Skip to main content

Showing 1–11 of 11 results for author: Jansson, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.19631  [pdf, ps, other

    cs.DS

    Multiplication of 0-1 matrices via clustering

    Authors: Jesper Jansson, Miroslaw Kowaluk, Andrzej Lingas, Mia Persson

    Abstract: We study applications of clustering (in particular the $k$-center clustering problem) in the design of efficient and practical deterministic algorithms for computing an approximate and the exact arithmetic matrix product of two 0-1 rectangular matrices $A$ and $B$ with clustered rows or columns, respectively. Let $λ_A$ and $λ_B$ denote the minimum maximum radius of a cluster in an… ▽ More

    Submitted 23 April, 2025; v1 submitted 25 March, 2025; originally announced March 2025.

    Comments: To appear in LNCS proc. of IJTCS-FAW 2025

    MSC Class: F.2.2 ACM Class: F.2.2

  2. arXiv:2404.06068  [pdf, other

    cs.CG cs.DS

    The Voronoi Diagram of Weakly Smooth Planar Point Sets in $O(\log n)$ Deterministic Rounds on the Congested Clique

    Authors: Jesper Jansson, Christos Levcopoulos, Andrzej Lingas

    Abstract: We study the problem of computing the Voronoi diagram of a set of $n^2$ points with $O(\log n)$-bit coordinates in the Euclidean plane in a substantially sublinear in $n$ number of rounds in the congested clique model with $n$ nodes. Recently, Jansson et al. have shown that if the points are uniformly at random distributed in a unit square then their Voronoi diagram within the square can be comput… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: 12 pages, 3 figures

    MSC Class: F.2.2 ACM Class: F.2.2

  3. arXiv:2305.09987  [pdf, other

    cs.DC

    Convex Hulls, Triangulations, and Voronoi Diagrams of Planar Point Sets on the Congested Clique

    Authors: Jesper Jansson, Christos Levcopoulos, Andrzej Lingas, Valentin Polishchuk

    Abstract: We consider geometric problems on planar $n^2$-point sets in the congested clique model. Initially, each node in the $n$-clique network holds a batch of $n$ distinct points in the Euclidean plane given by $O(\log n)$-bit coordinates. In each round, each node can send a distinct $O(\log n)$-bit message to each other node in the clique and perform unlimited local computations. We show that the conve… ▽ More

    Submitted 25 November, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: 17 pages, 7 figures

    ACM Class: F.2.2

  4. Level-p-complexity of Boolean Functions using Thinning, Memoization, and Polynomials

    Authors: Julia Jansson, Patrik Jansson

    Abstract: This paper describes a purely functional library for computing level-$p$-complexity of Boolean functions, and applies it to two-level iterated majority. Boolean functions are simply functions from $n$ bits to one bit, and they can describe digital circuits, voting systems, etc. An example of a Boolean function is majority, which returns the value that has majority among the $n$ input bits for odd… ▽ More

    Submitted 2 November, 2023; v1 submitted 5 February, 2023; originally announced February 2023.

    Comments: 22 pages, 10 figures

  5. arXiv:2105.12083  [pdf, other

    cs.DC

    Efficient Assignment of Identities in Anonymous Populations

    Authors: Leszek Gasieniec, Jesper Jansson, Christos Levcopoulos, Andrzej Lingas

    Abstract: We consider the fundamental problem of assigning distinct labels to agents in the probabilistic model of population protocols. Our protocols operate under the assumption that the size $n$ of the population is embedded in the transition function. Our labeling protocols are silent w.h.p., i.e., eventually each agent reaches its final state and remains in it forever w.h.p., as well as safe, i.e., nev… ▽ More

    Submitted 19 December, 2021; v1 submitted 25 May, 2021; originally announced May 2021.

    Comments: 29 pages, 1 figure

    MSC Class: F.2.2 ACM Class: F.2.2

  6. arXiv:1909.01776  [pdf, other

    cs.CE

    Technical Report -- Comparison of Direct Finite Element Simulation with Actuator Line Models and Vortex Models for Simulation of Turbulent Flow Past a Vertical Axis wind Turbine

    Authors: Van-Dang Nguyen, Johan Jansson, Anders Goude, Johan Hoffman

    Abstract: We compare three different methodologies for simulation of turbulent flow past a vertical axis wind turbine: (i) full resolution of the turbine blades in a Direct Finite Element Simulation (DFS), (ii) implicit representation of the turbine blades in a 3D Actuator Line Method (ALM), and (iii) implicit representation of the turbine blades as sources in a Vortex Model (VM). The integrated normal forc… ▽ More

    Submitted 30 August, 2019; originally announced September 2019.

  7. arXiv:1908.01719  [pdf, other

    cs.CE physics.comp-ph

    Portable simulation framework for diffusion MRI

    Authors: Van-Dang Nguyen, Massimiliano Leoni, Tamara Dancheva, Johan Jansson, Johan Hoffman, Demian Wassermann, Jing-Rebecca Li

    Abstract: The numerical simulation of the diffusion MRI signal arising from complex tissue micro-structures is helpful for understanding and interpreting imaging data as well as for designing and optimizing MRI sequences. The discretization of the Bloch-Torrey equation by finite elements is a more recently developed approach for this purpose, in contrast to random walk simulations, which has a longer histor… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  8. arXiv:1712.05517  [pdf, ps, other

    cs.DS

    New and Improved Algorithms for Unordered Tree Inclusion

    Authors: Tatsuya Akutsu, Jesper Jansson, Ruiming Li, Atsuhiro Takasu, Takeyuki Tamura

    Abstract: The tree inclusion problem is, given two node-labeled trees $P$ and $T$ (the ``pattern tree'' and the ``target tree''), to locate every minimal subtree in $T$ (if any) that can be obtained by applying a sequence of node insertion operations to $P$. Although the ordered tree inclusion problem is solvable in polynomial time, the unordered tree inclusion problem is NP-hard. The currently fastest algo… ▽ More

    Submitted 14 June, 2021; v1 submitted 14 December, 2017; originally announced December 2017.

    Comments: 22 pages, 9 figures. To appear in Theoretical Computer Science

  9. arXiv:1307.7821  [pdf, other

    cs.DS cs.CE q-bio.QM

    Algorithms for the Majority Rule (+) Consensus Tree and the Frequency Difference Consensus Tree

    Authors: Jesper Jansson, Chuanqi Shen, Wing-Kin Sung

    Abstract: This paper presents two new deterministic algorithms for constructing consensus trees. Given an input of k phylogenetic trees with identical leaf label sets and n leaves each, the first algorithm constructs the majority rule (+) consensus tree in O(kn) time, which is optimal since the input size is Omega(kn), and the second one constructs the frequency difference consensus tree in min(O(kn^2), O(k… ▽ More

    Submitted 6 August, 2013; v1 submitted 30 July, 2013; originally announced July 2013.

    Comments: Peer-reviewed and presented as part of the 13th Workshop on Algorithms in Bioinformatics (WABI2013)

  10. arXiv:1011.1708  [pdf, ps, other

    cs.DS

    CRAM: Compressed Random Access Memory

    Authors: Jesper Jansson, Kunihiko Sadakane, Wing-Kin Sung

    Abstract: We present a new data structure called the \emph{Compressed Random Access Memory} (CRAM) that can store a dynamic string $T$ of characters, e.g., representing the memory of a computer, in compressed form while achieving asymptotically almost-optimal bounds (in terms of empirical entropy) on the compression ratio. It allows short substrings of $T$ to be decompressed and retrieved efficiently and, s… ▽ More

    Submitted 18 February, 2012; v1 submitted 7 November, 2010; originally announced November 2010.

  11. arXiv:0905.1737  [pdf, ps, other

    cs.DM

    More efficient periodic traversal in anonymous undirected graphs

    Authors: J. Czyzowicz, S. Dobrev, L. Gasieniec, D. Ilcinkas, J. Jansson, R. Klasing, I. Lignos, R. Martin, K. Sadakane, W. -K. Sung

    Abstract: We consider the problem of periodic graph exploration in which a mobile entity with constant memory, an agent, has to visit all n nodes of an arbitrary undirected graph G in a periodic manner. Graphs are supposed to be anonymous, that is, nodes are unlabeled. However, while visiting a node, the robot has to distinguish between edges incident to it. For each node v the endpoints of the edges inci… ▽ More

    Submitted 11 May, 2009; originally announced May 2009.