76,456 research outputs found
Complexity of Chess Domination Problems
We study different domination problems of attacking and non-attacking rooks
and queens on polyominoes and polycubes of all dimensions. Our main result
proves that maximal domination is NP-complete for non-attacking queens and for
non-attacking rooks on polycubes of dimension three and higher. We also analyse
these problems for polyominoes and convex polyominoes, conjecture the
complexity classes and provide a computer tool for investigation. We have also
computed new values for classical queen domination problems on chessboards
(square polyominoes). For our computations, we have translated the problem into
an integer linear programming instance. Finally, using this computational
implementation and the game engine Godot, we have developed a video game of
minimal domination of queens and rooks on randomly generated polyominoes.Comment: 19 pages, 20 figures, 4 tables. Theorem 1 now for d>2, added results
on approximation, fixed typos, reorganised some proof
The tractability frontier of well-designed SPARQL queries
We study the complexity of query evaluation of SPARQL queries. We focus on
the fundamental fragment of well-designed SPARQL restricted to the AND,
OPTIONAL and UNION operators. Our main result is a structural characterisation
of the classes of well-designed queries that can be evaluated in polynomial
time. In particular, we introduce a new notion of width called domination
width, which relies on the well-known notion of treewidth. We show that, under
some complexity theoretic assumptions, the classes of well-designed queries
that can be evaluated in polynomial time are precisely those of bounded
domination width
The Complexity of Iterated Strategy Elimination
We consider the computational complexity of the question whether a certain
strategy can be removed from a game by means of iterated elimination of
dominated strategies. In particular, we study the influence of different
definitions of domination and of the number of different payoff values. In
addition, the consequence of restriction to constant-sum games is shown
Protecting a Graph with Mobile Guards
Mobile guards on the vertices of a graph are used to defend it against
attacks on either its vertices or its edges. Various models for this problem
have been proposed. In this survey we describe a number of these models with
particular attention to the case when the attack sequence is infinitely long
and the guards must induce some particular configuration before each attack,
such as a dominating set or a vertex cover. Results from the literature
concerning the number of guards needed to successfully defend a graph in each
of these problems are surveyed.Comment: 29 pages, two figures, surve
- …