360 research outputs found
Point Line Cover: The Easy Kernel is Essentially Tight
The input to the NP-hard Point Line Cover problem (PLC) consists of a set
of points on the plane and a positive integer , and the question is
whether there exists a set of at most lines which pass through all points
in . A simple polynomial-time reduction reduces any input to one with at
most points. We show that this is essentially tight under standard
assumptions. More precisely, unless the polynomial hierarchy collapses to its
third level, there is no polynomial-time algorithm that reduces every instance
of PLC to an equivalent instance with points, for
any . This answers, in the negative, an open problem posed by
Lokshtanov (PhD Thesis, 2009).
Our proof uses the machinery for deriving lower bounds on the size of kernels
developed by Dell and van Melkebeek (STOC 2010). It has two main ingredients:
We first show, by reduction from Vertex Cover, that PLC---conditionally---has
no kernel of total size bits. This does not directly imply
the claimed lower bound on the number of points, since the best known
polynomial-time encoding of a PLC instance with points requires
bits. To get around this we build on work of Goodman et al.
(STOC 1989) and devise an oracle communication protocol of cost
for PLC; its main building block is a bound of for the order
types of points that are not necessarily in general position, and an
explicit algorithm that enumerates all possible order types of n points. This
protocol and the lower bound on total size together yield the stated lower
bound on the number of points.
While a number of essentially tight polynomial lower bounds on total sizes of
kernels are known, our result is---to the best of our knowledge---the first to
show a nontrivial lower bound for structural/secondary parameters
Improved approximation bounds for Vector Bin Packing
In this paper we propose an improved approximation scheme for the Vector Bin
Packing problem (VBP), based on the combination of (near-)optimal solution of
the Linear Programming (LP) relaxation and a greedy (modified first-fit)
heuristic. The Vector Bin Packing problem of higher dimension (d \geq 2) is not
known to have asymptotic polynomial-time approximation schemes (unless P = NP).
Our algorithm improves over the previously-known guarantee of (ln d + 1 +
epsilon) by Bansal et al. [1] for higher dimensions (d > 2). We provide a
{\theta}(1) approximation scheme for certain set of inputs for any dimension d.
More precisely, we provide a 2-OPT algorithm, a result which is irrespective of
the number of dimensions d.Comment: 15 pages, 3 algorithm
Finding Even Subgraphs Even Faster
Problems of the following kind have been the focus of much recent research in
the realm of parameterized complexity: Given an input graph (digraph) on
vertices and a positive integer parameter , find if there exist edges
(arcs) whose deletion results in a graph that satisfies some specified parity
constraints. In particular, when the objective is to obtain a connected graph
in which all the vertices have even degrees---where the resulting graph is
\emph{Eulerian}---the problem is called Undirected Eulerian Edge Deletion. The
corresponding problem in digraphs where the resulting graph should be strongly
connected and every vertex should have the same in-degree as its out-degree is
called Directed Eulerian Edge Deletion. Cygan et al. [\emph{Algorithmica,
2014}] showed that these problems are fixed parameter tractable (FPT), and gave
algorithms with the running time . They also asked, as
an open problem, whether there exist FPT algorithms which solve these problems
in time . In this paper we answer their question in the
affirmative: using the technique of computing \emph{representative families of
co-graphic matroids} we design algorithms which solve these problems in time
. The crucial insight we bring to these problems is to view
the solution as an independent set of a co-graphic matroid. We believe that
this view-point/approach will be useful in other problems where one of the
constraints that need to be satisfied is that of connectivity
Hitting forbidden minors: Approximation and Kernelization
We study a general class of problems called F-deletion problems. In an
F-deletion problem, we are asked whether a subset of at most vertices can
be deleted from a graph such that the resulting graph does not contain as a
minor any graph from the family F of forbidden minors.
We obtain a number of algorithmic results on the F-deletion problem when F
contains a planar graph. We give (1) a linear vertex kernel on graphs excluding
-claw , the star with leves, as an induced subgraph, where
is a fixed integer. (2) an approximation algorithm achieving an approximation
ratio of , where is the size of an optimal solution on
general undirected graphs. Finally, we obtain polynomial kernels for the case
when F contains graph as a minor for a fixed integer . The graph
consists of two vertices connected by parallel edges. Even
though this may appear to be a very restricted class of problems it already
encompasses well-studied problems such as {\sc Vertex Cover}, {\sc Feedback
Vertex Set} and Diamond Hitting Set. The generic kernelization algorithm is
based on a non-trivial application of protrusion techniques, previously used
only for problems on topological graph classes
Business Merchant Data Consolidator
A consolidated view of the account data of a merchant is provided. Whenever a transaction occurs, the merchant has to collect each payment through the merchant terminal. Further, existing systems do not provide option to view the receivable accounts and reconciliation view of the transactions. For this purpose, a unique identity is provided to the merchant. In every transaction the unique identity is attached to the invoice made by the merchant. This provides a consolidated notification from a platform to the merchants instead of sending multiple notifications. Further, the merchant can have a consolidated view of the receivables either in all locations or for a specific location. By providing the unique identity the merchant receives the direct credit of payment instead of collecting each payment through terminal
A Descriptive Study on Digital Innovations and Technologies in Libraries
Libraries are social institutions that adopt new innovations for enhancing service and quality. This paper is about the descriptive study of three major technologies such as Artificial Intelligence, Big Data, BlockChain and their application in libraries and information centers. This paper also investigates, Libtech, an innovative open platform in Iran by merging these technologies. The adoption of new technologies will help the libraries to be up to date in quality and it also improves the user experience
- …