当前期刊: Information Processing Letters Go to current issue    加入关注    本刊投稿指南
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Small cycles, generalized prisms and Hamiltonian cycles in the Bubble-sort graph
    Inf. Process. Lett. (IF 0.677) Pub Date : 2021-01-11
    Elena V. Konstantinova; Alexey N. Medvedev

    The Bubble-sort graph BSn,n⩾2, is a Cayley graph over the symmetric group Symn generated by transpositions from the set {(12),(23),…,(n−1n)}. It is a bipartite graph containing all even cycles of length ℓ, where 4⩽ℓ⩽n!. We give an explicit combinatorial characterization of all its 4- and 6-cycles. Based on this characterization, we define generalized prisms in BSn,n⩾5, and present a new approach to

    更新日期:2021-01-16
  • A simple proof of QBF hardness
    Inf. Process. Lett. (IF 0.677) Pub Date : 2021-01-09
    Olaf Beyersdorff; Joshua Blinkhorn

    We provide a simple and direct proof of the exponential hardness of the KBKF formulas in the proof system Q-Resolution.

    更新日期:2021-01-14
  • Faster parameterized algorithm for Bicluster Editing
    Inf. Process. Lett. (IF 0.677) Pub Date : 2021-01-12
    Dekel Tsur

    In the Bicluster Editing problem the input is a bipartite graph G and an integer k, and the goal is to decide whether G can be transformed into a bicluster graph by adding and removing at most k edges. In this paper we give an algorithm for Bicluster Editing whose running time is O⁎(2.636k).

    更新日期:2021-01-14
  • Extending de Bruijn sequences to larger alphabets
    Inf. Process. Lett. (IF 0.677) Pub Date : 2021-01-05
    Verónica Becher; Lucas Cortés

    A de Bruijn sequence of order n over a k-symbol alphabet is a circular sequence where each length-n sequence occurs exactly once. We present a way of extending de Bruijn sequences by adding a new symbol to the alphabet: the extension is performed by embedding a given de Bruijn sequence into another one of the same order, but over the alphabet with one more symbol, while ensuring that there are no long

    更新日期:2021-01-12
  • On computing Pareto optimal paths in weighted time-dependent networks
    Inf. Process. Lett. (IF 0.677) Pub Date : 2021-01-05
    Filippo Brunelli; Pierluigi Crescenzi; Laurent Viennot

    A weighted point-availability time-dependent network is a list of temporal edges, where each temporal edge has an appearing time value, a travel time value, and a cost value. In this paper we consider the single source Pareto problem in weighted point-availability time-dependent networks, which consists of computing, for any destination d, all Pareto optimal pairs (t,c), where t and c are the arrival

    更新日期:2021-01-12
  • Longest common subsequence in sublinear space
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-12-30
    Masashi Kiyomi; Takashi Horiyama; Yota Otachi

    We present the first o(n)-space polynomial-time algorithm for computing the length of a longest common subsequence. Given two strings of length n, the algorithm runs in O(n3) time with O(nlog1.5⁡n2log⁡n) bits of space.

    更新日期:2021-01-12
  • A note on the concrete hardness of the shortest independent vector in lattices
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-11-04
    Divesh Aggarwal; Eldon Chung

    Blömer and Seifert [1] showed that SIVP2 is NP-hard to approximate by giving a reduction from CVP2 to SIVP2 for constant approximation factors as long as the CVP instance has a certain property. In order to formally define this requirement on the CVP instance, we introduce a new computational problem called the Gap Closest Vector Problem with Bounded Minima. We adapt the proof of [1] to show a reduction

    更新日期:2021-01-05
  • Algorithms for deletion problems on split graphs
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-11-05
    Dekel Tsur

    In the Split to Block Vertex Deletion and Split to Threshold Vertex Deletion problems the input is a split graph G and an integer k, and the goal is to decide whether there is a set S of vertices of size at most k such that G−S is a block graph and G−S is a threshold graph, respectively. In this paper we give algorithms for these problems whose running times are O⁎(2.076k) and O⁎(1.619k), respectively

    更新日期:2021-01-05
  • An optimal rounding for half-integral weighted minimum strongly connected spanning subgraph
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-11-12
    D. Ellis Hershkowitz; Gregory Kehne; R. Ravi

    In the weighted minimum strongly connected spanning subgraph (WMSCSS ) problem we must purchase a minimum-cost strongly connected spanning subgraph of a digraph. We show that half-integral linear program (LP) solutions for WMSCSS can be efficiently rounded to integral solutions at a multiplicative 1.5 cost. This rounding matches a known 1.5 integrality gap lower bound for a half-integral instance.

    更新日期:2021-01-05
  • Computability by monadic second-order logic
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-11-23
    Joost Engelfriet

    A binary relation on graphs is recursively enumerable if and only if it can be computed by a formula of monadic second-order logic. The latter means that the formula defines a set of graphs, in the usual way, such that each “computation graph” in that set determines a pair consisting of an input graph and an output graph.

    更新日期:2021-01-05
  • A lower bound for the coverability problem in acyclic pushdown VAS
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-12-18
    Matthias Englert; Piotr Hofman; Sławomir Lasota; Ranko Lazić; Jérôme Leroux; Juliusz Straszyński

    We investigate the coverability problem for a one-dimensional restriction of pushdown vector addition systems with states. We improve the lower complexity bound to PSpace, even in the acyclic case.

    更新日期:2021-01-05
  • Robbins and Ardila meet Berstel
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-12-24
    Jeffrey Shallit

    In 1996, Neville Robbins proved the amazing fact that the coefficient of Xn in the Fibonacci infinite product∏n≥2(1−XFn)=(1−X)(1−X2)(1−X3)(1−X5)(1−X8)⋯=1−X−X2+X4+⋯ is always either −1, 0, or 1. The same result was proved later by Federico Ardila using a different method. Meanwhile, in 2001, Jean Berstel gave a simple 4-state transducer that converts an “illegal” Fibonacci representation into a “legal”

    更新日期:2021-01-05
  • Minimal 2-connected graphs satisfying the even cut condition
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-12-23
    Adam S. Jobson; André E. Kézdy; Jenő Lehel

    If the bisection width of a 2-connected graph G of even order n is not less than n/2, i.e., if the graph satisfies the even cut condition, then G has at least 3n/2−2 edges. Here we characterize the 2-connected extremal graphs with 3n/2−2 edges for every n≥4. For n≥10 an extremal graph has two high-degree vertices, the other vertices have degree 2 and they are located on paths suspended between these

    更新日期:2021-01-05
  • Kernel for Kt-free Edge Deletion
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-12-28
    Dekel Tsur

    In the Kt-free Edge Deletion problem the input is a graph G and an integer k, and the goal is to decide whether there is a set of at most k edges of G whose removal results in a graph with no clique of size t. In this paper we give a kernel to this problem with O(kt−1) vertices and edges.

    更新日期:2021-01-05
  • Isomorphism for random k-uniform hypergraphs
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-19
    Debsoumya Chakraborti; Alan Frieze; Simi Haber; Mihir Hasabnis

    We study the isomorphism problem for random hypergraphs. We show that it is solvable in polynomial time for the binomial random k-uniform hypergraph Hn,p;k, for a wide range of p. We also show that it is solvable w.h.p. for random r-regular, k-uniform hypergraphs Hn,r;k,r=O(1).

    更新日期:2020-12-04
  • An A⁎ search algorithm for the constrained longest common subsequence problem
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-20
    Marko Djukanovic; Christoph Berger; Günther R. Raidl; Christian Blum

    The constrained longest common subsequence (CLCS) problem was introduced as a specific measure of similarity between molecules. It is a special case of the constrained sequence alignment problem and of the longest common subsequence (LCS) problem, which are both well-studied problems in the scientific literature. Finding similarities between sequences plays an important role in the fields of molecular

    更新日期:2020-12-04
  • A queueing network-based distributed Laplacian solver for directed graphs
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-20
    Iqra Altaf Gillani; Amitabha Bagchi

    We present a distributed algorithm for solving Laplacian systems on strongly connected directed graphs, the first that can be analyzed in terms of the underlying graph's parameters. Our distributed solver works for a large and important class of Laplacian systems that we call “one-sink” Laplacian systems, which includes the important electrical flow computation problem. Specifically, given Dout as

    更新日期:2020-12-04
  • Super spanning connectivity of split-star networks
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-08
    Jing Li; Xujing Li; Eddie Cheng

    A k-container of a graph G is a set of k internally disjoint paths between two distinct vertices. A k-container of G is a k⁎-container if it contains all vertices of G. Graph G is k⁎-connected if there exists a k⁎-container between any two distinct vertices. A k-connected graph G is super spanning connected if G is k⁎-connected for every r with 1≤r≤k. This study demonstrates that the split-star network

    更新日期:2020-12-04
  • Drawing a rooted tree as a rooted y−monotone minimum spanning tree
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-20
    Konstantinos Mastakas

    Given a set P of points in the plane, and a point r∈P identified as the root of P, the rooted y−Monotone Minimum Spanning Tree (rooted y−MMST) of P is the connected spanning geometric graph of P in which all the vertices are connected to the root by some y−monotone path and the sum of the Euclidean lengths of its edges is the minimum. We give a linear-time algorithm that draws any rooted tree as a

    更新日期:2020-12-04
  • A characterization of 3-γ-critical graphs which are not bicritical
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-27
    Jie Chen; Shou-Jun Xu

    A subset S of vertices in a graph G with vertex set V and edge set E is a dominating set of G if every vertex of V∖S is adjacent to a vertex in S. The minimum cardinality of a dominating set is the dominating number γ(G) of G. G is a 3-γ-critical graph if γ(G)=3 and γ(G+e)≤2 for e∉E; G is bicritical if G−u−v contains a perfect matching for every pair of distinct vertices u,v∈V. In this paper, we characterize

    更新日期:2020-12-04
  • A competitive analysis for the Start-Gap algorithm for online memory wear leveling
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-11-13
    William E. Devanny; Michael T. Goodrich; Sandy Irani

    Erase-limited memory, such as flash memory and phase change memory (PCM), has limitations on the number of times that any memory cell can be erased. The Start-Gap algorithm has shown a significant ability in practice to distribute updates across the cells of an erase-limited memory, but it has heretofore not been characterized in terms of its competitive ratio against an optimal offline algorithm that

    更新日期:2020-12-04
  • Geodesic spanners for points in R3 amid axis-parallel boxes
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-11-04
    Mohammad Ali Abam; Mohammad Javad Rezaei Seraji

    Let P be a set of n points in R3 amid a bounded number of obstacles. Consider the metric space M=(P,dM) where dM(p,q) is the geodesic distance of p and q, i.e., the length of a shortest path from p to q avoiding obstacles. When obstacles are axis-parallel boxes, we prove that M admits an 83-spanner with O(nlog3⁡n) edges. In other words, let S be a complete graph on n vertices where each node corresponds

    更新日期:2020-12-04
  • Runtime analysis of evolutionary algorithms via symmetry arguments
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-11-04
    Benjamin Doerr

    We use an elementary argument building on group actions to prove that the selection-free steady state genetic algorithm analyzed by Sutton and Witt (GECCO 2019) takes an expected number of Ω(2n/n) iterations to find any particular target search point. This bound is valid for all population sizes μ. Our result improves over the previous lower bound of Ω(exp⁡(nδ/2)) valid for population sizes μ=O(n1/2−δ)

    更新日期:2020-12-04
  • Simpler FM-index for parameterized string matching
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-07
    Sung-Hwan Kim; Hwan-Gue Cho

    In parameterized string matching, a string comprises static and parameterized symbols. Two strings are said to be matched if there exists a one-to-one mapping of parameterized symbols onto itself such that it transforms one string into the other. Traditionally, to construct a full-text index for this problem, suffixes are transformed in a manner referred to as previous occurrence encoding. Although

    更新日期:2020-10-30
  • Borders, palindrome prefixes, and square prefixes
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-18
    Daniel Gabric; Jeffrey Shallit

    We show that the number of length-n words over a k-letter alphabet having no even palindromic prefix is the same as the number of length-n unbordered words, by constructing an explicit bijection between the two sets. A slightly different but analogous result holds for those words having no odd palindromic prefix. Using known results on borders, we get an asymptotic enumeration for the number of words

    更新日期:2020-10-30
  • Counting the number of crossings in geometric graphs
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-18
    Frank Duque; Ruy Fabila-Monroy; César Hernández-Vélez; Carlos Hidalgo-Toscano

    A geometric graph is a graph whose vertices are points in general position in the plane and its edges are straight line segments joining these points. In this paper we give an O(n2log⁡n) time algorithm to compute the number of pairs of edges that cross in a geometric graph on n vertices. For layered graphs and convex geometric graphs the algorithm takes O(n2) time.

    更新日期:2020-10-30
  • Representations of stably continuous semi-lattices by information systems and abstract bases
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-10-06
    Longchun Wang; Qingguo Li

    In this paper, we introduce two new notions of S-continuous information systems and S-abstract bases which provide concrete representations of stably continuous semi-lattices. We shed light on how the states of an S-continuous information system and the round ideal completion of an S-abstract basis form a stably continuous semi-lattice, respectively. Then we obtain two representation theorems for stably

    更新日期:2020-10-30
  • The complexity of computing (almost) orthogonal matrices with ε-copies of the Fourier transform
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-14
    Nir Ailon; Gal Yehuda

    The complexity of computing the Fourier transform is a longstanding open problem. Very recently, Ailon (2013, 2014, 2015) showed in a collection of papers that, roughly speaking, a speedup of the Fourier transform computation implies numerical ill-condition. The papers also quantify this tradeoff. The main method for proving these results is via a potential function called quasi-entropy, reminiscent

    更新日期:2020-10-30
  • A note on the strong matching preclusion problem for data center networks
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-29
    Tianlong Ma; Yaping Mao; Eddie Cheng; Ping Han

    The strong matching preclusion number of a graph is the minimum number of vertices and edges whose deletion results in a graph that has neither perfect matchings nor almost perfect matchings. The class of data center networks has been proposed as a good class of models in the design of computer networks. Such a data center network can be viewed as a server-centric interconnection network structure

    更新日期:2020-09-22
  • Longest distance of a non-uniform dispersion process on the infinite line
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-21
    Yilun Shang

    The non-uniform dispersion process on the infinite integer line is a synchronous process where n particles are placed at the origin initially, and any particle not exclusively occupying an integer site will move at the next time step to the right adjacent integer with probability pn and to the left with probability 1−pn independently. We characterize the longest distance from the origin when the dispersion

    更新日期:2020-09-22
  • Lot scheduling on a single machine to minimize the (weighted) number of tardy orders
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-21
    Baruch Mor; Gur Mosheiov; Dana Shapira

    We consider a single machine lot scheduling problem. A number of customer orders of different sizes may be processed in the same lot. We consider first the setting that splitting orders between consecutive lots is allowed. We focus on minimizing the number of tardy orders. A polynomial time solution algorithm is introduced for this problem. We then study the extension to minimizing the weighted number

    更新日期:2020-09-22
  • Strong security of linear ramp secret sharing schemes with general access structures
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-05
    Reo Eriguchi; Noboru Kunihiro

    A secret sharing scheme is a cryptographic technique to protect a secret from loss and leakage by dividing it into shares. A ramp secret sharing scheme can improve efficiency in terms of the information ratio by allowing partial information about the secret which is composed of several sub-secrets to leak out. The notion of strong security has been introduced to control the amount of information on

    更新日期:2020-09-22
  • 2-Dimensional palindromes with k mismatches
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-06
    Dina Sokol

    This paper extends the problem of 2-dimensional palindrome search into the area of approximate matching. Using the Hamming distance as the measure, we search for 2D palindromes that allow up to k mismatches. We consider two different definitions of 2D palindromes and describe efficient algorithms for both of them. The first definition implies a square, while the second definition (also known as a centrosymmetric

    更新日期:2020-09-22
  • On the longest common subsequence of Thue-Morse words
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-06
    Joakim Blikstad

    The length a(n) of the longest common subsequence of the nth Thue-Morse word and its bitwise complement is studied. An open problem suggested by Jean Berstel in 2006 is to find a formula for a(n). In this paper we prove new lower bounds on a(n) by explicitly constructing a common subsequence between the Thue-Morse words and their bitwise complement. We obtain the lower bound a(n)=2n(1−o(1)), saying

    更新日期:2020-09-22
  • A note on the integrality gap of the configuration LP for restricted Santa Claus
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-09-14
    Klaus Jansen; Lars Rohwedder

    In the restricted Santa Claus problem we are given resources R and players P. Every resource j∈R has a value vj and every player i∈P desires a set of resources R(i). We are interested in distributing the resources to players that desire them. The quality of a solution is measured by the least happy player, i.e., the lowest sum of resource values. This value should be maximized. The local search algorithm

    更新日期:2020-09-22
  • New bounds on antipowers in words
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-08-17
    Lukas Fleischer; Samin Riasat; Jeffrey Shallit

    Fici et al. defined a word to be a k-power if it is the concatenation of k consecutive identical blocks, and an r-antipower if it is the concatenation of r pairwise distinct blocks of the same size. They defined N(k,r) as the smallest ℓ such that every binary word of length ℓ contains either a k-power or an r-antipower. In this note we obtain some new upper and lower bounds on N(k,r). We also consider

    更新日期:2020-09-22
  • A simple deterministic algorithm for symmetric submodular maximization subject to a knapsack constraint
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-22
    Georgios Amanatidis, Georgios Birmpas, Evangelos Markakis

    We obtain a polynomial-time deterministic (2ee−1+ϵ)-approximation algorithm for maximizing symmetric submodular functions under a budget constraint. Although there exist randomized algorithms with better expected performance, our algorithm achieves the best known factor achieved by a deterministic algorithm, improving on the previously known factor of 6. Furthermore, it is simple, combining two elegant

    更新日期:2020-07-22
  • A note on the relation between XOR and Selective XOR lemmas
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-21
    Ragesh Jaiswal

    Given an unpredictable Boolean function f:{0,1}n→{0,1}, the standard Yao's XOR lemma is a statement about the unpredictability of computing ⊕i∈[k]f(xi) given x1,...,xk∈{0,1}n, whereas the Selective XOR lemma is a statement about the unpredictability of computing ⊕i∈Sf(xi) given x1,...,xk∈{0,1}n and S⊆{1,...,k}. We give a reduction from the Selective XOR lemma to the standard XOR lemma. Our reduction

    更新日期:2020-07-21
  • Surveying global verifiability
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-10
    Ben Smyth

    We explore global verifiability; discovering that voting systems vulnerable to attack can be proven to satisfy that security notion, whereas many secure systems cannot. We conclude that current definitions are unsuitable for the analysis of voting systems, fuelling the exploration for a suitable definition.

    更新日期:2020-07-10
  • Security analysis of a dynamic threshold secret sharing scheme using linear subspace method
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-09
    Sadegh Jamshidpour, Zahra Ahmadian

    A dealer-free and non-interactive dynamic threshold secret sharing scheme has been proposed by Harn and Hsu in Information Processing Letters in 2015. In this scheme, a (t,n) secret sharing scheme in secret sharing phase can turn into a (m,n) scheme in secret reconstruction phase, where m is the number of participating shareholders. It has been claimed that the secrecy of shares and the secrecy of

    更新日期:2020-07-09
  • Constrained existence of weak subgame perfect equilibria in multiplayer Büchi games
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-03
    Aline Goeminne

    In turn-based games played on graphs, the constrained existence problem of equilibria is a well studied problem. This problem is already known to be decidable in P for weak subgame perfect equilibria in Boolean games with Büchi objectives. In this paper, we prove that this problem is P-complete.

    更新日期:2020-07-03
  • Optimal-size problem kernels for d-Hitting Set in linear time and space
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-03
    René van Bevern, Pavel V. Smirnov

    The known linear-time kernelizations for d-Hitting Set guarantee linear worst-case running times using a quadratic-size data structure (that is not fully initialized). Getting rid of this data structure, we show that problem kernels of asymptotically optimal size O(kd) for d-Hitting Set are computable in linear time and space. Additionally, we experimentally compare the linear-time kernelizations for

    更新日期:2020-07-03
  • Grundy coloring in some subclasses of bipartite graphs and their complements
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-03
    Shaily Verma, B.S. Panda

    A vertex v is a Grundy vertex with respect to a proper k-coloring c of a graph G=(V,E) if v has a neighbor of color j for every j (1≤j

    更新日期:2020-07-03
  • Lengths of words accepted by nondeterministic finite automata
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-02
    Aaron Potechin, Jeffrey Shallit

    We consider two natural problems about nondeterministic finite automata (NFA). First, given an NFA M of n states, and a length ℓ, does M accept a word of length ℓ? We show that the classic problem of triangle-free graph recognition reduces to this problem, and give an O(nω(log⁡n)1+ϵlog⁡ℓ)-time algorithm to solve it, where ω is the optimal exponent for matrix multiplication. Second, provided L(M) is

    更新日期:2020-07-02
  • An FPT algorithm for orthogonal buttons and scissors
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-02
    Dekel Tsur

    We study the puzzle game Buttons and Scissors in which the goal is to remove all buttons from an n×m grid by a series of horizontal and vertical cuts. We show that the corresponding decision problem has an algorithm with time complexity 2O(k2log⁡k)+(n+m)O(1), where k is an upper bound on the number of cuts.

    更新日期:2020-07-02
  • QUIXO is EXPTIME-complete
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-02
    Shohei Mishiba, Yasuhiko Takenaga

    QUIXO is a two-player strategic board game played on a 5×5 game board. Players alternately move cubes on the game board, and the player who first made a line of five cubes with the player's symbol wins the game. In this paper, we prove EXPTIME-completeness of deciding the winner on generalized QUIXO played on an n×n game board.

    更新日期:2020-07-02
  • A simple approach to nondecreasing paths
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-07-01
    Mirosław Kowaluk, Andrzej Lingas

    We present a simple reduction of the problem of nondecreasing paths (with minimal last edge weight) in a directed edge-weighted graph to a reachability problem in a directed unweighted graph. The reduction yields an alternative simple method of solving the single-source nondecreasing paths problem in almost linear time. If the edge weights are integers then our algorithm can be implemented in O((n+m)log⁡log⁡n)

    更新日期:2020-07-01
  • Dynamic planar range skyline queries in log logarithmic expected time
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-30
    K. Doka, A. Kosmatopoulos, A. Papadopoulos, S. Sioutas, K. Tsichlas, D. Tsoumakos

    The skyline of a set P of points consists of the “best” points with respect to minimization or maximization of the attribute values. A point p dominates another point q if p is as good as q in all dimensions and it is strictly better than q in at least one dimension. In this work, we focus on the 2-d space and provide expected performance guarantees for dynamic (insertions and deletions) 3-sided range

    更新日期:2020-06-30
  • A note on the complexity of manipulating weighted Schulze voting
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-20
    Julian Müller, Sven Kosub

    We prove that the constructive weighted coalitional manipulation problem for the Schulze voting rule can be solved in polynomial time for an unbounded number of candidates and an unbounded number of manipulators.

    更新日期:2020-06-20
  • A fast algorithm for multiprocessor speed-scaling problem minimizing completion time and energy consumption
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-20
    Yusei Fujimori, Yasushi Kawase, Tomomi Matsui, Akiyoshi Shioura

    In this paper, we consider a scheduling problem on multiple speed-scalable processors, where the objective is to minimize a weighted sum of total completion times of jobs and total energy consumption on processors. We propose a simple algorithm for the scheduling problem that runs faster than the existing algorithm.

    更新日期:2020-06-20
  • Lazy or eager dynamic matching may not be fast
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-16
    Manas Jyoti Kashyop, N.S. Narayanaswamy

    We consider two sub-classes of fully dynamic algorithms for maintaining a maximal matching, which we define as lazy algorithms and eager algorithms. We prove a conditional lower bound which is sub-linear in the number of edges for the update time of lazy algorithms and eager algorithms. Our result is conditioned on the well known conjecture about the hardness of triangle detection in a graph.

    更新日期:2020-06-16
  • Online leasing strategy for depreciable equipment considering opportunity cost
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-11
    Yong Zhang, Jiayi Xian, Menghu Huang

    There are two options for the leasing problem, buying at a high price or leasing at a low price. Once you choose to purchase the resources, you lose the opportunity to invest in other financial assets for additional benefits, such as a risk-free return of the interest rate. Thus, opportunity cost is an important factor to consider in the leasing problem. Accounting for opportunity cost, this paper

    更新日期:2020-06-11
  • On the complexity of detecting hazards
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-04
    Balagopal Komarath, Nitin Saurabh

    Detecting and eliminating logic hazards in Boolean circuits is a fundamental problem in logic circuit design. We show that there is no O(3(1−ϵ)npoly(s)) time algorithm, for any ϵ>0, that detects logic hazards in Boolean circuits of size s on n variables under the assumption that the strong exponential time hypothesis is true. This lower bound holds even when the input circuits are restricted to be

    更新日期:2020-06-04
  • “The simplest protocol for oblivious transfer” revisited
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-04
    Ziya Alper Genç, Vincenzo Iovino, Alfredo Rial

    In 2015, Chou and Orlandi presented an oblivious transfer protocol that already drew a lot of attention both from theorists and practitioners due to its extreme simplicity and high efficiency. Chou and Orlandi claimed that their protocol is universally composable secure (UC-secure) in the random oracle model under dynamic corruptions. UC-security is a very strong security guarantee that assures that

    更新日期:2020-06-04
  • Linear time distributed swap edge algorithms
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-02
    A.K. Datta, P. Ferragina, L. Larmore, L. Pagli, G. Prencipe

    In this paper, we consider the all best swap edges problem in a distributed environment. We are given a 2-edge connected positively weighted network X, where all communication is routed through a rooted spanning tree T of X. If a tree edge e={x,y} fails, the communication network will be disconnected. However, since X is 2-edge connected, communication can be restored by replacing e by non-tree edge

    更新日期:2020-06-02
  • Incremental distance products via faulty shortest paths
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-06-01
    Oren Weimann, Raphael Yuster

    Given a constant number d of n×n matrices with total m non-infinity entries, we show how to construct in (essentially optimal) O˜(mn+n2) time a data structure that can compute in (essentially optimal) O˜(n2) time the distance product of these matrices after incrementing the value (possibly to infinity) of a constant number k of entries. Our result is obtained by designing an oracle for single source

    更新日期:2020-06-01
  • About blockchain interoperability
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-27
    Pascal Lafourcade, Marius Lombard-Platet

    A blockchain is designed to be a self-sufficient decentralised ledger: a peer verifying the validity of past transactions only needs to download the blockchain (the ledger) and nothing else. However, it might be of interest to make two different blockchains interoperable, i.e., to allow one to transmit information from one blockchain to another blockchain. In this paper, we give a formalisation of

    更新日期:2020-05-27
  • An answer to an open problem of Mesnager on bent functions
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-14
    Yanjun Li, Jie Peng, Chik How Tan

    In 2014, Mesnager proposed two open problems in [4] on the construction of bent functions. One problem has been settled by Tang et al. in 2017. However, the other is still outstanding, which is solved in this letter by considering a class of PS− vectorial bent functions.

    更新日期:2020-05-14
  • On cryptographic anonymity and unpredictability in secret sharing
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-11
    Anat Paskin-Cherniavsky, Ruxandra F. Olimid

    We revisit the notions of cryptographic anonymity and share unpredictability in secret sharing, introducing more systematic and fine grained definitions. We derive tight negative and positive results characterizing access structures with respect to the generalized definitions.

    更新日期:2020-05-11
  • Randomized distributed online algorithms against adaptive offline adversaries
    Inf. Process. Lett. (IF 0.677) Pub Date : 2020-05-07
    Joan Boyar, Faith Ellen, Kim S. Larsen

    In the sequential setting, a decades-old fundamental result in online algorithms states that if there is a c-competitive randomized online algorithm against an adaptive, offline adversary, then there is a c-competitive deterministic algorithm. The adaptive, offline adversary is the strongest adversary among the ones usually considered, so the result states that if one has to be competitive against

    更新日期:2020-05-07
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
微生物研究
亚洲大洋洲地球科学
NPJ欢迎投稿
自然科研论文编辑
ERIS期刊投稿
欢迎阅读创刊号
自然职场,为您触达千万科研人才
spring&清华大学出版社
城市可持续发展前沿研究专辑
Springer 纳米技术权威期刊征稿
全球视野覆盖
施普林格·自然新
chemistry
物理学研究前沿热点精选期刊推荐
自然职位线上招聘会
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
阿拉丁试剂right
上海中医药大学
清华大学
复旦大学
南科大
北京理工大学
清华
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
清华大学-1
武汉大学
浙江大学
天合科研
x-mol收录
试剂库存
down
wechat
bug