-
Extending Robinson Spaces: Complexity and Algorithmic Solutions for Non-Symmetric Dissimilarity Spaces
Authors:
Francois Brucker,
Pascal Préa,
Christopher Thraves Caro
Abstract:
In this work, we extend the concept of Robinson spaces to asymmetric dissimilarities, enhancing their applicability in representing and analyzing complex data. Within this generalized framework, we introduce two different problems that extend the classical seriation problem: an optimization problem and a decision problem. We establish that these problems are NP-hard and NP-complete, respectively.…
▽ More
In this work, we extend the concept of Robinson spaces to asymmetric dissimilarities, enhancing their applicability in representing and analyzing complex data. Within this generalized framework, we introduce two different problems that extend the classical seriation problem: an optimization problem and a decision problem. We establish that these problems are NP-hard and NP-complete, respectively. Despite this complexity results, we identify several non-trivial instances where these problems can be solved in polynomial time, providing valuable insights into their tractability.
△ Less
Submitted 5 December, 2024;
originally announced December 2024.
-
On the Recognition of Strong-Robinsonian Incomplete Matrices
Authors:
Julio Aracena,
Christopher Thraves Caro
Abstract:
A matrix is incomplete when some of its entries are missing. A Robinson incomplete symmetric matrix is an incomplete symmetric matrix whose non-missing entries do not decrease along rows and columns when moving toward the diagonal. A Strong-Robinson incomplete symmetric matrix is an incomplete symmetric matrix $A$ such that $a_{k,l} \geq a_{i,j}$ if $a_{i,j}$ and $a_{k,l}$ are two non-missing entr…
▽ More
A matrix is incomplete when some of its entries are missing. A Robinson incomplete symmetric matrix is an incomplete symmetric matrix whose non-missing entries do not decrease along rows and columns when moving toward the diagonal. A Strong-Robinson incomplete symmetric matrix is an incomplete symmetric matrix $A$ such that $a_{k,l} \geq a_{i,j}$ if $a_{i,j}$ and $a_{k,l}$ are two non-missing entries of $A$ and $i\leq k \leq l \leq j$. On the other hand, an incomplete symmetric matrix is Strong-Robinsonian if there is a simultaneous reordering of its rows and columns that produces a Strong-Robinson matrix. In this document, we first show that there is an incomplete Robinson matrix which is not Strong-Robinsonian. Therefore, these two definitions are not equivalent. Secondly, we study the recognition problem for Strong-Robinsonian incomplete matrices. It is known that recognition of incomplete Robinsonian matrices is NP-Complete. We show that the recognition of incomplete Strong-Robinsonian matrices is also NP-Complete. However, we show that recognition of Strong-Robinsonian matrices can be parametrized with respect to the number of missing entries. Indeed, we present an $O(|w|^bn^2)$ recognition algorithm for Strong-Robinsonian matrices, where $b$ is the number of missing entries, $n$ is the size of the matrix, and $|w|$ is the number of different values in the matrix.
△ Less
Submitted 8 January, 2021;
originally announced January 2021.
-
The Sitting Closer to Friends than Enemies Problem in Trees
Authors:
Rosa Becerra,
Christopher Thraves Caro
Abstract:
A metric space $\mathcal{T}$ is a \emph{real tree} if for any pair of points $x, y \in \mathcal{T}$ all topological embeddings $σ$ of the segment $[0,1]$ into $\mathcal{T}$, such that $σ(0)=x$ and $σ(1)=y$, have the same image (which is then a geodesic segment from $x$ to $y$). A \emph{signed graph} is a graph where each edge has a positive or negative sign. The \emph{Sitting Closer to Friends tha…
▽ More
A metric space $\mathcal{T}$ is a \emph{real tree} if for any pair of points $x, y \in \mathcal{T}$ all topological embeddings $σ$ of the segment $[0,1]$ into $\mathcal{T}$, such that $σ(0)=x$ and $σ(1)=y$, have the same image (which is then a geodesic segment from $x$ to $y$). A \emph{signed graph} is a graph where each edge has a positive or negative sign. The \emph{Sitting Closer to Friends than Enemies} problem in trees has a signed graph $S$ as an input. The purpose is to determine if there exists an injective mapping (called \emph{valid distance drawing}) from $V(S)$ to the points of a real tree such that, for every $u \in V(S)$, for every positive neighbor $v$ of $u$, and negative neighbor $w$ of $u$, the distance between $v$ and $u$ is smaller than the distance between $w$ and $u$.
In this work, we show that a complete signed graph has a valid distance drawing in a real tree if and only if its subgraph composed of all (and only) its positive edges has an intersection representation by unit balls in a real tree. Besides, as an instrumental result, we show that a graph has an intersection representation by unit balls in a real tree if and only if it has an intersection representation by proper balls, and if and only if it has an intersection representation by arbitrary balls in a real tree.
△ Less
Submitted 5 July, 2021; v1 submitted 26 November, 2019;
originally announced November 2019.
-
System Stability Under Adversarial Injection of Dependent Tasks
Authors:
Vicent Cholvi,
Juan Echagüe,
Antonio Fernández Anta,
Christopher Thraves Caro
Abstract:
In this work, we consider a computational model of a distributed system formed by a set of servers in which jobs, that are continuously arriving, have to be executed. Every job is formed by a set of dependent tasks (i.~e., each task may have to wait for others to be completed before it can be started), each of which has to be executed in one of the servers. The arrival of jobs and their properties…
▽ More
In this work, we consider a computational model of a distributed system formed by a set of servers in which jobs, that are continuously arriving, have to be executed. Every job is formed by a set of dependent tasks (i.~e., each task may have to wait for others to be completed before it can be started), each of which has to be executed in one of the servers. The arrival of jobs and their properties is assumed to be controlled by a bounded adversary, whose only restriction is that it cannot overload any server. This model is a non-trivial generalization of the Adversarial Queuing Theory model of Borodin et al., and, like that model, focuses on the stability of the system: whether the number of jobs pending to be completed is bounded at all times. We show multiple results of stability and instability for this adversarial model under different combinations of the scheduling policy used at the servers, the arrival rate, and the dependence between tasks in the jobs.
△ Less
Submitted 4 October, 2019;
originally announced October 2019.
-
The Weighted Sitting Closer to Friends than Enemies Problem in the Line
Authors:
Julio Aracena,
Christopher Thraves Caro
Abstract:
The weighted \emph{Sitting Closer to Friends than Enemies} (SCFE) problem is to find an injection of the vertex set of a given weighted graph into a given metric space so that, for every pair of incident edges with different weight, the end vertices of the heavier edge are closer than the end vertices of the lighter edge. The \emph{Seriation} problem is to find a simultaneous reordering of the row…
▽ More
The weighted \emph{Sitting Closer to Friends than Enemies} (SCFE) problem is to find an injection of the vertex set of a given weighted graph into a given metric space so that, for every pair of incident edges with different weight, the end vertices of the heavier edge are closer than the end vertices of the lighter edge. The \emph{Seriation} problem is to find a simultaneous reordering of the rows and columns of a symmetric matrix such that the entries are monotone nondecreasing in rows and columns when moving towards the diagonal. If such a reordering exists, it is called a \emph{Robinson} ordering. In this work, we establish a connection between the SCFE problem and the Seriation problem. We show that if the \emph{extended adjacency matrix} of a given weighted graph $G$ has no Robinson ordering then $G$ has no injection in $\mathbb{R}$ that solves the SCFE problem. On the other hand, if the extended adjacency matrix of $G$ has a Robinson ordering, we construct a polyhedron that is not empty if and only if there is an injection of the vertex set of $G$ in $\mathbb{R}$ that solves the SCFE problem. As a consequence of these results, we conclude that deciding the existence of (and constructing) such an injection in $\mathbb{R}$ for a given \emph{complete} weighted graph can be done in polynomial time. On the other hand, we show that deciding if an \emph{incomplete} weighted graph has such an injection in $\mathbb{R}$ is NP-Complete.
△ Less
Submitted 1 March, 2021; v1 submitted 27 June, 2019;
originally announced June 2019.
-
Randomized Rumor Spreading in Ad Hoc Networks with Buffers
Authors:
Dariusz R. Kowalski,
Christopher Thraves Caro
Abstract:
The randomized rumor spreading problem generates a big interest in the area of distributed algorithms due to its simplicity, robustness and wide range of applications. The two most popular communication paradigms used for spreading the rumor are Push and Pull algorithms. The former protocol allows nodes to send the rumor to a randomly selected neighbor at each step, while the latter is based on se…
▽ More
The randomized rumor spreading problem generates a big interest in the area of distributed algorithms due to its simplicity, robustness and wide range of applications. The two most popular communication paradigms used for spreading the rumor are Push and Pull algorithms. The former protocol allows nodes to send the rumor to a randomly selected neighbor at each step, while the latter is based on sending a request and downloading the rumor from a randomly selected neighbor, provided the neighbor has it. Previous analysis of these protocols assumed that every node could process all such push/pull operations within a single step, which could be unrealistic in practical situations. Therefore we propose a new framework for analysis rumor spreading accommodating buffers, in which a node can process only one push/pull message or push request at a time. We develop upper and lower bounds for randomized rumor spreading time in the new framework, and compare the results with analogous in the old framework without buffers.
△ Less
Submitted 31 December, 2018;
originally announced December 2018.