132 research outputs found

    An EPTAS for Scheduling on Unrelated Machines of Few Different Types

    Full text link
    In the classical problem of scheduling on unrelated parallel machines, a set of jobs has to be assigned to a set of machines. The jobs have a processing time depending on the machine and the goal is to minimize the makespan, that is the maximum machine load. It is well known that this problem is NP-hard and does not allow polynomial time approximation algorithms with approximation guarantees smaller than 1.51.5 unless P==NP. We consider the case that there are only a constant number KK of machine types. Two machines have the same type if all jobs have the same processing time for them. This variant of the problem is strongly NP-hard already for K=1K=1. We present an efficient polynomial time approximation scheme (EPTAS) for the problem, that is, for any ε>0\varepsilon > 0 an assignment with makespan of length at most (1+ε)(1+\varepsilon) times the optimum can be found in polynomial time in the input length and the exponent is independent of 1/ε1/\varepsilon. In particular we achieve a running time of 2O(Klog(K)1εlog41ε)+poly(I)2^{\mathcal{O}(K\log(K) \frac{1}{\varepsilon}\log^4 \frac{1}{\varepsilon})}+\mathrm{poly}(|I|), where I|I| denotes the input length. Furthermore, we study three other problem variants and present an EPTAS for each of them: The Santa Claus problem, where the minimum machine load has to be maximized; the case of scheduling on unrelated parallel machines with a constant number of uniform types, where machines of the same type behave like uniformly related machines; and the multidimensional vector scheduling variant of the problem where both the dimension and the number of machine types are constant. For the Santa Claus problem we achieve the same running time. The results are achieved, using mixed integer linear programming and rounding techniques

    Arithmetical Congruence Preservation: from Finite to Infinite

    Full text link
    Various problems on integers lead to the class of congruence preserving functions on rings, i.e. functions verifying aba-b divides f(a)f(b)f(a)-f(b) for all a,ba,b. We characterized these classes of functions in terms of sums of rational polynomials (taking only integral values) and the function giving the least common multiple of 1,2,,k1,2,\ldots,k. The tool used to obtain these characterizations is "lifting": if π ⁣:XY\pi\colon X\to Y is a surjective morphism, and ff a function on YY a lifting of ff is a function FF on XX such that πF=fπ\pi\circ F=f\circ\pi. In this paper we relate the finite and infinite notions by proving that the finite case can be lifted to the infinite one. For pp-adic and profinite integers we get similar characterizations via lifting. We also prove that lattices of recognizable subsets of ZZ are stable under inverse image by congruence preserving functions

    Homomorphic encryption and some black box attacks

    Full text link
    This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes, and that homomorphic encryption is an area of research where cryptography and black box algebra may benefit from exchange of ideas

    A Multivariate Approach for Checking Resiliency in Access Control

    Get PDF
    In recent years, several combinatorial problems were introduced in the area of access control. Typically, such problems deal with an authorization policy, seen as a relation URU×RUR \subseteq U \times R, where (u,r)UR(u, r) \in UR means that user uu is authorized to access resource rr. Li, Tripunitara and Wang (2009) introduced the Resiliency Checking Problem (RCP), in which we are given an authorization policy, a subset of resources PRP \subseteq R, as well as integers s0s \ge 0, d1d \ge 1 and t1t \geq 1. It asks whether upon removal of any set of at most ss users, there still exist dd pairwise disjoint sets of at most tt users such that each set has collectively access to all resources in PP. This problem possesses several parameters which appear to take small values in practice. We thus analyze the parameterized complexity of RCP with respect to these parameters, by considering all possible combinations of P,s,d,t|P|, s, d, t. In all but one case, we are able to settle whether the problem is in FPT, XP, W[2]-hard, para-NP-hard or para-coNP-hard. We also consider the restricted case where s=0s=0 for which we determine the complexity for all possible combinations of the parameters

    Polynomial Kernels for Weighted Problems

    Full text link
    Kernelization is a formalization of efficient preprocessing for NP-hard problems using the framework of parameterized complexity. Among open problems in kernelization it has been asked many times whether there are deterministic polynomial kernelizations for Subset Sum and Knapsack when parameterized by the number nn of items. We answer both questions affirmatively by using an algorithm for compressing numbers due to Frank and Tardos (Combinatorica 1987). This result had been first used by Marx and V\'egh (ICALP 2013) in the context of kernelization. We further illustrate its applicability by giving polynomial kernels also for weighted versions of several well-studied parameterized problems. Furthermore, when parameterized by the different item sizes we obtain a polynomial kernelization for Subset Sum and an exponential kernelization for Knapsack. Finally, we also obtain kernelization results for polynomial integer programs

    Parameterized Complexity of Maximum Edge Colorable Subgraph

    Full text link
    A graph HH is {\em pp-edge colorable} if there is a coloring ψ:E(H){1,2,,p}\psi: E(H) \rightarrow \{1,2,\dots,p\}, such that for distinct uv,vwE(H)uv, vw \in E(H), we have ψ(uv)ψ(vw)\psi(uv) \neq \psi(vw). The {\sc Maximum Edge-Colorable Subgraph} problem takes as input a graph GG and integers ll and pp, and the objective is to find a subgraph HH of GG and a pp-edge-coloring of HH, such that E(H)l|E(H)| \geq l. We study the above problem from the viewpoint of Parameterized Complexity. We obtain \FPT\ algorithms when parameterized by: (1)(1) the vertex cover number of GG, by using {\sc Integer Linear Programming}, and (2)(2) ll, a randomized algorithm via a reduction to \textsc{Rainbow Matching}, and a deterministic algorithm by using color coding, and divide and color. With respect to the parameters p+kp+k, where kk is one of the following: (1)(1) the solution size, ll, (2)(2) the vertex cover number of GG, and (3)(3) l - {\mm}(G), where {\mm}(G) is the size of a maximum matching in GG; we show that the (decision version of the) problem admits a kernel with O(kp)\mathcal{O}(k \cdot p) vertices. Furthermore, we show that there is no kernel of size O(k1ϵf(p))\mathcal{O}(k^{1-\epsilon} \cdot f(p)), for any ϵ>0\epsilon > 0 and computable function ff, unless \NP \subseteq \CONPpoly

    Slide reduction, revisited—filling the gaps in svp approximation

    Get PDF
    We show how to generalize Gama and Nguyen's slide reduction algorithm [STOC '08] for solving the approximate Shortest Vector Problem over lattices (SVP). As a result, we show the fastest provably correct algorithm for δ\delta-approximate SVP for all approximation factors n1/2+εδnO(1)n^{1/2+\varepsilon} \leq \delta \leq n^{O(1)}. This is the range of approximation factors most relevant for cryptography

    Online Algorithms on Antipowers and Antiperiods

    Get PDF
    The definition of antipower introduced by Fici et al. (ICALP 2016) captures the notion of being the opposite of a power: a sequence of k pairwise distinct blocks of the same length. Recently, Alamro et al. (CPM 2019) defined a string to have an antiperiod if it is a prefix of an antipower, and gave complexity bounds for the offline computation of the minimum antiperiod and all the antiperiods of a word. In this paper, we address the same problems in the online setting. Our solutions rely on new arrays that compactly and incrementally store antiperiods and antipowers as the word grows, obtaining in the process this information for all the word’s prefixes. We show how to compute those arrays online in O(n log n) space, O(n log n) time, and o(n^epsilon) delay per character, for any constant epsilon > 0. Running times are worst-case and hold with high probability. We also discuss more space-efficient solutions returning the correct result with high probability, and small data structures to support random access to those arrays
    corecore