https://arxiv.org/api/o7mKFi5GArbhDYhIutUM+H5zk/c 2026-03-24T09:44:24Z 15384 90 15 http://arxiv.org/abs/2309.04346v2 On the Polynomial Kernelizations of Finding a Shortest Path with Positive Disjunctive Constraints 2026-03-05T16:27:15Z We study the SHORTEST PATH problem with positive disjunctive constraints from the perspective of parameterized complexity. For positive disjunctive constraints, there are certain pair of edges such that any feasible solution must contain at least one edge from every such pair. In this paper, we initiate the study of SHORTEST PATH problem subject to some positive disjunctive constraints the classical version is known to be NP-Complete. Formally, given an undirected graph G = (V, E) with a forcing graph H = (E, F) such that the vertex set of H is same as the edge set of G. The goal is to find a set S of at most k edges from G such that S forms a vertex cover in H and there is a path from s to t in the subgraph of G induced by the edge set S. In this paper, we consider two natural parameterizations for this problem. One natural parameter is the solution size, i.e. k for which we provide a kernel with O(k^5) vertices when both G and H are general graphs. Additionally, when either G or H (but not both) belongs to some special graph classes, we provied kernelization results with O(k^3) vertices . The other natural parameter we consider is structural properties of H, i.e. the size of a vertex deletion set of H to some special graph classes. We provide some fixed-parameter tractability results for those structural parameterizations. 2023-09-08T14:16:53Z Accepted to Information and Computation, 18 pages Susobhan Bandopadhyay Suman Banerjee Diptapriyo Majumdar Fahad Panolan http://arxiv.org/abs/2512.07618v2 Approximation Algorithms for the $b$-Matching and List-Restricted Variants of MaxQAP 2026-03-05T15:22:25Z We study approximation algorithms for two natural generalizations of the Maximum Quadratic Assignment Problem (MaxQAP). In the Maximum List-Restricted Quadratic Assignment Problem, each node in one partite set may only be matched to nodes from a prescribed list. For instances on $n$ nodes where every list has size at least $n - k$, we design a randomized $O(\sqrt{n}+k)$-approximation algorithm based on the linear-programming relaxation and randomized rounding framework of Makarychev, Manokaran, and Sviridenko. In the Maximum Quadratic $b$-Matching Assignment Problem, we seek a $b$-matching that maximizes the MaxQAP objective. We refine the standard MaxQAP relaxation and combine randomized rounding over $b$ independent iterations with a polynomial-time algorithm for maximum-weight $b$-matching problem to obtain an $O(\sqrt{bn})$-approximation. When $b$ is constant and all lists have size $n - O(\sqrt{n})$, our guarantees asymptotically match the best known approximation factor for MaxQAP, yielding the first approximation algorithms for these two variants. 2025-12-08T15:06:28Z 24 pages Jiratchaphat Nanta Vorapong Suppakitpaisarn Piyashat Sripratak http://arxiv.org/abs/2603.05253v1 Algebraic Characterization of Reversible First Degree Cellular Automata over $\mathbb{Z}_d$ 2026-03-05T15:06:33Z There exists algorithms to detect reversibility of cellular automaton (CA) for both finite and infinite lattices taking quadratic time. But, can we identify a $d$-state CA rule in constant time that is always reversible for every lattice size $n\in \mathbb{N}$? To address this issue, this paper explores the reversibility properties of a subset of one-dimensional, $3$-neighborhood, $d$-state finite cellular automata (CAs), known as the first degree cellular automata (FDCAs) for any number of cells $(n\in \mathbb{N})$ under the null boundary condition. {In a first degree cellular automaton (FDCA), the local rule is defined using eight parameters. To ensure that the global transition function of $d$-state FDCA is reversible for any number of cells $(n\in \mathbb{N})$, it is necessary and sufficient to verify only three algebraic conditions among the parameter values. Based on these conditions, for any given $d$, one can synthesize all reversible FDCAs rules. Similarly, given a FDCA rule, one can check these conditions to decide its reversibility in constant time. 2026-03-05T15:06:33Z Baby C. J. Kamalika Bhattacharjee http://arxiv.org/abs/2603.05205v1 Structural Properties of Shortest Flip Sequences Between Plane Spanning Trees 2026-03-05T14:16:16Z We study the reconfiguration of plane spanning trees on point sets in the plane in convex position, where a reconfiguration step (flip) replaces one edge with another, yielding again a plane spanning tree. The flip distance between two trees is then the minimum number of flips needed to transform one tree into the other. We study structural properties of shortest flip sequences. The folklore happy edge conjecture suggests that any edge shared by both the initial and target tree is never flipped in a shortest flip sequence. The more recent parking edge conjecture, which would have implied the happy edge conjecture, states that there exist shortest flip sequences which use only edges of the start and target tree, and edges in the convex hull of the point set. Finally, another conjecture that is implicit in the literature is the reparking conjecture which states that no edge is flipped more than twice. Essentially all recent flip algorithms respect these three conjectures and the properties they imply. We study cases in which the latter two conjectures hold and disprove them for the general setting. (Shortened abstract due to arXiv restrictions.) 2026-03-05T14:16:16Z 28 pages, 16 figures Oswin Aichholzer Joseph Dorfer Peter Kramer Christian Rieck Birgit Vogtenhuber http://arxiv.org/abs/2603.05100v1 Minimal toughness in subclasses of weakly chordal graphs 2026-03-05T12:12:40Z The toughness of a graph $G$ is defined as the largest real number $t$ such that for any set $S\subseteq V(G)$ such that $G-S$ is disconnected, $S$ has at least $t$ times more elements than $G-S$ has components (unless $G$ is complete, in which case the toughness is defined to be infinite). A graph is said to be minimally tough if deleting any edge decreases the toughness. It is an open question whether there exists a minimally tough non-complete chordal graph with toughness exceeding $1$. We initiate the study of minimally tough graphs in the larger class of weakly chordal graphs. We obtain complete classifications of minimally tough graphs in the following subclasses of weakly chordal graphs: co-chordal graphs whose complement has diameter at least $3$, net-free co-chordal graphs, complements of forests, $P_4$-free graphs, and complete multipartite graphs. Our approach leads to simple proofs of two results on minimally tough graphs due to Dallard, Fernández, Katona, Milanič, and Varga. 2026-03-05T12:12:40Z 25 pages, 1 figure J. Pascal Gollin Martin Milanič Laura Ogrin http://arxiv.org/abs/2603.05007v1 Positional s-of-k games 2026-03-05T09:54:24Z We introduce a general framework for positional games in which players score points by claiming a prescribed portion of each winning set, extending the notion of scoring Maker-Breaker games. In the scoring variant, Maker gains a point by fully claiming a winning set, while Breaker aims to minimize Maker's total score. In this paper, we generalize these models for all k-uniform positional games by fixing an integer threshold s in {1,2,..., k} so that a player scores a point whenever she claims at least s elements of a winning set of size k. We refer to this class as s-of-k games. Such formulation allows for a flexible description of scoring objectives that appear in both theoretical models and real-life board games. We further investigate the impact of strategy restrictions on the achievable score. In particular, we analyze s-of-k games both under optimal play, where the score is denoted by SC, and under the additional constraint that Maker is restricted to a pairing strategy. The corresponding score in this setting is denoted by SC_2. While the unrestricted score captures the standard notion of optimal play in scoring positional games, the pairing-restricted score allows us to observe Maker's loss incurred by limiting her to these standard strategies. We comprehensively study s-of-k games played on regular grids, which provide a natural and uniform setting for illustrating the general framework. After developing several general tools for the analysis of both scores, we complement them by a number of ad-hoc strategies tailored for particular cases of these games, to obtain both upper and lower bounds for the two scores on triangular, square, rhombus and hexagonal grids. 2026-03-05T09:54:24Z 22 pages, 21 figures Eric Duchêne Valentin Gledel Miloš Stojaković http://arxiv.org/abs/2602.22110v2 Robust Permutation Flowshops Under Budgeted Uncertainty 2026-03-05T09:02:23Z We consider the robust permutation flowshop problem under the budgeted uncertainty model, where at most a given number of job processing times may deviate on each machine. We show that solutions for this problem can be determined by solving polynomially many instances of the corresponding nominal problem. As a direct consequence, our result implies that this robust flowshop problem can be solved in polynomial time for two machines, and can be approximated in polynomial time for any fixed number of machines. The reduction that is our main result follows from an analysis similar to Bertsimas and Sim (2003) except that dualization is applied to the terms of a min-max objective rather than to a linear objective function. Our result may be surprising considering that heuristic and exact integer programming based methods have been developed in the literature for solving the two-machine flowshop problem. Next, we show a logarithmic factor improvement in the overall running time implied by a naive reduction to nominal problems in the case of two machines and three machines. We conclude by noting that our reduction appears to have more general consequences for robust optimization problems under budgeted uncertainty having a similar form. 2026-02-25T16:57:43Z Noam Goldberg Danny Hermelin Dvir Shabtay http://arxiv.org/abs/2508.07125v2 Block encoding the 3D heterogeneous Poisson equation with application to fracture flow 2026-03-05T07:32:58Z Quantum linear system (QLS) algorithms offer the potential to solve large-scale linear systems exponentially faster than classical methods. However, applying QLS algorithms to real-world problems remains challenging due to issues such as state preparation, data loading, and efficient information extraction. In this work, we study the feasibility of applying QLS algorithms to solve discretized three-dimensional heterogeneous Poisson equations, with specific examples relating to groundwater flow through geologic fracture networks. We explicitly construct a block encoding for the 3D heterogeneous Poisson matrix by leveraging the sparse local structure of the discretized operator. While classical solvers benefit from preconditioning, we show that block encoding the system matrix and preconditioner separately does not improve the effective condition number that dominates the QLS runtime. This differs from classical approaches where the preconditioner and the system matrix can often be implemented independently. Nevertheless, due to the structure of the problem in three dimensions, the quantum algorithm achieves a runtime of $O(N^{2/3} \ \text{polylog } N \cdot \log(1/ε))$, outperforming the best classical methods (with runtimes of $O(N \log N \cdot \log(1/ε))$) and offering exponential memory savings. These results highlight both the promise and limitations of QLS algorithms for practical scientific computing, and point to effective condition number reduction as a key barrier in achieving quantum advantages. 2025-08-10T00:17:09Z Austin Pechan John Golden Daniel O'Malley http://arxiv.org/abs/2602.08473v2 Submodular Maximization over a Matroid $k$-Intersection: Multiplicative Improvement over Greedy 2026-03-04T15:50:24Z We study the problem of maximizing a non-negative monotone submodular objective $f$ subject to the intersection of $k$ arbitrary matroid constraints. The natural greedy algorithm guarantees $(k+1)$-approximation for this problem, and the state-of-the-art algorithm only improves this approximation ratio to $k$. We give a $\frac{2k\ln2}{1+\ln2}+O(\sqrt{k})<0.819k+O(\sqrt{k})$ approximation for this problem. Our result is the first multiplicative improvement over the approximation ratio of the greedy algorithm for general $k$. We further show that our algorithm can be used to obtain roughly the same approximation ratio also for the more general problem in which the objective is not guaranteed to be monotone (the sublinear term in the approximation ratio becomes $O(k^{2/3})$ rather than $O(\sqrt{k})$ in this case). All of our results hold also when the $k$-matroid intersection constraint is replaced with a more general matroid $k$-parity constraint. Furthermore, unlike the case in many of the previous works, our algorithms run in time that is independent of $k$ and polynomial in the size of the ground set. Our algorithms are based on a hybrid greedy local search approach recently introduced by Singer and Thiery (STOC 2025) for the weighted matroid $k$-intersection problem, which is a special case of the problem we consider. Leveraging their approach in the submodular setting requires several non-trivial insights and algorithmic modifications since the marginals of a submodular function $f$, which correspond to the weights in the weighted case, are not independent of the algorithm's internal randomness. In the special weighted case studied by Singer and Thiery, our algorithms reduce to a variant of their algorithm with an improved approximation ratio of $(k+1)\ln2<0.694k+0.694$, compared to an approximation ratio of $\frac{k+1}{2\ln2}\approx0.722k+0.722$ guaranteed by Singer and Thiery. 2026-02-09T10:19:45Z 32 pages, 1 figure. This version fixes an error that was found in the previous version. The fix results in a slightly worse guarantee in the linear case Moran Feldman Justin Ward http://arxiv.org/abs/2603.04011v1 Learning Foundations Beneath the Stars 2026-03-04T12:50:53Z Foundations of computer science are a key area in theoretical research, one to which Stefano has made significant contributions, particularly from a logical and proof-theoretic perspective. Recently, we have been involved, with him, in teaching an introductory course on this topic, guided by the idea that understanding and writing ordinary, discursive proofs is a valuable skill for future programmers. This shared experience has inspired the pedagogical approach at the basis of this paper. Behind specific foundational topics in computer science lie core techniques that are best taught through examples. However, standard textbooks often do not place enough emphasis on these ubiquitous techniques and frequently lack examples that are directly relevant to informatics. We believe that highlighting fundamental techniques, rather than focusing solely on specific foundational topics, would offer significant pedagogical benefits for an introductory course. In this paper we propose transitive closure of relations as a case study supporting our approach. While all proofs are elementary, we claim that this is a suitable topic for putting to work paradigmatic notions -- intrinsically tied to computational thinking -- that can serve as structural anchors for a course in the foundations of computer science. In particular, we highlight the techniques employed in proofs, that constitute a comprehensive summary of those that are normally taught in an introductory logic course, and the abstract structures, that allow to connect transitive closure with Kleene star (via quantales) and closure operators (on complete lattices). We then outline a series of further examples that may be used, as in our case study on stars, as a hands-on approach to basic analytic skills to be learned in a course on the foundations of computing. -- To Stefano Berardi on the occasion of his birthday. 2026-03-04T12:50:53Z In Proceedings LTT 2026, arXiv:2603.02912 EPTCS 441, 2026, pp. 83-95 Felice Cardone University of Turin Luca Paolini University of Turin 10.4204/EPTCS.441.5 http://arxiv.org/abs/2602.21315v2 The Instability of all Backoff Protocols 2026-03-03T18:29:11Z In this paper we prove Aldous's conjecture from 1987 that there is no backoff protocol that is stable for any positive arrival rate. The setting is a communication channel for coordinating requests for a shared resource. Each user who wants to access the resource makes a request by sending a message to the channel. The users don't have any way to communicate with each other, except by sending messages to the channel. The operation of the channel proceeds in discrete time steps. If exactly one message is sent to the channel during a time step then this message succeeds (and leaves the system). If multiple messages are sent during a time step then these messages collide. Each of the users that sent these messages therefore waits a random amount of time before re-sending. A backoff protocol is a randomised algorithm for determining how long to wait -- the waiting time is a function of how many collisions a message has had. Specifically, a backoff protocol is described by a send sequence $\overline{p} = (p_0,p_1,p_2,\ldots)$. If a message has had $k$ collisions before a time step then, with probability $p_k$, it sends during that time step, whereas with probability $1-p_k$ it is silent (waiting for later). The most famous backoff protocol is binary exponential backoff, where $p_k = 2^{-k}$. Under Kelly's model, in which the number of new messages that arrive in the system at each time step is given by a Poisson random variable with mean $λ$, Aldous proved that binary exponential backoff is unstable for any positive $λ$. He conjectured that the same is true for any backoff protocol. We prove this conjecture. 2026-02-24T19:36:39Z Leslie Ann Goldberg John Lapinskas http://arxiv.org/abs/2504.11943v2 Dividing sums of cycles in the semiring of functional digraphs 2026-03-03T13:01:53Z Functional digraphs are unlabelled finite digraphs where each vertex has exactly one out-neighbor. They are isomorphic classes of finite discrete-time dynamical systems. Endowed with the direct sum and product, functional digraphs form a semiring with an interesting multiplicative structure. For instance, we do not know if the following division problem can be solved in polynomial time: given two functional digraphs $A$ and $B$, does $A$ divide $B$? That $A$ divides $B$ means that there exists a functional digraph $X$ such that $AX$ is isomorphic to $B$, and many such $X$ can exist. We can thus ask for the number of solutions $X$. In this paper, we focus on the case where $B$ is a sum of cycles (a disjoint union of cycles, corresponding to the limit behavior of finite discrete-time dynamical systems). There is then a naïve sub-exponential algorithm to compute the non-isomorphic solutions $X$, and our main result is an improvement of this algorithm which has the property to be polynomial when $A$ is fixed. It uses a divide-and-conquer technique that should be useful for further developments on the division problem. 2025-04-16T10:22:56Z 25 pages Florian Bridoux Christophe Crespelle Thi Ha Duong Phan Adrien Richard 10.1007/s11047-026-10065-w http://arxiv.org/abs/2402.03092v2 Asynchronous dynamics of isomorphic Boolean networks 2026-03-03T13:00:34Z A Boolean network is a function $f:\{0,1\}^n\to\{0,1\}^n$ from which several dynamics can be derived, depending on the context. The most classical ones are the synchronous and asynchronous dynamics. Both are digraphs on $\{0,1\}^n$, but the synchronous dynamics (which is identified with $f$) has an arc from $x$ to $f(x)$ while the asynchronous dynamics $\mathcal{A}(f)$ has an arc from $x$ to $x+e_i$ whenever $x_i\neq f_i(x)$. Clearly, $f$ and $\mathcal{A}(f)$ share the same information, but what can be said on these objects up to isomorphism? We prove that if $\mathcal{A}(f)$ is only known up to isomorphism then, with high probability, $f$ can be fully reconstructed up to isomorphism. We then show that the converse direction is far from being true. In particular, if $f$ is only known up to isomorphism, very little can be said on the attractors of $\mathcal{A}(f)$. For instance, if $f$ has $p$ fixed points, then $\mathcal{A}(f)$ has at least $\max(1,p)$ attractors, and we prove that this trivial lower bound is tight: there always exists $h\sim f$ such that $\mathcal{A}(h)$ has exactly $\max(1,p)$ attractors. But $\mathcal{A}(f)$ may often have much more attractors since we prove that, with high probability, there exists $h\sim f$ such that $\mathcal{A}(h)$ has $Ω(2^n)$ attractors. 2024-02-05T15:23:44Z 32p Florian Bridoux Aymeric Picard Marchetto Adrien Richard http://arxiv.org/abs/2603.02501v1 Graphs whose Eulerian trails have unique labels 2026-03-03T01:16:21Z Consider an undirected graph whose edges are labeled invertibly in a group. When does every Eulerian trail from one fixed vertex to another have the same label? We give a precise structural answer to this question. Essentially, we show that each ``$3$-connected part'' is labeled over a group which is isomorphic to $\mathbb{Z}_2^k$ for some $k$. We also show that the algorithmic problem admits a polynomial-time reduction to the word problem for the group. 2026-03-03T01:16:21Z 18 pages, 5 figures Donggyu Kim Rose McCarty Caleb McFarland http://arxiv.org/abs/2506.04665v6 An $O(\log \log n)$-approximate budget feasible mechanism for subadditive valuations 2026-03-02T23:06:06Z In budget-feasible mechanism design, there is a set of items $U$, each owned by a distinct seller. The seller of item $e$ incurs a private cost $\overline{c}_e$ for supplying her item. A buyer wishes to procure a set of items from the sellers of maximum value, where the value of a set $S\subseteq U$ of items is given by a valuation function $v:2^U\to \mathbb{R}_+$. The buyer has a budget of $B \in \mathbb{R}_+$ for the total payments made to the sellers. We wish to design a mechanism that is truthful, that is, sellers are incentivized to report their true costs, budget-feasible, that is, the sum of the payments made to the sellers is at most the budget $B$, and that outputs a set whose value is large compared to $\text{OPT}:=\max\{v(S):\overline{c}(S)\le B,S\subseteq U\}$. Budget-feasible mechanism design has been extensively studied, with the literature focussing on (classes of) subadditive valuation functions, and various polytime, budget-feasible mechanisms, achieving constant-factor approximation, have been devised for the special cases of additive, submodular, and XOS valuations. However, for general subadditive valuations, the best-known approximation factor achievable by a polytime budget-feasible mechanism (given access to demand oracles) was only $O(\log n / \log \log n)$, where $n$ is the number of items. We improve this state-of-the-art significantly by designing a randomized budget-feasible mechanism for subadditive valuations that achieves a substantially-improved approximation factor of $O(\log\log n)$ and runs in polynomial time, given access to demand oracles. 2025-06-05T06:21:33Z Rian Neogi Kanstantsin Pashkovich Chaitanya Swamy