a challenging open problem to construct an explicit 1-factorization of the bipartite Kneser graph H(v,t), which contains as vertices all t-element and (v−t)-element subsets of [v]:={1,…,v} (where v>2t) and an edge between any two vertices when one is a subset of the other. In this paper, for the special case where t=2 and v is an odd prime power, we construct such 1-factorizations using perpendicular

    更新日期:2020-06-04
  • Minimum-width double-strip and parallelogram annulus
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-03
    Sang Won Bae

    In this paper, we study the problem of computing a minimum-width double-strip or parallelogram annulus that encloses a given set of n points in the plane. A double-strip is a closed region in the plane whose boundary consists of four parallel lines and a parallelogram annulus is a closed region between two edge-parallel parallelograms. We present several first algorithms for these problems. Among them

    更新日期:2020-06-03
  • Quadratic vertex kernel for split vertex deletion
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-03
    Akanksha Agrawal; Sushmita Gupta; Pallavi Jain; R. Krithika

    A graph is called a split graph if its vertex set can be partitioned into a clique and an independent set. Split graphs have rich mathematical structure and interesting algorithmic properties making it one of the most well-studied special graph classes. In the Split Vertex Deletion problem, given a graph and a positive integer k, the objective is to test whether there exists a subset of at most k vertices

    更新日期:2020-06-03
  • Sensitivity, affine transforms and quantum communication complexity
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-03
    Krishnamoorthy Dinesh; Jayalal Sarma

    In this paper, we study the Boolean function parameters sensitivity (s), block sensitivity (bs), and alternation (alt) under specially designed affine transforms and show several applications. For a function f:F2n→{−1,1}, and A=Mx+b for M∈F2n×n and b∈F2n, the result of the transformation g is defined as ∀x∈F2n,g(x)=f(Mx+b). As a warm up, we study alternation under linear shifts (when M is restricted

    更新日期:2020-06-03
  • An infinite class of unsaturated rooted trees corresponding to designable RNA secondary structures
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-02
    Jonathan Jedwab; Tara Petrie; Samuel Simon

    An RNA secondary structure is designable if there is an RNA sequence which can attain its maximum number of base pairs only by adopting that structure. The combinatorial RNA design problem, introduced by Haleš et al. in 2016, is to determine whether or not a given RNA secondary structure is designable. Haleš et al. identified certain classes of designable and non-designable secondary structures by

    更新日期:2020-06-02
  • Approximation algorithm for minimum weight connected-k-subgraph cover
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-02
    Pengcheng Liu; Zhao Zhang; Xiaohui Huang

    For a given graph G, the minimum weight connected-k-subgraph cover problem (MinWCkSC) is to find a minimum weight vertex subset C of G such that each connected subgraph of G on k vertices contains at least one vertex of C. Previously, Zhang et al. [39] presented a (k−1)-approximation algorithm for MinWCkSC under the assumption that the girth of G, which is the length of a shortest cycle of G, is at

    更新日期:2020-06-02
  • Cooperating in Video Games? Impossible! Undecidability of Team Multiplayer Games
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-01
    Michael J. Coulombe; Jayson Lynch

    We show the undecidability of whether a team has a forced win in a number of well known video games including: Team Fortress 2, Super Smash Brothers: Brawl, and Mario Kart. To do so, we give a simplification of the Team Computation Game from Hearn and Demaine's “Games, Puzzles, and Computation” [7], and use that to give an undecidable abstract game on graphs. This graph game framework better captures

    更新日期:2020-06-01
  • MpUFLP: Universal facility location problem in the p-th power of metric space
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-01
    Yicheng Xu; Dachuan Xu; Yong Zhang; Juan Zou

    We propose and study the MpUFLP (universal facility location problem in the p-th power of metric space) in this paper, where the universal facility location problem (UFLP) extends several classical facility location problems like the uncapacitated facility location, hard-capacitated facility location, soft-capacitated facility location, incremental-cost facility location, concave-cost facility location

    更新日期:2020-06-01
  • Diameter of colorings under Kempe changes
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-06-01
    Marthe Bonamy; Marc Heinrich; Takehiro Ito; Yusuke Kobayashi; Haruka Mizuta; Moritz Mühlenthaler; Akira Suzuki; Kunihiro Wasa

    Given a k-coloring of a graph G, a Kempe-change for two colors a and b produces another k-coloring of G, as follows: first choose a connected component in the subgraph of G induced by the two color classes of a and b, and then swap the colors a and b in the component. Two k-colorings are called Kempe-equivalent if one can be transformed into the other by a sequence of Kempe-changes. We consider two

    更新日期:2020-06-01
  • A code-based signature scheme from the Lyubashevsky framework
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-05-30
    Yongcheng Song; Xinyi Huang; Yi Mu; Wei Wu; Huaxiong Wang

    We propose a new method to construct code-based signature scheme following the Lyubashevsky's lattice-based framework. Our technique ensures that the Hamming weight of each row of the private key matrix is below the GV bound instead of fixed weight. Our scheme can generate signatures whose maximum Hamming weight is below the GV bound of random linear codes with the public key matrix as parity-check

    更新日期:2020-05-30
  • Improved lower bounds for the radio number of trees
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-05-29
    Daphne Der-Fen Liu; Laxman Saha; Satyabrata Das

    Let G be a graph with diameter d. A radio labelling of G is a function f that assigns to each vertex with a non-negative integer such that the following holds for all vertices u,v: |f(u)−f(v)|⩾d+1−d(u,v), where d(u,v) is the distance between u and v. The span of f is the absolute difference of the largest and smallest values in f(V). The radio number of G is the minimum span of a radio labelling admitted

    更新日期:2020-05-29
  • The Sparsest Additive Spanner via Multiple Weighted BFS Trees
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-05-28
    Keren Censor-Hillel; Ami Paz; Noam Ravid

    Spanners are fundamental graph structures that sparsify graphs at the cost of small stretch. In particular, in recent years, many sequential algorithms constructing additive all-pairs spanners were designed, providing very sparse small-stretch subgraphs. Remarkably, it was then shown that the known (+6)-spanner constructions are essentially the sparsest possible, that is, larger additive stretch cannot

    更新日期:2020-05-28
  • A game theoretic approach for minimal connected dominating set
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-05-28
    Xiuyang Chen; Zhao Zhang

    Connected dominating set (CDS) is a subset of vertices in a graph which dominates all vertices and induces a connected subgraph. This paper proposes a game theoretic approach to find a CDS, and proves that starting from a non-trivial initial state, every non-trivial Nash equilibrium is a minimal CDS and reaching a non-trivial Nash equilibrium needs O(n) rounds in the worst case.

    更新日期:2020-05-28
  • On the Exact Complexity of Polyomino Packing
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-05-28
    Hans L. Bodlaender; Tom C. van der Zanden

    We show that the problem of deciding whether a collection of polyominoes, each fitting in a 2×O(log⁡n) rectangle, can be packed into a 3×n box does not admit a 2o(n/log⁡n)-time algorithm, unless the Exponential Time Hypothesis fails. We also give an algorithm that attains this lower bound, solving any instance of polyomino packing with total area n in 2O(n/log⁡n) time. This establishes a tight bound

    更新日期:2020-05-28
  • Expressiveness of concurrent intensionality
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-05-26
    Ioana Cristescu; Thomas Given-Wilson; Axel Legay

    The expressiveness of communication primitives has been explored in a common framework based on the π-calculus by considering four features: synchronism (asynchronous vs synchronous), arity (monadic vs polyadic data), communication medium (shared dataspaces vs channel-based), and pattern-matching (binding to a name vs testing name equality). Here pattern-matching is generalised to account for terms

    更新日期:2020-05-26
  • Efficient card-based zero-knowledge proof for sudoku
    Theor. Comput. Sci. (IF 0.747) Pub Date : 2020-05-26
    Tatsuya Sasaki; Daiki Miyahara; Takaaki Mizuki; Hideaki Sone

    In 2009, Gradwohl, Naor, Pinkas, and Rothblum proposed physical zero-knowledge proof protocols for Sudoku. That is, for a puzzle instance of Sudoku, their excellent protocols allow a prover to convince a verifier that there is a solution to the Sudoku puzzle and the prover knows it, without revealing any information about the solution. The possible drawback is that the existing protocols have an extractability

    更新日期:2020-05-26
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
产业、创新与基础设施
AI核心技术
10years
自然科研线上培训服务
材料学研究精选
Springer Nature Live 产业与创新线上学术论坛
胸腔和胸部成像专题
自然科研论文编辑服务
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
杨超勇
周一歌
华东师范大学
段炼
清华大学
廖矿标
李远
跟Nature、Science文章学绘图
隐藏1h前已浏览文章
中洪博元
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
x-mol收录
福州大学
南京大学
王杰
丘龙斌
电子显微学
何凤
洛杉矶分校
吴杰
赵延川
试剂库存
天合科研
down
wechat
bug