Skip to main content

Theory of Computing Systems OnlineFirst articles

Open Access 11.04.2024

Characterization of Ordered Semigroups Generating Well Quasi-Orders of Words

The notion of a quasi-order generated by a homomorphism from the semigroup of all words onto a finite ordered semigroup was introduced by Bucher et al. (Theor. Comput. Sci. 40, 131–148 1985). It naturally occurred in their studies of derivation …

verfasst von:
Ondřej Klíma, Jonatan Kolegar

Open Access 05.04.2024

Pumping Lemmas Can be “Harmful”

A pumping lemma for a class of languages $$\varvec{\mathcal {C}}$$ C is often used to show particular languages are not in $$\varvec{\mathcal {C}}$$ C . In contrast, we show that a pumping lemma for a class of languages $$\varvec{\mathcal {C}}$$ C …

verfasst von:
Jingnan Xie, Harry B. Hunt III, Richard E. Stearns

Open Access 05.04.2024

How to Hide a Clique?

In the well known planted clique problem, a clique (or alternatively, an independent set) of size k is planted at random in an Erdos-Renyi random G(n, p) graph, and the goal is to design an algorithm that finds the maximum clique (or independent …

verfasst von:
Uriel Feige, Vadim Grinberg

Open Access 05.04.2024

Revisiting the Distortion of Distributed Voting

We consider a setting with agents that have preferences over alternatives and are partitioned into disjoint districts. The goal is to choose one alternative as the winner using a mechanism which first decides a representative alternative for each …

verfasst von:
Aris Filos-Ratsikas, Alexandros A. Voudouris

Open Access 01.04.2024

Placing Green Bridges Optimally, with a Multivariate Analysis

We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of …

verfasst von:
Till Fluschnik, Leon Kellerhals

26.03.2024

CNF Encodings of Symmetric Functions

Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF …

verfasst von:
Gregory Emdin, Alexander S. Kulikov, Ivan Mihajlin, Nikita Slezkin

25.03.2024

Approximation Algorithms for the MAXSPACE Advertisement Problem

In MAXSPACE, given a set of ads $$\mathcal {A}$$ A , one wants to schedule a subset $${\mathcal {A}'\subseteq \mathcal {A}}$$ A ′ ⊆ A into K slots $${B_1, \dots , B_K}$$ B 1 , ⋯ , B K of size L. Each ad $${A_i \in \mathcal {A}}$$ A i ∈ A has a …

verfasst von:
Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery

Open Access 14.03.2024

Performing Regular Operations with 1-Limited Automata

The descriptional complexity of basic operations on regular languages using 1-limited automata, a restricted version of one-tape Turing machines, is investigated. When simulating operations on deterministic finite automata with deterministic …

verfasst von:
Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský

Open Access 14.03.2024

Imperative Process Algebra and Models of Parallel Computation

Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are computational processes. Processes of this kind can be described using an imperative process algebra …

verfasst von:
Cornelis A. Middelburg

06.03.2024

Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance

The homogeneous weight (metric) is useful in the construction of codes over a ring of integers $$\mathbb {Z}_{p^l}$$ Z p l (p prime and $$l \ge 1$$ l ≥ 1 an integer). It becomes Hamming weight when the ring is taken to be a finite field and …

verfasst von:
Pankaj Kumar Das, Subodh Kumar

13.01.2024

On the Decidability of Infix Inclusion Problem

We introduce the infix inclusion problem of two languages S and T that decides whether or not S is a subset of the set of all infixes of T. This problem is motivated by the need for identifying malicious computation patterns according to their …

verfasst von:
Hyunjoon Cheon, Joonghyuk Hahn, Yo-Sub Han

20.12.2023

Rational Index of Languages Defined by Grammars with Bounded Dimension of Parse Trees

The rational index $$\rho _L$$ ρ L of a language L is an integer function, where $$\rho _L(n)$$ ρ L ( n ) is the maximum length of the shortest string in $$L \cap R$$ L ∩ R , over all regular languages R recognized by n-state nondeterministic …

verfasst von:
Ekaterina Shemetova, Alexander Okhotin, Semyon Grigorev

12.12.2023

Improved Bounds for Matching in Random-Order Streams

We study the problem of computing an approximate maximum cardinality matching in the semi-streaming model when edges arrive in a random order. In the semi-streaming model, the edges of the input graph $$G = (V,E)$$ G = ( V , E ) are given as a …

verfasst von:
Aaron Bernstein

12.12.2023

Upper Bounds on Communication in Terms of Approximate Rank

We show that any Boolean function with approximate rank r can be computed by bounded-error quantum protocols without prior entanglement of complexity $$O( \sqrt{r} \log r)$$ O ( r log r ) . In addition, we show that any Boolean function with …

verfasst von:
Anna Gál, Ridwan Syed

Open Access 11.12.2023

A Closer Look at the Expressive Power of Logics Based on Word Equations

Word equations are equations $$\alpha \doteq \beta $$ α ≐ β where $$\alpha $$ α and $$\beta $$ β are words consisting of letters from some alphabet $$\Sigma $$ Σ and variables from a set X. Recently, there has been substantial interest in the …

verfasst von:
Joel Day, Vijay Ganesh, Nathan Grewal, Matthew Konefal, Florin Manea

Open Access 23.09.2023

b-Coloring Parameterized by Clique-Width

We provide a polynomial-time algorithm for b -Coloring on graphs of constant clique-width. This unifies and extends nearly all previously known polynomial time results on graph classes, and answers open questions posed by Campos and Silva …

verfasst von:
Lars Jaffke, Paloma T. Lima, Daniel Lokshtanov

Open Access 09.05.2023

Subgroup Membership in GL(2,Z)

It is shown that the subgroup membership problem for a virtually free group can be decided in polynomial time when all group elements are represented by so-called power words, i.e., words of the form $$p_1^{z_1} p_2^{z_2} \cdots p_k^{z_k}$$ p 1 z …

verfasst von:
Markus Lohrey

Open Access 24.04.2023

Reachability in Two-Parametric Timed Automata with one Parameter is EXPSPACE-Complete

Parametric timed automata (PTA) have been introduced by Alur, Henzinger, and Vardi as an extension of timed automata in which clocks can be compared against parameters. The reachability problem asks for the existence of an assignment of the …

verfasst von:
Stefan Göller, Mathieu Hilaire

27.12.2022

One-Tape Turing Machine and Branching Program Lower Bounds for MCSP

For a size parameter s : ℕ → ℕ $s:\mathbb {N}\to \mathbb {N}$ , the Minimum Circuit Size Problem (denoted by MCSP[s(n)]) is the problem of deciding whether the minimum circuit size of a given function f : {0,1}n →{0,1} (represented by a string of …

verfasst von:
Mahdi Cheraghchi, Shuichi Hirahara, Dimitrios Myrisiotis, Yuichi Yoshida

07.12.2022

Digraph Coloring and Distance to Acyclicity

In k-Digraph Coloring we are given a digraph and are asked to partition its vertices into at most k sets, so that each set induces a DAG. This well-known problem is NP-hard, as it generalizes (undirected) k-Coloring, but becomes trivial if the …

verfasst von:
Ararat Harutyunyan, Michael Lampis, Nikolaos Melissinos