https://arxiv.org/api/KftQyzCxNzU4YKHCsG0ilHxnBP42026-03-28T11:17:13Z282733015http://arxiv.org/abs/2603.18582v2Breaking Hard Isomorphism Benchmarks with DRESS2026-03-24T20:18:58ZDRESS is a deterministic, parameter-free framework for structural graph refinement that iteratively refines the structural similarity of edges in a graph to produce a canonical fingerprint: a real-valued edge vector, obtained by converging a nonlinear dynamical system to its unique fixed point. $Δ$-DRESS is a member of the DRESS family of graph fingerprints that applies a single level of vertex deletion. We test it on a benchmark of 51,813 distinct graphs across 34 hard families, including the complete Spence collection of strongly regular graphs (43,703 SRGs, 12 families), four additional SRG families (8,015 graphs), and 18 classical hard constructions (102 family entries corresponding to 99 distinct graphs). $Δ$-DRESS produces unique fingerprints in 33 of 34 benchmark families at $k=1$, resolving all but one within-family collision among over 576 million non-isomorphic pairs. One genuine collision exists at deletion depth $k=1$, between two vertex-transitive SRGs in SRG(40,12,2,4), which is resolved by a single-step fallback to $Δ^2$-DRESS. For every family with pairwise-comparable full sorted-multiset fingerprints, the minimum observed separation margin remains at least $137 \times ε$, confirming that the reported separations are numerically robust and not artifacts of the convergence threshold. We also show that $Δ$-DRESS separates the Rook $L_2(4)$/Shrikhande pair, proving it escapes the theoretical boundary of 3-WL. The method runs in $\mathcal{O}(n \cdot I \cdot m \cdot d_{\max})$ time per graph.2026-03-19T07:41:16ZEduar Castrillo Velillahttp://arxiv.org/abs/2603.24617v1Multi-LLM Query Optimization2026-03-24T19:51:57ZDeploying multiple large language models (LLMs) in parallel to classify an unknown ground-truth label is a common practice, yet the problem of optimally allocating queries across heterogeneous models remains poorly understood. In this paper, we formulate a robust, offline query-planning problem that minimizes total query cost subject to statewise error constraints which guarantee reliability for every possible ground-truth label. We first establish that this problem is NP-hard via a reduction from the minimum-weight set cover problem. To overcome this intractability, we develop a surrogate by combining a union bound decomposition of the multi-class error into pairwise comparisons with Chernoff-type concentration bounds. The resulting surrogate admits a closed-form, multiplicatively separable expression in the query counts and is guaranteed to be feasibility-preserving. We further show that the surrogate is asymptotically tight at the optimization level: the ratio of surrogate-optimal cost to true optimal cost converges to one as error tolerances shrink, with an explicit rate of $O\left(\log\log(1/α_{\min}) / \log(1/α_{\min})\right)$. Finally, we design an asymptotic fully polynomial-time approximation scheme (AFPTAS) that returns a surrogate-feasible query plan within a $(1+\varepsilon)$ factor of the surrogate optimum.2026-03-24T19:51:57ZArlen DeanZijin ZhangStefanus JasinYuqing Liuhttp://arxiv.org/abs/2411.16149v2Directed Token Sliding2026-03-24T18:03:21ZReconfiguration problems involve determining whether two given configurations can be transformed into each other under specific rules. The Token Sliding problem asks whether, given two different set of tokens on vertices of a graph $G$, we can transform one into the other by sliding tokens step-by-step along edges of $G$ such that each resulting set of tokens forms an independent set in $G$. Recently, Ito et al. [MFCS 2022] introduced a directed variant of this problem. They showed that for general oriented graphs (i.e., graphs where no pair of vertices can have directed edges in both directions), the problem remains $\mathsf{PSPACE}$-complete, and is solvable in polynomial time on oriented trees.
In this paper, we further investigate the Token Sliding problem on various oriented graph classes. We show that the problem remains $\mathsf{PSPACE}$-complete for oriented split graphs, bipartite graphs and bounded treewidth graphs. Additionally, we present polynomial-time algorithms for solving the problem on oriented cycles and cographs.2024-11-25T07:19:06Zv2: revision of v1, remove incorrect proof on oriented planar graphsNiranka BanerjeeChristian EngelsDuc A. Hoanghttp://arxiv.org/abs/2603.23490v1Dynamic Light Spanners in Doubling Metrics2026-03-24T17:56:12ZA $t$-spanner of a point set $X$ in a metric space $(\mathcal{X}, δ)$ is a graph $G$ with vertex set $P$ such that, for any pair of points $u,v \in X$, the distance between $u$ and $v$ in $G$ is at most $t$ times $δ(u,v)$. We study the problem of maintaining a spanner for a dynamic point set $X$ -- that is, when $X$ undergoes a sequence of insertions and deletions -- in a metric space of constant doubling dimension. For any constant $\varepsilon>0$, we maintain a $(1+\varepsilon)$-spanner of $P$ whose total weight remains within a constant factor of the weight of the minimum spanning tree of $X$. Each update (insertion or deletion) can be performed in $\operatorname{poly}(\log Φ)$ time, where $Φ$ denotes the aspect ratio of $X$. Prior to our work, no efficient dynamic algorithm for maintaining a light-weight spanner was known even for point sets in low-dimensional Euclidean space.2026-03-24T17:56:12ZSujoy BhoreJonathan ConroyArnold Filtserhttp://arxiv.org/abs/2512.10848v2The Localization Method for High-Dimensional Inequalities2026-03-24T15:58:00ZWe survey the localization method for proving inequalities in high dimension, pioneered by Lovász and Simonovits (1993), and its stochastic extension developed by Eldan (2012). The method has found applications in a surprising wide variety of settings, ranging from its original motivation in isoperimetric inequalities to optimization, concentration of measure, and bounding the mixing rate of Markov chains. At heart, the method converts a given instance of an inequality (for a set or distribution in high dimension) into a highly structured instance, often just one-dimensional.2025-12-11T17:34:34Zv2: Add more details on the classical method. Include the thin-shell proof in arXiv:2507.15495Yunbum KookSantosh S. Vempalahttp://arxiv.org/abs/2603.23348v1Dynamic k-center clustering with lifetimes2026-03-24T15:44:32ZThe $k$-center problem is a fundamental clustering variant with applications in learning systems and data summarization. In several real-world scenarios, the dataset to be clustered is not static, but evolves over time, as new data points arrive and old ones become stale. To account for dynamicity, the $k$-center problem has been mainly studied under the sliding window setting, where only the $N$ most recent points are considered non-stale, or the fully dynamic setting, where arbitrary sequences of point arrivals and deletions without prior notice may occur. In this paper, we introduce the dynamic setting with lifetimes, which bridges the two aforementioned classical settings by still allowing arbitrary arrivals and deletions, but making the deletion time of each point known upon its arrival. Under this new setting, we devise a deterministic $(2+\varepsilon)$-approximation algorithm with $\tilde{O}(k/\varepsilon)$ amortized update time and memory usage linear in the number of currently active points. Moreover, we develop a deterministic $(6+\varepsilon)$-approximation algorithm that, under tame update sequences, has $\tilde{O}(k/\varepsilon)$ worst-case update time and heavily sublinear working memory.2026-03-24T15:44:32ZSimone MorettiPaolo PellizzoniAndrea PietracaprinaGeppino Puccihttp://arxiv.org/abs/2409.07719v3Static Pricing for Single Sample Multi-unit Prophet Inequalities2026-03-24T13:06:15ZIn this paper, we study $k$-unit single sample prophet inequalities. A seller has $k$ identical, indivisible items to sell. A sequence of buyers arrive one-by-one, with each buyer's private value for the item, $X_i$, revealed to the seller when they arrive. While the seller is unaware of the distribution from which $X_i$ is drawn, they have access to a single sample, $Y_i$ drawn from the same distribution as $X_i$. What strategies can the seller adopt for selling items so as to maximize social welfare?
Previous work has demonstrated that when $k = 1$, if the seller sets a price equal to the maximum of the samples, they can achieve a competitive ratio of $\frac{1}{2}$ of the social welfare, and recently Pashkovich and Sayutina established an analogous result for $k = 2$. In this paper, we prove that for $k \geq 3$, setting a (static) price equal to the $k^{\text{th}}$ largest sample also obtains a competitive ratio of $\frac{1}{2}$, resolving a conjecture Pashkovich and Sayutina pose.
We also consider the situation where $k$ is large. We demonstrate that setting a price equal to the $(k-\sqrt{2k\log k})^{\text{th}}$ largest sample obtains a competitive ratio of $1 - \sqrt{\frac{2\log k}{k}} - o\left(\sqrt{\frac{\log k}{k}}\right)$, and that this is the optimal possible ratio achievable with a static pricing scheme with access to a single sample. This should be compared against a competitive ratio $1 - \sqrt{\frac{\log k}{k}} - o\left(\sqrt{\frac{\log k}{k}}\right)$, which is the optimal possible ratio achievable with a static pricing scheme with knowledge of the distributions of the values.2024-09-12T02:59:35ZMinor error in proof of Lemma 2 correctedPranav NutiPeter Westbrookhttp://arxiv.org/abs/2304.04699v2Efficient Distributed Decomposition and Routing Algorithms in Minor-Free Networks and Their Applications2026-03-24T12:32:44ZIn the LOCAL model, low-diameter decomposition is a useful tool in designing algorithms, as it allows us to shift from the general graph setting to the low-diameter graph setting, where brute-force information gathering can be done efficiently. Recently, Chang and Su [PODC 2022] showed that any high-conductance network excluding a fixed minor contains a high-degree vertex, so the entire graph topology can be gathered to one vertex efficiently in the CONGEST model using expander routing. Therefore, in networks excluding a fixed minor, many problems that can be solved efficiently in LOCAL via low-diameter decomposition can also be solved efficiently in CONGEST via expander decomposition.
In this work, we show improved decomposition and routing algorithms for networks excluding a fixed minor in the CONGEST model. Our algorithms cost $\text{poly}(\log n, 1/ε)$ rounds deterministically. For bounded-degree graphs, our algorithms finish in $O(ε^{-1}\log n) + ε^{-O(1)}$ rounds.
Our algorithms have a wide range of applications, including the following results in CONGEST.
1. A $(1-ε)$-approximate maximum independent set in a network excluding a fixed minor can be computed deterministically in $O(ε^{-1}\log^\ast n) + ε^{-O(1)}$ rounds, nearly matching the $Ω(ε^{-1}\log^\ast n)$ lower bound of Lenzen and Wattenhofer [DISC 2008].
2. Property testing of any additive minor-closed property can be done deterministically in $O(\log n)$ rounds if $ε$ is a constant or $O(ε^{-1}\log n) + ε^{-O(1)}$ rounds if the maximum degree $Δ$ is a constant, nearly matching the $Ω(ε^{-1}\log n)$ lower bound of Levi, Medina, and Ron [PODC 2018].2023-04-10T16:36:16ZYi-Jun Changhttp://arxiv.org/abs/2408.14216v6Multi-variable Quantification of BDDs in External Memory using Nested Sweeping (Extended Paper)2026-03-24T12:22:19ZPrevious research on the Adiar BDD package has been successful at designing algorithms capable of handling large Binary Decision Diagrams (BDDs) stored in external memory. To do so, it uses consecutive sweeps through the BDDs to resolve computations. Yet, this approach has kept algorithms for multi-variable quantification, the relational product, and variable reordering out of its scope.
In this work, we address this by introducing the nested sweeping framework. Here, multiple concurrent sweeps pass information between eachother to compute the result. We have implemented the framework in Adiar and used it to create a new external memory multi-variable quantification algorithm. Compared to conventional depth-first implementations, Adiar with nested sweeping is able to solve more instances of our benchmarks and/or solve them faster.2024-08-26T12:19:29Z30 pages, 16 figures, 2 tablesSteffan Christ SølvstenJaco van de Polhttp://arxiv.org/abs/2603.23119v1Compressing Dynamic Fully Indexable Dictionaries in Word-RAM2026-03-24T12:17:11ZWe study the problem of constructing a dynamic fully indexable dictionary (FID) in the Word-RAM model using space close to the information-theoretic lower bound. A FID is a data-structure that encodes a bit-vector $B$ of length $u$ and answers, for $b\in\{0,1\}$, $\texttt{rank}_b(B, x)=|{\{y\leq x~|~B[y]=b\}}|$ and $\texttt{select}_b(B, r)=\min\{0\leq x<u~|~\texttt{rank}_b(B, x)=r\}$ ($-1$ if empty). A dynamic FID supports updates that modify a single bit of $B$, i.e., $B[i]\gets b$.
We work in the Word-RAM model with $w$-bit words, assuming $w\geq \operatorname{lg} u$. Integer multiplication takes $\mathcal{O}(1)$ time. Our memory model is $\mathcal{M}_B$, allowing access to a fixed precomputed table of $τ=\operatorname{polylog}(w)$ words, which can be computed in $\mathcal{O}(wτ)$ time.
In this paper, we show a dynamic FID based on the famous fusion-tree data-structure of P{ă}tra{ş}cu and Thorup [FOCS 2014], modified to use fewer bits and to support $\texttt{select}_0$. Let $n$ denote the number of ones in $B$. We describe a parametric construction: for every $ε\leq 1/2$, there is a dynamic FID using $$\operatorname{lg}\binom{u}{n}+\mathcal{O}(nw^ε/ε)\text{ bits}$$ taking $\mathcal{O}({1/ε+\log_w(n)})$ time for $\texttt{rank}_0/\texttt{rank}_1/\texttt{select}_0$ and updates, and $\mathcal{O}({\log_w(n)})$ time for $\texttt{select}_1$. All time bounds are worst-case. For $ε={1/\sqrt{\operatorname{lg} w}}$, we reduce the space to $\operatorname{lg}\binom{u}{n}+\mathcal{O}(n\log w)$ bits. For $ε=Θ(1)$, the running time matches the lower bound of Fredman and Saks [STOC 1989]. This is the first deterministic dynamic FID in the standard Word-RAM model that achieves $o(n\sqrt{w})$ bits of redundancy in $\mathcal{M}_B$ (e.g., $ε=1/4$), and optimal worst-case time.2026-03-24T12:17:11Z25 pages; To appear at STOC'26Gabriel Marques Domingueshttp://arxiv.org/abs/2104.12101v8Efficient Binary Decision Diagram Manipulation in External Memory2026-03-24T12:15:57ZWe follow up on the idea of Lars Arge to rephrase the Reduce and Apply procedures of Binary Decision Diagrams (BDDs) as iterative I/O-efficient algorithms. We identify multiple avenues to simplify and improve the performance of his proposed algorithms. Furthermore, we extend the technique to other common BDD operations, many of which are not derivable using Apply operations alone, and we provide asymptotic improvements for the procedures that can be derived using Apply.
These algorithms are implemented in a new BDD package, named Adiar. We see very promising results when comparing the performance of Adiar with conventional BDD packages that use recursive depth-first algorithms. For instances larger than 8.2 GiB, our algorithms, in parts using the disk, are 1.47 to 3.69 times slower compared to CUDD and Sylvan, exclusively using main memory. Yet, our proposed techniques are able to obtain this performance at a fraction of the main memory needed by conventional BDD packages to function. Furthermore, with Adiar we are able to manipulate BDDs that outgrow main memory and so surpass the limits of other BDD packages.2021-04-25T08:34:03Z41 pages, 14 figures and 7 tables; Sølvsten, S.C. et al. (2022). Adiar: Binary Decision Diagrams in External Memory. In: Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2022)Steffan Christ SølvstenJaco van de PolAnna Blume JakobsenMathias Weller Berg Thomasen10.1007/978-3-030-99527-0_16http://arxiv.org/abs/2602.00657v2Non-Clashing Teaching in Graphs: Algorithms, Complexity, and Bounds2026-03-24T11:37:25ZKirkpatrick et al. [ALT 2019] and Fallat et al. [JMLR 2023] introduced non-clashing teaching and proved that it is the most efficient batch machine teaching model satisfying the collusion-avoidance benchmark established in the seminal work of Goldman and Mathias [COLT 1993]. Recently, (positive) non-clashing teaching was thoroughly studied for balls in graphs, yielding numerous algorithmic and combinatorial results. In particular, Chalopin et al. [COLT 2024] and Ganian et al. [ICLR 2025] gave an almost complete picture of the complexity landscape of the positive variant, showing that it is tractable only for restricted graph classes due to the non-trivial nature of the problem and concept class.
In this work, we consider (positive) non-clashing teaching for closed neighborhoods in graphs. This concept class is not only extensively studied in various related contexts, but it also exhibits broad generality, as any finite binary concept class can be equivalently represented by a set of closed neighborhoods in a graph. In comparison to the works on balls in graphs, we provide improved algorithmic results, notably including FPT algorithms for more general classes of parameters, and we complement these results by deriving stronger lower bounds. Lastly, we obtain combinatorial upper bounds for wider classes of graphs.2026-01-31T11:07:30ZAn extended abstract of this paper will appear in the proceedings of ICLR 2026Sujoy BhoreLiana KhazaliyaFionn Mc Inerneyhttp://arxiv.org/abs/2603.23031v1Accelerating Maximum Common Subgraph Computation by Exploiting Symmetries2026-03-24T10:10:27ZThe Maximum Common Subgraph (MCS) problem plays a key role in many applications, including cheminformatics, bioinformatics, and pattern recognition, where it is used to identify the largest shared substructure between two graphs. Although symmetry exploitation is a powerful means of reducing search space in combinatorial optimization, its potential in MCS algorithms has remained largely underexplored due to the challenges of detecting and integrating symmetries effectively. Existing approaches, such as RRSplit, partially address symmetry through vertex-equivalence reasoning on the variable graph, but symmetries in the value graph remain unexploited. In this work, we introduce a complete dual-symmetry breaking framework that simultaneously handles symmetries in both variable and value graphs. Our method identifies and exploits modular symmetries based on local neighborhood structures, allowing the algorithm to prune isomorphic subtrees during search while rigorously preserving optimality. Extensive experiments on standard MCS benchmarks show that our approach substantially outperforms the state-of-the-art RRSplit algorithm, solving more instances with significant reductions in both computation time and search space. These results highlight the practical effectiveness of comprehensive symmetry-aware pruning for accelerating exact MCS computation.2026-03-24T10:10:27Z26 pages, 11 figures, 5 tablesProceedings of the ACM on Management of Data, Volume 4, Number 3 (SIGMOD), Article 128. Publication date: June 2026Buddhi KothalawalaHenning KoehlerMuhammad Farhan10.1145/3802005http://arxiv.org/abs/2502.07861v3Streaming Attention Approximation via Discrepancy Theory2026-03-24T10:07:14ZLarge language models (LLMs) have achieved impressive success, but their high memory requirements present challenges for long-context token generation. In this paper we study the streaming complexity of attention approximation, a key computational primitive underlying token generation.
Our main contribution is BalanceKV, a streaming algorithm for $ε$-approximating attention computations based on geometric process for selecting a balanced collection of Key and Value tokens as per Banaszczyk's vector balancing theory. We complement our algorithm with space lower bounds for streaming attention computation. Besides strong theoretical guarantees, BalanceKV exhibits empirically validated performance improvements over existing methods, both for attention approximation and end-to-end performance on various long context benchmarks.2025-02-11T17:18:17ZEkaterina KochetkovaKshiteej ShethInsu HanAmir ZandiehMichael Kapralovhttp://arxiv.org/abs/2603.22909v1Gabow's $O(\sqrt{n}m)$ Maximum Cardinality Matching Algorithm, Revisited2026-03-24T07:58:36ZWe revisit Gabow's $O(\sqrt{n} m)$ maximum cardinality matching algorithm (The Weighted Matching Approach to Maximum Cardinality Matching, Fundamenta Informaticae, 2017). It adapts the weighted matching algorithm of Gabow and Tarjan~\cite{GT91} to maximum cardinality matching. Gabow's algorithm works iteratively. In each iteration, it constructs a maximal number of edge-disjoint shortest augmenting paths with respect to the current matching and augments them. It is well-known that $O(\sqrt{n})$ iterations suffice. Each iteration consists of three parts. In the first part, the length of the shortest augmenting path is computed. In the second part, an auxiliary graph $H$ is constructed with the property that shortest augmenting paths in $G$ correspond to augmenting paths in $H$. In the third part, a maximal set of edge-disjoint augmenting paths in $H$ is determined, and the paths are lifted to and augmented to $G$. We give a new algorithm for the first part. Gabow's algorithm for the first part is derived from Edmonds' primal-dual algorithm for weighted matching. We believe that our approach is more direct and will be easier to teach. We have implemented the algorithm; the implementation is available at the companion webpage (https://people.mpi-inf.mpg.de/~mehlhorn/CompanionPageGenMatchingImplementation.html).2026-03-24T07:58:36ZKurt MehlhornRomina Nobahari