样式: 排序: IF: - GO 导出 标记为已读
-
BAT-LZ Out of Hell arXiv.cs.DS Pub Date : 2024-03-14 Zsuzsanna Lipták, Francesco Masillo, Gonzalo Navarro
Despite consistently yielding the best compression on repetitive text collections, the Lempel-Ziv parsing has resisted all attempts at offering relevant guarantees on the cost to access an arbitrary symbol. This makes it less attractive for use on compressed self-indexes and other compressed data structures. In this paper we introduce a variant we call BAT-LZ (for Bounded Access Time Lempel-Ziv) where
-
Lifted Causal Inference in Relational Domains arXiv.cs.DS Pub Date : 2024-03-15 Malte Luttermann, Mattis Hartwig, Tanya Braun, Ralf Möller, Marcel Gehrke
Lifted inference exploits symmetries in probabilistic graphical models by using a representative for indistinguishable objects, thereby speeding up query answering while maintaining exact answers. Even though lifting is a well-established technique for the task of probabilistic inference in relational domains, it has not yet been applied to the task of causal inference. In this paper, we show how lifting
-
Efficient Detection of Exchangeable Factors in Factor Graphs arXiv.cs.DS Pub Date : 2024-03-15 Malte Luttermann, Johann Machemer, Marcel Gehrke
To allow for tractable probabilistic inference with respect to domain sizes, lifted probabilistic inference exploits symmetries in probabilistic graphical models. However, checking whether two factors encode equivalent semantics and hence are exchangeable is computationally expensive. In this paper, we efficiently solve the problem of detecting exchangeable factors in a factor graph. In particular
-
Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy arXiv.cs.DS Pub Date : 2024-03-15 Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi
Differentially private mechanisms achieving worst-case optimal error bounds (e.g., the classical Laplace mechanism) are well-studied in the literature. However, when typical data are far from the worst case, \emph{instance-specific} error bounds -- which depend on the largest value in the dataset -- are more meaningful. For example, consider the sum estimation problem, where each user has an integer
-
Efficient size-prescribed $k$-core search arXiv.cs.DS Pub Date : 2024-03-14 Yiping Liu, Bo Yan, Bo Zhao, Hongyi Su, Yang Chen, Michael Witbrock
$k$-core is a subgraph where every node has at least $k$ neighbors within the subgraph. The $k$-core subgraphs has been employed in large platforms like Network Repository to comprehend the underlying structures and dynamics of the network. Existing studies have primarily focused on finding $k$-core groups without considering their size, despite the relevance of solution sizes in many real-world scenarios
-
Approximating Small Sparse Cuts arXiv.cs.DS Pub Date : 2024-03-13 Aditya Anand, Euiwoong Lee, Jason Li, Thatchaphol Saranurak
We study polynomial-time approximation algorithms for (edge/vertex) Sparsest Cut and Small Set Expansion in terms of $k$, the number of edges or vertices cut in the optimal solution. Our main results are $\mathcal{O}(\text{polylog}\, k)$-approximation algorithms for various versions in this setting. Our techniques involve an extension of the notion of sample sets (Feige and Mahdian STOC'06), originally
-
Worst-Case to Expander-Case Reductions: Derandomized and Generalized arXiv.cs.DS Pub Date : 2024-03-13 Amir Abboud, Nathan Wallheimer
A recent paper by Abboud and Wallheimer [ITCS 2023] presents self-reductions for various fundamental graph problems, that transform worst-case instances to expanders, thus proving that the complexity remains unchanged if the input is assumed to be an expander. An interesting corollary of their self-reductions is that, if some problem admit such reduction, then the popular algorithmic paradigm based
-
Height-bounded Lempel-Ziv encodings arXiv.cs.DS Pub Date : 2024-03-13 Hideo Bannai, Mitsuru Funakoshi, Diptarama Hendrian, Myuji Matsuda, Simon J. Puglisi
We introduce height-bounded LZ encodings (LZHB), a new family of compressed representations that is a variant of Lempel-Ziv parsings with a focus on allowing fast access to arbitrary positions of the text directly via the compressed representation. Any LZHB encoding whose referencing height is bounded by $h$ allows access to an arbitrary position of the underlying text using $O(h)$ predecessor queries
-
Highway Preferential Attachment Models for Geographic Routing arXiv.cs.DS Pub Date : 2024-03-12 Ofek GilaUniversity of California, Irvine, Evrim OzelUniversity of California, Irvine, Michael T. GoodrichUniversity of California, Irvine
In the 1960s, the world-renowned social psychologist Stanley Milgram conducted experiments that showed that not only do there exist ``short chains'' of acquaintances between any two arbitrary people, but that these arbitrary strangers are able to find these short chains. This phenomenon, known as the \emph{small-world phenomenon}, is explained in part by any model that has a low diameter, such as the
-
Simplified Tight Bounds for Monotone Minimal Perfect Hashing arXiv.cs.DS Pub Date : 2024-03-12 Dmitry Kosolobov
Given an increasing sequence of integers $x_1,\ldots,x_n$ from a universe $\{0,\ldots,u-1\}$, the monotone minimal perfect hash function (MMPHF) for this sequence is a data structure that answers the following rank queries: $rank(x) = i$ if $x = x_i$, for $i\in \{1,\ldots,n\}$, and $rank(x)$ is arbitrary otherwise. Assadi, Farach-Colton, and Kuszmaul recently presented at SODA'23 a proof of the lower
-
Shining Light on Periodic Dominating Sets in Bounded-Treewidth Graphs arXiv.cs.DS Pub Date : 2024-03-12 Jakob Greilhuber, Philipp Schepper, Philip Wellnitz
For the vertex selection problem $(\sigma,\rho)$-DomSet one is given two fixed sets $\sigma$ and $\rho$ of integers and the task is to decide whether we can select vertices of the input graph, such that, for every selected vertex, the number of selected neighbors is in $\sigma$ and, for every unselected vertex, the number of selected neighbors is in $\rho$. This framework covers Independent Set and
-
Satisfiability to Coverage in Presence of Fairness, Matroid, and Global Constraints arXiv.cs.DS Pub Date : 2024-03-12 Tanmay Inamdar, Pallavi Jain, Daniel Lokshtanov, Abhishek Sahu, Saket Saurabh, Anannya Upasana
In MaxSAT with Cardinality Constraint problem (CC-MaxSAT), we are given a CNF-formula $\Phi$, and $k \ge 0$, and the goal is to find an assignment $\beta$ with at most $k$ variables set to true (also called a weight $k$-assignment) such that the number of clauses satisfied by $\beta$ is maximized. MaxCov can be seen as a special case of CC-MaxSAT, where the formula $\Phi$ is monotone, i.e., does not
-
Noisy Computing of the Threshold Function arXiv.cs.DS Pub Date : 2024-03-12 Ziao Wang, Nadim Ghaddar, Banghua Zhu, Lele Wang
Let $\mathsf{TH}_k$ denote the $k$-out-of-$n$ threshold function: given $n$ input Boolean variables, the output is $1$ if and only if at least $k$ of the inputs are $1$. We consider the problem of computing the $\mathsf{TH}_k$ function using noisy readings of the Boolean variables, where each reading is incorrect with some fixed and known probability $p \in (0,1/2)$. As our main result, we show that
-
Controlling Delegations in Liquid Democracy arXiv.cs.DS Pub Date : 2024-03-12 Shiri Alouf-Heffetz, Tanmay Inamdar, Pallavi Jain, Yash More, Nimrod Talmon
In liquid democracy, agents can either vote directly or delegate their vote to a different agent of their choice. This results in a power structure in which certain agents possess more voting weight than others. As a result, it opens up certain possibilities of vote manipulation, including control and bribery, that do not exist in standard voting scenarios of direct democracy. Here we formalize a certain
-
The Primal Pathwidth SETH arXiv.cs.DS Pub Date : 2024-03-12 Michael Lampis
Motivated by the importance of dynamic programming (DP) in parameterized complexity, we consider several fine-grained questions, such as the following examples: (i) can Dominating Set be solved in time $(3-\epsilon)^{pw}n^{O(1)}$? (where $pw$ is the pathwidth) (ii) can Coloring be solved in time $pw^{(1-\epsilon)pw}n^{O(1)}$? (iii) can a short reconfiguration between two size-$k$ independent sets be
-
Balanced Substructures in Bicolored Graphs arXiv.cs.DS Pub Date : 2024-03-11 P. S. Ardra, R. Krithika, Saket Saurabh, Roohani Sharma
An edge-colored graph is said to be balanced if it has an equal number of edges of each color. Given a graph $G$ whose edges are colored using two colors and a positive integer $k$, the objective in the Edge Balanced Connected Subgraph problem is to determine if $G$ has a balanced connected subgraph containing at least $k$ edges. We first show that this problem is NP-complete and remains so even if
-
Fun Maximizing Search, (Non) Instance Optimality, and Video Games for Parrots arXiv.cs.DS Pub Date : 2024-03-11 Jérémy Barbay
Computerized Adaptive Testing (CAT) measures an examinee's ability while adapting to their level. Both too many questions and too many hard questions can make a test frustrating. Are there some CAT algorithms which can be proven to be theoretically better than others, and in which framework? We show that slightly extending the traditional framework yields a partial order on CAT algorithms. For uni-dimensional
-
Improved FPT Approximation Scheme and Approximate Kernel for Biclique-Free Max k-Weight SAT: Greedy Strikes Back arXiv.cs.DS Pub Date : 2024-03-10 Pasin Manurangsi
In the Max $k$-Weight SAT (aka Max SAT with Cardinality Constraint) problem, we are given a CNF formula with $n$ variables and $m$ clauses together with a positive integer $k$. The goal is to find an assignment where at most $k$ variables are set to one that satisfies as many constraints as possible. Recently, Jain et al. [SODA'23] gave an FPT approximation scheme (FPT-AS) with running time $2^{O\
-
Revisiting Path Contraction and Cycle Contraction arXiv.cs.DS Pub Date : 2024-03-10 R. Krithika, V. K. Kutty Malu, Prafullkumar Tale
The Path Contraction and Cycle Contraction problems take as input an undirected graph $G$ with $n$ vertices, $m$ edges and an integer $k$ and determine whether one can obtain a path or a cycle, respectively, by performing at most $k$ edge contractions in $G$. We revisit these NP-complete problems and prove the following results. Path Contraction admits an algorithm running in $\mathcal{O}^*(2^{k})$
-
Approximate Bipartite $b$-Matching using Multiplicative Auction arXiv.cs.DS Pub Date : 2024-03-09 Bhargav Samineni, S M Ferdous, Mahantesh Halappanavar, Bala Krishnamoorthy
Given a bipartite graph $G(V= (A \cup B),E)$ with $n$ vertices and $m$ edges and a function $b \colon V \to \mathbb{Z}_+$, a $b$-matching is a subset of edges such that every vertex $v \in V$ is incident to at most $b(v)$ edges in the subset. When we are also given edge weights, the Max Weight $b$-Matching problem is to find a $b$-matching of maximum weight, which is a fundamental combinatorial optimization
-
Scalable $k$-clique Densest Subgraph Search arXiv.cs.DS Pub Date : 2024-03-09 Xiaowei Ye, Miao Qiao, Rong-Hua Li, Qi Zhang, Guoren Wang
In this paper, we present a collection of novel and scalable algorithms designed to tackle the challenges inherent in the $k$-clique densest subgraph problem (\kcdsp) within network analysis. We propose \psctl, a novel algorithm based on the Frank-Wolfe approach for addressing \kcdsp, effectively solving a distinct convex programming problem. \textcolor{black}{\psctl is able to approximate \kcdsp with
-
An Algorithm for Correct Computation of Reeb Spaces for PL Bivariate Fields arXiv.cs.DS Pub Date : 2024-03-11 Amit Chattopadhyay, Yashwanth Ramamurthi, Osamu Saeki
The Reeb space is a topological structure which is a generalization of the notion of the Reeb graph to multi-fields. Its effectiveness has been established in revealing topological features in data across diverse computational domains which cannot be identified using the Reeb graph or other scalar-topology-based methods. Approximations of Reeb spaces such as the Mapper and the Joint Contour Net have
-
Dynamic Convex Hulls for Simple Paths arXiv.cs.DS Pub Date : 2024-03-08 Bruce Brewer, Gerth Stølting Brodal, Haitao Wang
We consider the planar dynamic convex hull problem. In the literature, solutions exist supporting the insertion and deletion of points in poly-logarithmic time and various queries on the convex hull of the current set of points in logarithmic time. If arbitrary insertion and deletion of points are allowed, constant time updates and fast queries are known to be impossible. This paper considers two restricted
-
Efficient Algorithms for Personalized PageRank Computation: A Survey arXiv.cs.DS Pub Date : 2024-03-08 Mingji Yang, Hanzhi Wang, Zhewei Wei, Sibo Wang, Ji-Rong Wen
Personalized PageRank (PPR) is a traditional measure for node proximity on large graphs. For a pair of nodes $s$ and $t$, the PPR value $\pi_s(t)$ equals the probability that an $\alpha$-discounted random walk from $s$ terminates at $t$ and reflects the importance between $s$ and $t$ in a bidirectional way. As a generalization of Google's celebrated PageRank centrality, PPR has been extensively studied
-
Single Family Algebra Operation on ZDDs Leads To Exponential Blow-Up arXiv.cs.DS Pub Date : 2024-03-08 Kengo Nakamura, Masaaki Nishino, Shuhei Denzumi
Zero-suppressed binary decision diagram (ZDD) is a data structure to represent a family of (sub)sets compactly, and it can be used as a succinct index for a family of sets. To build ZDD representing a desired family of sets, there are many transformation operations that take ZDDs as inputs and output ZDD representing the resultant family after performing operations such as set union and intersection
-
Data-Dependent LSH for the Earth Mover's Distance arXiv.cs.DS Pub Date : 2024-03-08 Rajesh Jayaram, Erik Waingarten, Tian Zhang
We give new data-dependent locality sensitive hashing schemes (LSH) for the Earth Mover's Distance ($\mathsf{EMD}$), and as a result, improve the best approximation for nearest neighbor search under $\mathsf{EMD}$ by a quadratic factor. Here, the metric $\mathsf{EMD}_s(\mathbb{R}^d,\ell_p)$ consists of sets of $s$ vectors in $\mathbb{R}^d$, and for any two sets $x,y$ of $s$ vectors the distance $\mathsf{EMD}(x
-
A basic lower bound for property testing arXiv.cs.DS Pub Date : 2024-03-08 Eldar Fischer
An $\epsilon$-test for any non-trivial property (one for which there are both satisfying inputs and inputs of large distance from the property) should use a number of queries that is at least inversely proportional in $\epsilon$. However, to the best of our knowledge there is no reference proof for this intuition. Such a proof is provided here. It is written so as to not require any prior knowledge
-
NP-Completeness for the Space-Optimality of Double-Array Tries arXiv.cs.DS Pub Date : 2024-03-07 Hideo Bannai, Keisuke Goto, Shunsuke Kanda, Dominik Köppl
Indexing a set of strings for prefix search or membership queries is a fundamental task with many applications such as information retrieval or database systems. A classic abstract data type for modelling such an index is a trie. Due to the fundamental nature of this problem, it has sparked much interest, leading to a variety of trie implementations with different characteristics. A trie implementation
-
Improved Lower Bound for Differentially Private Facility Location arXiv.cs.DS Pub Date : 2024-03-07 Pasin Manurangsi
We consider the differentially private (DP) facility location problem in the so called super-set output setting proposed by Gupta et al. [SODA 2010]. The current best known expected approximation ratio for an $\epsilon$-DP algorithm is $O\left(\frac{\log n}{\sqrt{\epsilon}}\right)$ due to Cohen-Addad et al. [AISTATS 2022] where $n$ denote the size of the metric space, meanwhile the best known lower
-
Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation arXiv.cs.DS Pub Date : 2024-03-07 Palak Jain, Adam Smith, Connor Wagaman
We describe the first algorithms that satisfy the standard notion of node-differential privacy in the continual release setting (i.e., without an assumed promise on input streams). Previous work addresses node-private continual release by assuming an unenforced promise on the maximum degree in a graph; indeed, the algorithms from these works exhibit blatant privacy violations when the degree bound
-
Optimizing Inventory Placement for a Downstream Online Matching Problem arXiv.cs.DS Pub Date : 2024-03-07 Boris EpsteinColumbia University, Will MaColumbia University
We study the inventory placement problem of splitting $Q$ units of a single item across warehouses, in advance of a downstream online matching problem that represents the dynamic fulfillment decisions of an e-commerce retailer. This is a challenging problem both in theory, because the downstream matching problem itself is computationally hard, and in practice, because the fulfillment team is constantly
-
A Simple and Near-Optimal Algorithm for Directed Expander Decompositions arXiv.cs.DS Pub Date : 2024-03-07 Aurelio L. Sulser, Maximilian Probst Gutenberg
In this work, we present the first algorithm to compute expander decompositions in an $m$-edge directed graph with near-optimal time $\tilde{O}(m)$. Further, our algorithm can maintain such a decomposition in a dynamic graph and again obtains near-optimal update times. Our result improves over previous algorithms of Bernstein-Probst Gutenberg-Saranurak (FOCS 2020), Hua-Kyng-Probst Gutenberg-Wu (SODA
-
Equivalence Testing: The Power of Bounded Adaptivity arXiv.cs.DS Pub Date : 2024-03-07 Diptarka Chakraborty, Sourav Chakraborty, Gunjan Kumar, Kuldeep S. Meel
Equivalence testing, a fundamental problem in the field of distribution testing, seeks to infer if two unknown distributions on $[n]$ are the same or far apart in the total variation distance. Conditional sampling has emerged as a powerful query model and has been investigated by theoreticians and practitioners alike, leading to the design of optimal algorithms albeit in a sequential setting (also
-
A Sierpinski Triangle Data Structure for Efficient Array Value Update and Prefix Sum Calculation arXiv.cs.DS Pub Date : 2024-03-06 Brent Harrison, Jason Necaise, Andrew Projansky, James D. Whitfield
The binary indexed tree, or Fenwick tree, is a data structure that can efficiently update values and calculate prefix sums in an array. It allows both of these operations to be performed in $O(\log_2 N)$ time. Here we present a novel data structure resembling the Sierpinski triangle, which accomplishes these operations with the same memory usage in $O(\log_3 N)$ time instead. We show this order to
-
Conflict and Fairness in Resource Allocation arXiv.cs.DS Pub Date : 2024-03-07 Susobhan Bandopadhyay, Aritra Banik, Sushmita Gupta, Pallavi Jain, Abhishek Sahu, Saket Saurabh, Prafullkumar Tale
In the standard model of fair allocation of resources to agents, every agent has some utility for every resource, and the goal is to assign resources to agents so that the agents' welfare is maximized. Motivated by job scheduling, interest in this problem dates back to the work of Deuermeyer et al. [SIAM J. on Algebraic Discrete Methods'82]. Recent works consider the compatibility between resources
-
On HTLC-Based Protocols for Multi-Party Cross-Chain Swaps arXiv.cs.DS Pub Date : 2024-03-06 Emily Clark, Chloe Georgiou, Katelyn Poon, Marek Chrobak
In his 2018 paper, Herlihy introduced an atomic protocol for multi-party asset swaps across different blockchains. His model represents an asset swap by a directed graph whose nodes are the participating parties and edges represent asset transfers, and rational behavior of the participants is captured by a preference relation between a protocol's outcomes. Asset transfers between parties are achieved
-
Double Exponential Lower Bound for Telephone Broadcast arXiv.cs.DS Pub Date : 2024-03-06 Prafullkumar Tale
Consider the Telephone Broadcast problem in which an input is a connected graph $G$ on $n$ vertices, a source vertex $s \in V(G)$, and a positive integer $t$. The objective is to decide whether there is a broadcast protocol from $s$ that ensures that all the vertices of $G$ get the message in at most $t$ rounds. We consider the broadcast protocol where, in a round, any node aware of the message can
-
Fine-Grained Privacy Guarantees for Coverage Problems arXiv.cs.DS Pub Date : 2024-03-05 Laxman Dhulipala, George Z. Li
We introduce a new notion of neighboring databases for coverage problems such as Max Cover and Set Cover under differential privacy. In contrast to the standard privacy notion for these problems, which is analogous to node-privacy in graphs, our new definition gives a more fine-grained privacy guarantee, which is analogous to edge-privacy. We illustrate several scenarios of Set Cover and Max Cover
-
Maintaining Light Spanners via Minimal Updates arXiv.cs.DS Pub Date : 2024-03-05 Hadi Khodabandeh, David Eppstein
We study the problem of maintaining a lightweight bounded-degree $(1+\varepsilon)$-spanner of a dynamic point set in a $d$-dimensional Euclidean space, where $\varepsilon>0$ and $d$ are arbitrary constants. In our fully-dynamic setting, points are allowed to be inserted as well as deleted, and our objective is to maintain a $(1+\varepsilon)$-spanner that has constant bounds on its maximum degree and
-
The Exchange Problem arXiv.cs.DS Pub Date : 2024-03-05 Mohit Garg, Suneel Sarswat
Auctions are widely used in exchanges to match buy and sell requests. Once the buyers and sellers place their requests, the exchange determines how these requests are to be matched. The two most popular objectives used while determining the matching are maximizing volume at a uniform price and maximizing volume with dynamic pricing. In this work, we study the algorithmic complexity of the problems
-
Cover Edge-Based Novel Triangle Counting arXiv.cs.DS Pub Date : 2024-03-05 David A. Bader, Fuhuan Li, Zhihui Du, Palina Pauliuchenka, Oliver Alvarado Rodriguez, Anant Gupta, Sai Sri Vastav Minnal, Valmik Nahata, Anya Ganeshan, Ahmet Gundogdu, Jason Lew
Listing and counting triangles in graphs is a key algorithmic kernel for network analyses, including community detection, clustering coefficients, k-trusses, and triangle centrality. In this paper, we propose the novel concept of a cover-edge set that can be used to find triangles more efficiently. Leveraging the breadth-first search (BFS) method, we can quickly generate a compact cover-edge set. Novel
-
Algorithms for Galois Words: Detection, Factorization, and Rotation arXiv.cs.DS Pub Date : 2024-03-05 Diptarama Hendrian, Dominik Köppl, Ryo Yoshinaka, Ayumi Shinohara
Lyndon words are extensively studied in combinatorics on words -- they play a crucial role on upper bounding the number of runs a word can have [Bannai+, SIAM J. Comput.'17]. We can determine Lyndon words, factorize a word into Lyndon words in lexicographically decreasing order, and find the Lyndon rotation of a word, all in linear time within constant additional working space. A recent research interest
-
On Approximate Fully-Dynamic Matching and Online Matrix-Vector Multiplication arXiv.cs.DS Pub Date : 2024-03-05 Yang P. Liu
We study connections between the problem of fully dynamic $(1-\epsilon)$-approximate maximum bipartite matching, and the dual $(1+\epsilon)$-approximate vertex cover problem, with the online matrix-vector ($\mathsf{OMv}$) conjecture which has recently been used in several fine-grained hardness reductions. We prove that there is an online algorithm that maintains a $(1+\epsilon)$-approximate vertex
-
Space Complexity of Euclidean Clustering arXiv.cs.DS Pub Date : 2024-03-05 Xiaoyi Zhu, Yuxiang Tian, Lingxiao Huang, Zengfeng Huang
The $(k, z)$-Clustering problem in Euclidean space $\mathbb{R}^d$ has been extensively studied. Given the scale of data involved, compression methods for the Euclidean $(k, z)$-Clustering problem, such as data compression and dimension reduction, have received significant attention in the literature. However, the space complexity of the clustering problem, specifically, the number of bits required
-
Constraint Satisfaction Problems with Advice arXiv.cs.DS Pub Date : 2024-03-04 Suprovat Ghoshal, Konstantin Makarychev, Yury Makarychev
We initiate the study of algorithms for constraint satisfaction problems with ML oracle advice. We introduce two models of advice and then design an approximation algorithm for Max Cut and Max 2-Lin in these models.
-
Faster MEM-finding in $O (r + \bar{r} + g)$ space arXiv.cs.DS Pub Date : 2024-03-04 Travis Gagie
Suppose we are given a text $T [1..n]$, a straight-line program with $g$ rules for $T$ and an assignment of tags to the characters in $T$ such that the Burrows-Wheeler Transform of $T$ has $r$ runs, the Burrows-Wheeler Transform of the reverse of $T$ has $\bar{r}$ runs and the tag array -- the list of tags in the lexicographic order of the suffixes starting at the characters the tags are assigned to
-
The Canadian Traveller Problem on outerplanar graphs arXiv.cs.DS Pub Date : 2024-03-04 Laurent Beaudou, Pierre Bergé, Vsevolod Chernyshev, Antoine Dailly, Yan Gerard, Aurélie Lagoutte, Vincent Limouzy, Lucas Pastor
We study the PSPACE-complete $k$-Canadian Traveller Problem, where a weighted graph $G=(V,E,\omega)$ with a source $s\in V$ and a target $t\in V$ are given. This problem also has a hidden input $E_* \subsetneq E$ of cardinality at most $k$ representing blocked edges. The objective is to travel from $s$ to $t$ with the minimum distance. At the beginning of the walk, the blockages $E_*$ are unknown:
-
Fully Polynomial-time Algorithms Parameterized by Vertex Integrity Using Fast Matrix Multiplication arXiv.cs.DS Pub Date : 2024-03-04 Matthias Bentert, Klaus Heeger, Tomohiro Koana
We study the computational complexity of several polynomial-time-solvable graph problems parameterized by vertex integrity, a measure of a graph's vulnerability to vertex removal in terms of connectivity. Vertex integrity is the smallest number $\iota$ such that there is a set $S$ of $\iota' \le \iota$ vertices such that every connected component of $G-S$ contains at most $\iota-\iota'$ vertices. It
-
Approximations and Hardness of Packing Partially Ordered Items arXiv.cs.DS Pub Date : 2024-03-03 Ilan Doron-Arad, Guy Kortsarz, Joseph Naor, Baruch Schieber, Hadas Shachnai
Motivated by applications in production planning and storage allocation in hierarchical databases, we initiate the study of covering partially ordered items (CPO). Given a capacity $k \in \mathbb{Z}^+$, and a directed graph $G=(V,E)$ where each vertex has a size in $\{0,1, \ldots,k\}$, we seek a collection of subsets of vertices $S_1, \ldots, S_m$ that cover all the vertices, such that for any $1 \leq
-
Contract Design for Pandora's Box arXiv.cs.DS Pub Date : 2024-03-04 Martin Hoefer, Conrad Schecker, Kevin Schewior
We study a natural application of contract design to search problems with probabilistic prior and exploration costs. These problems have a plethora of applications and are expressed concisely within the Pandora's Box model. Its optimal solution is the ingenious index policy proposed originally by Weitzman in 1979. In our principal-agent setting, the search task is delegated to an agent. The agent performs
-
Towards Deterministic Algorithms for Constant-Depth Factors of Constant-Depth Circuits arXiv.cs.DS Pub Date : 2024-03-04 Mrinal Kumar, Varun Ramanathan, Ramprasad Saptharishi, Ben Lee Volk
We design a deterministic subexponential time algorithm that takes as input a multivariate polynomial $f$ computed by a constant-depth circuit over rational numbers, and outputs a list $L$ of circuits (of unbounded depth and possibly with division gates) that contains all irreducible factors of $f$ computable by constant-depth circuits. This list $L$ might also include circuits that are spurious: they
-
K-stars LDP: A Novel Framework for (p, q)-clique Enumeration under Local Differential Privacy arXiv.cs.DS Pub Date : 2024-03-04 Henan Sun, Zhengyu Wu, Rong-Hua Li, Guoren Wang, Zening Li
(p,q)-clique enumeration on a bipartite graph is critical for calculating clustering coefficient and detecting densest subgraph. It is necessary to carry out subgraph enumeration while protecting users' privacy from any potential attacker as the count of subgraph may contain sensitive information. Most recent studies focus on the privacy protection algorithms based on edge LDP (Local Differential Privacy)
-
Euclidean distance compression via deep random features arXiv.cs.DS Pub Date : 2024-03-02 Brett Leroux, Luis Rademacher
Motivated by the problem of compressing point sets into as few bits as possible while maintaining information about approximate distances between points, we construct random nonlinear maps $\varphi_\ell$ that compress point sets in the following way. For a point set $S$, the map $\varphi_\ell:\mathbb{R}^d \to N^{-1/2}\{-1,1\}^N$ has the property that storing $\varphi_\ell(S)$ (a \emph{sketch} of $S$)
-
Approximating the Geometric Knapsack Problem in Near-Linear Time and Dynamically arXiv.cs.DS Pub Date : 2024-03-01 Moritz Buchem, Paul Deuker, Andreas Wiese
An important goal in algorithm design is determining the best running time for solving a problem (approximately). For some problems, we know the optimal running time, assuming certain conditional lower bounds. In this work, we study the $d$-dimensional geometric knapsack problem where we are far from this level of understanding. We are given a set of weighted d-dimensional geometric items like squares
-
qPMS Sigma -- An Efficient and Exact Parallel Algorithm for the Planted $(l, d)$ Motif Search Problem arXiv.cs.DS Pub Date : 2024-03-01 Saurav Dhar, Amlan Saha, Dhiman Goswami, Md. Abul Kashem Mia
Motif finding is an important step for the detection of rare events occurring in a set of DNA or protein sequences. Extraction of information about these rare events can lead to new biological discoveries. Motifs are some important patterns that have numerous applications including the identification of transcription factors and their binding sites, composite regulatory patterns, similarity between
-
Algorithms for Efficient, Compact Online Data Stream Curation arXiv.cs.DS Pub Date : 2024-03-01 Matthew Andres Moreno, Santiago Rodriguez Papa, Emily Dolson
Data stream algorithms tackle operations on high-volume sequences of read-once data items. Data stream scenarios include inherently real-time systems like sensor networks and financial markets. They also arise in purely-computational scenarios like ordered traversal of big data or long-running iterative simulations. In this work, we develop methods to maintain running archives of stream data that are
-
Average-Case Local Computation Algorithms arXiv.cs.DS Pub Date : 2024-02-29 Amartya Shankha Biswas, Ruidi Cao, Edward Pyne, Ronitt Rubinfeld
We initiate the study of Local Computation Algorithms on average case inputs. In the Local Computation Algorithm (LCA) model, we are given probe access to a huge graph, and asked to answer membership queries about some combinatorial structure on the graph, answering each query with sublinear work. For instance, an LCA for the $k$-spanner problem gives access to a sparse subgraph $H\subseteq G$ that
-
Total Completion Time Scheduling Under Scenarios arXiv.cs.DS Pub Date : 2024-02-29 Thomas Bosman, Martijn van Ee, Ekin Ergen, Csanad Imreh, Alberto Marchetti-Spaccamela, Martin Skutella, Leen Stougie
Scheduling jobs with given processing times on identical parallel machines so as to minimize their total completion time is one of the most basic scheduling problems. We study interesting generalizations of this classical problem involving scenarios. In our model, a scenario is defined as a subset of a predefined and fully specified set of jobs. The aim is to find an assignment of the whole set of
-
Edit and Alphabet-Ordering Sensitivity of Lex-parse arXiv.cs.DS Pub Date : 2024-02-29 Yuto Nakashima, Dominik Köppl, Mitsuru Funakoshi, Shunsuke Inenaga, Hideo Bannai
We investigate the compression sensitivity [Akagi et al., 2023] of lex-parse [Navarro et al., 2021] for two operations: (1) single character edit and (2) modification of the alphabet ordering, and give tight upper and lower bounds for both operations. For both lower bounds, we use the family of Fibonacci words. For the bounds on edit operations, our analysis makes heavy use of properties of the Lyndon
-
Computing Longest Common Subsequence under Cartesian-Tree Matching Model arXiv.cs.DS Pub Date : 2024-02-29 Taketo Tsujimoto, Koki Shibata, Takuya Mieno, Yuto Nakashima, Shunsuke Inenaga
Two strings of the same length are said to Cartesian-tree match (CT-match) if their Cartesian-trees are isomorphic [Park et al., TCS 2020]. Cartesian-tree matching is a natural model that allows for capturing similarities of numerical sequences. Oizumi et al. [CPM 2022] showed that subsequence pattern matching under CT-matching model can be solved in polynomial time. This current article follows and