-
On Minimal Transversals of Maximal Cliques in Graphs
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanič,
Dmitry Tikhanovsky,
Yushi Uno
Abstract:
A hypergraph is conformal if it is the family of maximal cliques of a graph. In this paper we are interested in the problem of determining when is the family of minimal transversal of maximal cliques of a graph conformal. Such graphs are called clique dually conformal (CDC for short). As our main results, we completely characterize CDC graphs within the families of triangle-free graphs and split g…
▽ More
A hypergraph is conformal if it is the family of maximal cliques of a graph. In this paper we are interested in the problem of determining when is the family of minimal transversal of maximal cliques of a graph conformal. Such graphs are called clique dually conformal (CDC for short). As our main results, we completely characterize CDC graphs within the families of triangle-free graphs and split graphs. Both characterizations lead to polynomial-time recognition algorithms. We also show that the class of CDC graphs is closed under substitution, in the strong sense that substituting a graph $H$ for a vertex of a graph $G$ results in a CDC graph if and only if both $G$ and $H$ are CDC.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
Computing Remoteness Functions of Moore, Wythoff, and Euclid's games
Authors:
Endre Boros,
Vladimir Gurvich,
Kazuhisa Makino,
Michael Vyalyi
Abstract:
We study remoteness function $\mathcal R$ of impartial games introduced by Smith in 1966. The player who moves from a position $x$ can win if and only if $\mathcal R(x)$ is odd. The odd values of $\mathcal R(x)$ show how soon the winner can win, while even values show how long the loser can resist, provided both players play optimally. This function can be applied to the conjunctive compounds of i…
▽ More
We study remoteness function $\mathcal R$ of impartial games introduced by Smith in 1966. The player who moves from a position $x$ can win if and only if $\mathcal R(x)$ is odd. The odd values of $\mathcal R(x)$ show how soon the winner can win, while even values show how long the loser can resist, provided both players play optimally. This function can be applied to the conjunctive compounds of impartial games, in the same way as the Sprague-Grundy function is applicable to their disjunctive compounds.
We provide polynomial algorithms computing $\mathcal R(x)$ for games Euclid and generalized Wythoff. For Moore's NIM we give a simple explicit formula for $\mathcal R(x)$ if it is even and show that computing it becomes an NP-hard problem for the odd values.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
Conformal Hypergraphs: Duality and Implications for the Upper Clique Transversal Problem
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanič,
Yushi Uno
Abstract:
Given a hypergraph $\mathcal{H}$, the dual hypergraph of $\mathcal{H}$ is the hypergraph of all minimal transversals of $\mathcal{H}$. The dual hypergraph is always Sperner, that is, no hyperedge contains another. A special case of Sperner hypergraphs are the conformal Sperner hypergraphs, which correspond to the families of maximal cliques of graphs. All these notions play an important role in ma…
▽ More
Given a hypergraph $\mathcal{H}$, the dual hypergraph of $\mathcal{H}$ is the hypergraph of all minimal transversals of $\mathcal{H}$. The dual hypergraph is always Sperner, that is, no hyperedge contains another. A special case of Sperner hypergraphs are the conformal Sperner hypergraphs, which correspond to the families of maximal cliques of graphs. All these notions play an important role in many fields of mathematics and computer science, including combinatorics, algebra, database theory, etc. In this paper we study conformality of dual hypergraphs and prove several results related to the problem of recognizing this property. In particular, we show that the problem is in co-NP and can be solved in polynomial time for hypergraphs of bounded dimension. In the special case of dimension $3$, we reduce the problem to $2$-Satisfiability. Our approach has an implication in algorithmic graph theory: we obtain a polynomial-time algorithm for recognizing graphs in which all minimal transversals of maximal cliques have size at most $k$, for any fixed $k$.
△ Less
Submitted 10 May, 2024; v1 submitted 31 August, 2023;
originally announced September 2023.
-
Yes but.. Can ChatGPT Identify Entities in Historical Documents?
Authors:
Carlos-Emiliano González-Gallardo,
Emanuela Boros,
Nancy Girdhar,
Ahmed Hamdi,
Jose G. Moreno,
Antoine Doucet
Abstract:
Large language models (LLMs) have been leveraged for several years now, obtaining state-of-the-art performance in recognizing entities from modern documents. For the last few months, the conversational agent ChatGPT has "prompted" a lot of interest in the scientific community and public due to its capacity of generating plausible-sounding answers. In this paper, we explore this ability by probing…
▽ More
Large language models (LLMs) have been leveraged for several years now, obtaining state-of-the-art performance in recognizing entities from modern documents. For the last few months, the conversational agent ChatGPT has "prompted" a lot of interest in the scientific community and public due to its capacity of generating plausible-sounding answers. In this paper, we explore this ability by probing it in the named entity recognition and classification (NERC) task in primary sources (e.g., historical newspapers and classical commentaries) in a zero-shot manner and by comparing it with state-of-the-art LM-based systems. Our findings indicate several shortcomings in identifying entities in historical text that range from the consistency of entity annotation guidelines, entity complexity, and code-switching, to the specificity of prompting. Moreover, as expected, the inaccessibility of historical archives to the public (and thus on the Internet) also impacts its performance.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Contextualizing Emerging Trends in Financial News Articles
Authors:
Nhu Khoa Nguyen,
Thierry Delahaut,
Emanuela Boros,
Antoine Doucet,
Gaël Lejeune
Abstract:
Identifying and exploring emerging trends in the news is becoming more essential than ever with many changes occurring worldwide due to the global health crises. However, most of the recent research has focused mainly on detecting trends in social media, thus, benefiting from social features (e.g. likes and retweets on Twitter) which helped the task as they can be used to measure the engagement an…
▽ More
Identifying and exploring emerging trends in the news is becoming more essential than ever with many changes occurring worldwide due to the global health crises. However, most of the recent research has focused mainly on detecting trends in social media, thus, benefiting from social features (e.g. likes and retweets on Twitter) which helped the task as they can be used to measure the engagement and diffusion rate of content. Yet, formal text data, unlike short social media posts, comes with a longer, less restricted writing format, and thus, more challenging. In this paper, we focus our study on emerging trends detection in financial news articles about Microsoft, collected before and during the start of the COVID-19 pandemic (July 2019 to July 2020). We make the dataset accessible and propose a strong baseline (Contextual Leap2Trend) for exploring the dynamics of similarities between pairs of keywords based on topic modelling and term frequency. Finally, we evaluate against a gold standard (Google Trends) and present noteworthy real-world scenarios regarding the influence of the pandemic on Microsoft.
△ Less
Submitted 20 January, 2023;
originally announced January 2023.
-
Matroid Horn functions
Authors:
Kristóf Bérczi,
Endre Boros,
Kazuhisa Makino
Abstract:
Hypergraph Horn functions were introduced as a subclass of Horn functions that can be represented by a collection of circular implication rules. These functions possess distinguished structural and computational properties. In particular, their characterizations in terms of implicate-duality and the closure operator provide extensions of matroid duality and the Mac Lane-Steinitz exchange property…
▽ More
Hypergraph Horn functions were introduced as a subclass of Horn functions that can be represented by a collection of circular implication rules. These functions possess distinguished structural and computational properties. In particular, their characterizations in terms of implicate-duality and the closure operator provide extensions of matroid duality and the Mac Lane-Steinitz exchange property of matroid closure, respectively.
In the present paper, we introduce a subclass of hypergraph Horn functions that we call matroid Horn functions. We provide multiple characterizations of matroid Horn functions in terms of their canonical and complete CNF representations. We also study the Boolean minimization problem for this class, where the goal is to find a minimum size representation of a matroid Horn function given by a CNF representation. While there are various ways to measure the size of a CNF, we focus on the number of circuits and circuit clauses. We determine the size of an optimal representation for binary matroids, and give lower and upper bounds in the uniform case. For uniform matroids, we show a strong connection between our problem and Turán systems that might be of independent combinatorial interest.
△ Less
Submitted 17 January, 2023; v1 submitted 16 January, 2023;
originally announced January 2023.
-
Hypergraph Horn functions
Authors:
Kristóf Bérczi,
Endre Boros,
Kazuhisa Makino
Abstract:
Horn functions form a subclass of Boolean functions possessing interesting structural and computational properties. These functions play a fundamental role in algebra, artificial intelligence, combinatorics, computer science, database theory, and logic.
In the present paper, we introduce the subclass of hypergraph Horn functions that generalizes matroids and equivalence relations. We provide mul…
▽ More
Horn functions form a subclass of Boolean functions possessing interesting structural and computational properties. These functions play a fundamental role in algebra, artificial intelligence, combinatorics, computer science, database theory, and logic.
In the present paper, we introduce the subclass of hypergraph Horn functions that generalizes matroids and equivalence relations. We provide multiple characterizations of hypergraph Horn functions in terms of implicate-duality and the closure operator, which are respectively regarded as generalizations of matroid duality and Mac Lane-Steinitz exchange property of matroid closure. We also study algorithmic issues on hypergraph Horn functions, and show that the recognition problem (i.e., deciding if a given definite Horn CNF represents a hypergraph Horn function) and key realization (i.e., deciding if a given hypergraph is realized as a key set by a hypergraph Horn function) can be done in polynomial time, while implicate sets can be generated with polynomial delay.
△ Less
Submitted 17 January, 2023; v1 submitted 13 January, 2023;
originally announced January 2023.
-
Optimal Layered Defense For Site Protection
Authors:
Tsvetan Asamov,
Emre Yamangil,
Endre Boros,
Paul Kantor,
Fred Roberts
Abstract:
We present a model for layered security with applications to the protection of sites such as stadiums or large gathering places. We formulate the problem as one of maximizing the capture of illegal contraband. The objective function is indefinite and only limited information can be gained when the problem is solved by standard convex optimization methods. In order to solve the model, we develop a…
▽ More
We present a model for layered security with applications to the protection of sites such as stadiums or large gathering places. We formulate the problem as one of maximizing the capture of illegal contraband. The objective function is indefinite and only limited information can be gained when the problem is solved by standard convex optimization methods. In order to solve the model, we develop a dynamic programming approach, and study its convergence properties. Additionally, we formulate a version of the problem aimed at addressing intelligent adversaries who can adjust their direction of attack as they observe changes in the site security. Furthermore, we also develop a method for the solution of the latter model. Finally, we perform computational experiments to demonstrate the use of our methods.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
Deterministic n-person shortest path and terminal games on symmetric digraphs have Nash equilibria in pure stationary strategies
Authors:
Endre Boros,
Paolo Giulio Franciosa,
Vladimir Gurvich,
Michael Vyalyi
Abstract:
We prove that a deterministic n-person shortest path game has a Nash equlibrium in pure and stationary strategies if it is edge-symmetric (that is (u,v) is a move whenever (v,u) is, apart from moves entering terminal vertices) and the length of every move is positive for each player. Both conditions are essential, though it remains an open problem whether there exists a NE-free 2-person non-edge-s…
▽ More
We prove that a deterministic n-person shortest path game has a Nash equlibrium in pure and stationary strategies if it is edge-symmetric (that is (u,v) is a move whenever (v,u) is, apart from moves entering terminal vertices) and the length of every move is positive for each player. Both conditions are essential, though it remains an open problem whether there exists a NE-free 2-person non-edge-symmetric game with positive lengths. We provide examples for NE-free 2-person edge-symmetric games that are not positive. We also consider the special case of terminal games (shortest path games in which only terminal moves have nonzero length, possibly negative) and prove that edge-symmetric n-person terminal games always have Nash equilibria in pure and stationary strategies. Furthermore, we prove that an edge-symmetric 2-person terminal game has a uniform (subgame perfect) Nash equilibrium, provided any infinite play is worse than any of the terminals for both players.
△ Less
Submitted 20 February, 2023; v1 submitted 23 February, 2022;
originally announced February 2022.
-
Boole's probability bounding problem, linear programming aggregations, and nonnegative quadratic pseudo-Boolean functions
Authors:
Endre Boros,
Joonhee Lee
Abstract:
George Boole first proposed the union bounding problem, which is a class of probabilistic satisfiability problems. Based on Hailperin's linear programming formulation of the problem, a very large body of research was conducted to provide good bounds by considering a relaxation that is either polynomial dimension in $n$ or is at least polynomially computable. We study monotone linear map**s…
▽ More
George Boole first proposed the union bounding problem, which is a class of probabilistic satisfiability problems. Based on Hailperin's linear programming formulation of the problem, a very large body of research was conducted to provide good bounds by considering a relaxation that is either polynomial dimension in $n$ or is at least polynomially computable. We study monotone linear map**s $\mathcal{L}$ to a lower $N$ dimensional space such that $\mathcal{L}(\mathbb{R}_+^{2^n-1}) \subseteq \mathbb{R}_+^N$ and provide a complete characterization of the cone $L_\mathcal{E}(\mathbb{R}_+^Ω)$ for three aggregation models from the literature. This characterization leads to strictly improved bounds in two of these cases as a result. We also obtain an $O(n^2)$ dimensional linear program that is equivalent with Hailperin's model. An interesting side result is that there exists a connection between Hailperin's model and the cut-polytope.
△ Less
Submitted 13 November, 2021; v1 submitted 20 October, 2021;
originally announced October 2021.
-
Event Detection as Question Answering with Entity Information
Authors:
Emanuela Boros,
Jose G. Moreno,
Antoine Doucet
Abstract:
In this paper, we propose a recent and under-researched paradigm for the task of event detection (ED) by casting it as a question-answering (QA) problem with the possibility of multiple answers and the support of entities. The extraction of event triggers is, thus, transformed into the task of identifying answer spans from a context, while also focusing on the surrounding entities. The architectur…
▽ More
In this paper, we propose a recent and under-researched paradigm for the task of event detection (ED) by casting it as a question-answering (QA) problem with the possibility of multiple answers and the support of entities. The extraction of event triggers is, thus, transformed into the task of identifying answer spans from a context, while also focusing on the surrounding entities. The architecture is based on a pre-trained and fine-tuned language model, where the input context is augmented with entities marked at different levels, their positions, their types, and, finally, the argument roles. Experiments on the ACE~2005 corpus demonstrate that the proposed paradigm is a viable solution for the ED task and it significantly outperforms the state-of-the-art models. Moreover, we prove that our methods are also able to extract unseen event types.
△ Less
Submitted 14 April, 2021;
originally announced April 2021.
-
Transformer-based Methods for Recognizing Ultra Fine-grained Entities (RUFES)
Authors:
Emanuela Boros,
Antoine Doucet
Abstract:
This paper summarizes the participation of the Laboratoire Informatique, Image et Interaction (L3i laboratory) of the University of La Rochelle in the Recognizing Ultra Fine-grained Entities (RUFES) track within the Text Analysis Conference (TAC) series of evaluation workshops. Our participation relies on two neural-based models, one based on a pre-trained and fine-tuned language model with a stac…
▽ More
This paper summarizes the participation of the Laboratoire Informatique, Image et Interaction (L3i laboratory) of the University of La Rochelle in the Recognizing Ultra Fine-grained Entities (RUFES) track within the Text Analysis Conference (TAC) series of evaluation workshops. Our participation relies on two neural-based models, one based on a pre-trained and fine-tuned language model with a stack of Transformer layers for fine-grained entity extraction and one out-of-the-box model for within-document entity coreference. We observe that our approach has great potential in increasing the performance of fine-grained entity recognition. Thus, the future work envisioned is to enhance the ability of the models following additional experiments and a deeper analysis of the results.
△ Less
Submitted 13 April, 2021;
originally announced April 2021.
-
Recognizing distributed approval voting forms and correspondences
Authors:
Endre Boros,
Ondrej Cepek,
Vladimir Gurvich,
Kazuhisa Makino
Abstract:
Each voter $i \in I$ has $α_i$ cards that (s)he distributes among the candidates $a \in A$ as a measure of approval. One (or several) candidate(s) who received the maximum number of cards is (are) elected. We provide polynomial algorithms to recognize voting forms and voting correspondences generated by such voting schemes in cases when either the number of candidates or the number of voters is eq…
▽ More
Each voter $i \in I$ has $α_i$ cards that (s)he distributes among the candidates $a \in A$ as a measure of approval. One (or several) candidate(s) who received the maximum number of cards is (are) elected. We provide polynomial algorithms to recognize voting forms and voting correspondences generated by such voting schemes in cases when either the number of candidates or the number of voters is equal to $2$. We prove that for two voters, if $α_2 \geq α_1-2\geq 0$ then the unique voting correspondence has distinct rows. We also characterize voting forms with distinct rows.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
On the degree sequences of dual graphs on surfaces
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanič,
Jernej Vičič
Abstract:
Given two graphs $G$ and $G^*$ with a one-to-one correspondence between their edges, when do $G$ and $G^*$ form a pair of dual graphs realizing the vertices and countries of a map embedded in a surface? A criterion was obtained by Jack Edmonds in 1965. Furthermore, let $\boldsymbol{d}=(d_1,\ldots,d_n)$ and $\boldsymbol{t}=(t_1,\ldots,t_m)$ be their degree sequences. Then, clearly,…
▽ More
Given two graphs $G$ and $G^*$ with a one-to-one correspondence between their edges, when do $G$ and $G^*$ form a pair of dual graphs realizing the vertices and countries of a map embedded in a surface? A criterion was obtained by Jack Edmonds in 1965. Furthermore, let $\boldsymbol{d}=(d_1,\ldots,d_n)$ and $\boldsymbol{t}=(t_1,\ldots,t_m)$ be their degree sequences. Then, clearly, $\sum_{i=1}^n d_i = \sum_{j=1}^m t_j = 2\ell$, where $\ell$ is the number of edges in each of the two graphs, and $χ= n - \ell + m$ is the Euler characteristic of the surface. Which sequences $\boldsymbol{d}$ and $\boldsymbol{t}$ satisfying these conditions still cannot be realized as the degree sequences? We make use of Edmonds' criterion to obtain several infinite series of exceptions for the sphere, $χ= 2$, and projective plane, $χ= 1$. We conjecture that there exist no exceptions for $χ\leq 0$.
△ Less
Submitted 2 August, 2020;
originally announced August 2020.
-
Envy-free Relaxations for Goods, Chores, and Mixed Items
Authors:
Kristóf Bérczi,
Erika R. Bérczi-Kovács,
Endre Boros,
Fekadu Tolessa Gedefa,
Naoyuki Kamiyama,
Telikepalli Kavitha,
Yusuke Kobayashi,
Kazuhisa Makino
Abstract:
In fair division problems, we are given a set $S$ of $m$ items and a set $N$ of $n$ agents with individual preferences, and the goal is to find an allocation of items among agents so that each agent finds the allocation fair. There are several established fairness concepts and envy-freeness is one of the most extensively studied ones. However envy-free allocations do not always exist when items ar…
▽ More
In fair division problems, we are given a set $S$ of $m$ items and a set $N$ of $n$ agents with individual preferences, and the goal is to find an allocation of items among agents so that each agent finds the allocation fair. There are several established fairness concepts and envy-freeness is one of the most extensively studied ones. However envy-free allocations do not always exist when items are indivisible and this has motivated relaxations of envy-freeness: envy-freeness up to one item (EF1) and envy-freeness up to any item (EFX) are two well-studied relaxations. We consider the problem of finding EF1 and EFX allocations for utility functions that are not necessarily monotone, and propose four possible extensions of different strength to this setting.
In particular, we present a polynomial-time algorithm for finding an EF1 allocation for two agents with arbitrary utility functions. An example is given showing that EFX allocations need not exist for two agents with non-monotone, non-additive, identical utility functions. However, when all agents have monotone (not necessarily additive) identical utility functions, we prove that an EFX allocation of chores always exists. As a step toward understanding the general case, we discuss two subclasses of utility functions: Boolean utilities that are $\{0,+1\}$-valued functions, and negative Boolean utilities that are $\{0,-1\}$-valued functions. For the latter, we give a polynomial time algorithm that finds an EFX allocation when the utility functions are identical.
△ Less
Submitted 8 June, 2020;
originally announced June 2020.
-
Unique key Horn functions
Authors:
Kristóf Bérczi,
Endre Boros,
Ondřej Čepek,
Petr Kučera,
Kazuhisa Makino
Abstract:
Given a relational database, a key is a set of attributes such that a value assignment to this set uniquely determines the values of all other attributes. The database uniquely defines a pure Horn function $h$, representing the functional dependencies. If the knowledge of the attribute values in set $A$ determines the value for attribute $v$, then $A\rightarrow v$ is an implicate of $h$. If $K$ is…
▽ More
Given a relational database, a key is a set of attributes such that a value assignment to this set uniquely determines the values of all other attributes. The database uniquely defines a pure Horn function $h$, representing the functional dependencies. If the knowledge of the attribute values in set $A$ determines the value for attribute $v$, then $A\rightarrow v$ is an implicate of $h$. If $K$ is a key of the database, then $K\rightarrow v$ is an implicate of $h$ for all attributes $v$.
Keys of small sizes play a crucial role in various problems. We present structural and complexity results on the set of minimal keys of pure Horn functions. We characterize Sperner hypergraphs for which there is a unique pure Horn function with the given hypergraph as the set of minimal keys. Furthermore, we show that recognizing such hypergraphs is co-NP-complete already when every hyperedge has size two. On the positive side, we identify several classes of graphs for which the recognition problem can be decided in polynomial time.
We also present an algorithm that generates the minimal keys of a pure Horn function with polynomial delay. By establishing a connection between keys and target sets, our approach can be used to generate all minimal target sets with polynomial delay when the thresholds are bounded by a constant. As a byproduct, our proof shows that the Minimum Key problem is at least as hard as the Minimum Target Set Selection problem with bounded thresholds.
△ Less
Submitted 17 February, 2020;
originally announced February 2020.
-
Generating clause sequences of a CNF formula
Authors:
Kristóf Bérczi,
Endre Boros,
Ondřej Čepek,
Khaled Elbassioni,
Petr Kučera,
Kazuhisa Makino
Abstract:
Given a CNF formula $Φ$ with clauses $C_1,\ldots,C_m$ and variables $V=\{x_1,\ldots,x_n\}$, a truth assignment $a:V\rightarrow\{0,1\}$ of $Φ$ leads to a clause sequence $σ_Φ(a)=(C_1(a),\ldots,C_m(a))\in\{0,1\}^m$ where $C_i(a) = 1$ if clause $C_i$ evaluates to $1$ under assignment $a$, otherwise $C_i(a) = 0$. The set of all possible clause sequences carries a lot of information on the formula, e.g…
▽ More
Given a CNF formula $Φ$ with clauses $C_1,\ldots,C_m$ and variables $V=\{x_1,\ldots,x_n\}$, a truth assignment $a:V\rightarrow\{0,1\}$ of $Φ$ leads to a clause sequence $σ_Φ(a)=(C_1(a),\ldots,C_m(a))\in\{0,1\}^m$ where $C_i(a) = 1$ if clause $C_i$ evaluates to $1$ under assignment $a$, otherwise $C_i(a) = 0$. The set of all possible clause sequences carries a lot of information on the formula, e.g. SAT, MAX-SAT and MIN-SAT can be encoded in terms of finding a clause sequence with extremal properties.
We consider a problem posed at Dagstuhl Seminar 19211 "Enumeration in Data Management" (2019) about the generation of all possible clause sequences of a given CNF with bounded dimension. We prove that the problem can be solved in incremental polynomial time. We further give an algorithm with polynomial delay for the class of tractable CNF formulas. We also consider the generation of maximal and minimal clause sequences, and show that generating maximal clause sequences is NP-hard, while minimal clause sequences can be generated with polynomial delay.
△ Less
Submitted 16 February, 2020;
originally announced February 2020.
-
On the Sprague-Grundy function of compound games
Authors:
Endre Boros,
Vladimir Gurvich,
Levi Kitrossky,
Kazuhisa Makino
Abstract:
The classical game of {\sc Nim} can be naturally extended and played on an arbitrary hypergraph $\cH \subseteq 2^V \setminus \{\emptyset\}$ whose vertices $V = \{1, \ldots, n\}$ correspond to piles of stones. By one move a player chooses an edge $H$ of $\cH$ and reduces arbitrarily all piles $i \in H$. In 1901 Bouton solved the classical {\sc Nim} for which $\cH = \{\{1\}, \ldots, \{n\}\}$. In 191…
▽ More
The classical game of {\sc Nim} can be naturally extended and played on an arbitrary hypergraph $\cH \subseteq 2^V \setminus \{\emptyset\}$ whose vertices $V = \{1, \ldots, n\}$ correspond to piles of stones. By one move a player chooses an edge $H$ of $\cH$ and reduces arbitrarily all piles $i \in H$. In 1901 Bouton solved the classical {\sc Nim} for which $\cH = \{\{1\}, \ldots, \{n\}\}$. In 1910 Moore introduced and solved a more general game $k$-{\sc Nim}, for which $\cH = \{H \subseteq V \mid |H| \leq k\}$, where $1 \leq k < n$. In 1980 Jenkyns and Mayberry obtained an explicit formula for the Sprague-Grundy function of Moore's {\sc Nim} for the case $k+1 = n$. Recently it was shown that the same formula works for a large class of hypergraphs. In this paper we study combinatorial properties of these hypergraphs and obtain explicit formulas for the Sprague-Grundy functions of the conjunctive and selective compounds of the corresponding hypergraph {\sc Nim} games.
△ Less
Submitted 19 March, 2019;
originally announced March 2019.
-
Approximating minimum representations of key Horn functions
Authors:
Kristóf Bérczi,
Endre Boros,
Ondřej Čepek,
Petr Kučera,
Kazuhisa Makino
Abstract:
Horn functions form a subclass of Boolean functions and appear in many different areas of computer science and mathematics as a general tool to describe implications and dependencies. Finding minimum sized representations for such functions with respect to most commonly used measures is a computationally hard problem that remains hard even for the important subclass of key Horn functions. In this…
▽ More
Horn functions form a subclass of Boolean functions and appear in many different areas of computer science and mathematics as a general tool to describe implications and dependencies. Finding minimum sized representations for such functions with respect to most commonly used measures is a computationally hard problem that remains hard even for the important subclass of key Horn functions. In this paper we provide logarithmic factor approximation algorithms for key Horn functions with respect to all measures studied in the literature for which the problem is known to be hard.
△ Less
Submitted 22 March, 2019; v1 submitted 13 November, 2018;
originally announced November 2018.
-
Characterizing and decomposing classes of threshold, split, and bipartite graphs via 1-Sperner hypergraphs
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanič
Abstract:
A hypergraph is said to be $1$-Sperner if for every two hyperedges the smallest of their two set differences is of size one. We present several applications of $1$-Sperner hypergraphs and their structure to graphs. In particular, we consider the classical characterizations of threshold and domishold graphs and use them to obtain further characterizations of these classes in terms of $1$-Spernernes…
▽ More
A hypergraph is said to be $1$-Sperner if for every two hyperedges the smallest of their two set differences is of size one. We present several applications of $1$-Sperner hypergraphs and their structure to graphs. In particular, we consider the classical characterizations of threshold and domishold graphs and use them to obtain further characterizations of these classes in terms of $1$-Spernerness, thresholdness, and $2$-asummability of their vertex cover, clique, dominating set, and closed neighborhood hypergraphs. Furthermore, we apply a decomposition property of $1$-Sperner hypergraphs to derive decomposition theorems for two classes of split graphs, a class of bipartite graphs, and a class of cobipartite graphs. These decomposition theorems are based on certain matrix partitions of the corresponding graphs, giving rise to new classes of graphs of bounded clique-width and new polynomially solvable cases of several domination problems.
△ Less
Submitted 29 May, 2018; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Sprague-Grundy Function of Matroids and Related Hypergraphs
Authors:
Endre Boros,
Vladimir Gurvich,
Nhan Bao Ho,
Kazuhisa Makino,
Peter Mursic
Abstract:
We consider a generalization of the classical game of $NIM$ called hypergraph $NIM$. Given a hypergraph $\cH$ on the ground set $V = \{1, \ldots, n\}$ of $n$ piles of stones, two players alternate in choosing a hyperedge $H \in \cH$ and strictly decreasing all piles $i\in H$. The player who makes the last move is the winner. In this paper we give an explicit formula that describes the Sprague-Grun…
▽ More
We consider a generalization of the classical game of $NIM$ called hypergraph $NIM$. Given a hypergraph $\cH$ on the ground set $V = \{1, \ldots, n\}$ of $n$ piles of stones, two players alternate in choosing a hyperedge $H \in \cH$ and strictly decreasing all piles $i\in H$. The player who makes the last move is the winner. In this paper we give an explicit formula that describes the Sprague-Grundy function of hypergraph $NIM$ for several classes of hypergraphs. In particular we characterize all $2$-uniform hypergraphs (that is graphs) and all matroids for which the formula works. We show that all self-dual matroids are included in this class.
△ Less
Submitted 19 March, 2019; v1 submitted 31 March, 2018;
originally announced April 2018.
-
Sprague-Grundy Function of Symmetric Hypergraphs
Authors:
Endre Boros,
Vladimir Gurvich,
Nhan Bao Ho,
Kazuhisa Makino,
Peter Mursic
Abstract:
We consider a generalization of the classical game of $NIM$ called hypergraph $NIM$. Given a hypergraph $\cH$ on the ground set $V = \{1, \ldots, n\}$ of $n$ piles of stones, two players alternate in choosing a hyperedge $H \in \cH$ and strictly decreasing all piles $i\in H$. The player who makes the last move is the winner. Recently it was shown that for many classes of hypergraphs the Sprague-Gr…
▽ More
We consider a generalization of the classical game of $NIM$ called hypergraph $NIM$. Given a hypergraph $\cH$ on the ground set $V = \{1, \ldots, n\}$ of $n$ piles of stones, two players alternate in choosing a hyperedge $H \in \cH$ and strictly decreasing all piles $i\in H$. The player who makes the last move is the winner. Recently it was shown that for many classes of hypergraphs the Sprague-Grundy function of the corresponding game is given by the formula introduced originally by Jenkyns and Mayberry (1980). In this paper we characterize symmetric hypergraphs for which the Sprague-Grundy function is described by the same formula.
△ Less
Submitted 31 March, 2018;
originally announced April 2018.
-
Separable discrete functions: recognition and sufficient conditions
Authors:
Endre Boros,
Ondrej Cepek,
Vladimir Gurvich
Abstract:
A discrete function of $n$ variables is a map** $g : X_1 \times \ldots \times X_n \rightarrow A$, where $X_1, \ldots, X_n$, and $A$ are arbitrary finite sets. Function $g$ is called {\em separable} if there exist $n$ functions $g_i : X_i \rightarrow A$ for $i = 1, \ldots, n$, such that for every input $x_1, \ldots ,x_n$ the function $g(x_1, \ldots, x_n)$ takes one of the values…
▽ More
A discrete function of $n$ variables is a map** $g : X_1 \times \ldots \times X_n \rightarrow A$, where $X_1, \ldots, X_n$, and $A$ are arbitrary finite sets. Function $g$ is called {\em separable} if there exist $n$ functions $g_i : X_i \rightarrow A$ for $i = 1, \ldots, n$, such that for every input $x_1, \ldots ,x_n$ the function $g(x_1, \ldots, x_n)$ takes one of the values $g_1(x_1), \ldots ,g_n(x_n)$. Given a discrete function $g$, it is an interesting problem to ask whether $g$ is separable or not. Although this seems to be a very basic problem concerning discrete functions, the complexity of recognition of separable discrete functions of $n$ variables is known only for $n=2$. In this paper we will show that a slightly more general recognition problem, when $g$ is not fully but only partially defined, is NP-complete for $n \geq 3$. We will then use this result to show that the recognition of fully defined separable discrete functions is NP-complete for $n \geq 4$.
The case $n = 2$ is well-studied in the context of game theory, where (separable) discrete functions of $n$ variables are referred to as (assignable) $n$-person game forms. There is a known sufficient condition for assignability (separability) of two-person game forms (discrete functions of two variables) called (weak) total tightness of a game form. This property can be tested in polynomial time, and can be easily generalized both to higher dimension and to partially defined functions. We will prove in this paper that weak total tightness implies separability for (partially defined) discrete functions of $n$ variables for any $n$, thus generalizing the above result known for $n=2$.
Keywords: separable discrete functions, totally tight and assignable game forms
△ Less
Submitted 17 November, 2017;
originally announced November 2017.
-
Tetris Hypergraphs and Combinations of Impartial Games
Authors:
Endre Boros,
Vladimir Gurvich,
Nhan Bao Ho,
Kazuhisa Makino,
Peter Mursic
Abstract:
The Sprague-Grundy (SG) theory reduces the sum of impartial games to the classical game of $NIM$. We generalize the concept of sum and introduce $\cH$-combinations of impartial games for any hypergraph $\cH$. In particular, we introduce the game $NIM_\cH$ which is the $\cH$-combination of single pile $NIM$ games. An impartial game is called SG decreasing if its SG value is decreased by every move.…
▽ More
The Sprague-Grundy (SG) theory reduces the sum of impartial games to the classical game of $NIM$. We generalize the concept of sum and introduce $\cH$-combinations of impartial games for any hypergraph $\cH$. In particular, we introduce the game $NIM_\cH$ which is the $\cH$-combination of single pile $NIM$ games. An impartial game is called SG decreasing if its SG value is decreased by every move. Extending the SG theory, we reduce the $\cH$-combination of SG decreasing games to $NIM_\cH$. We call $\cH$ a Tetris hypergraph if $NIM_\cH$ is SG decreasing. We provide some necessary and some sufficient conditions for a hypergraph to be Tetris.
△ Less
Submitted 10 January, 2017;
originally announced January 2017.
-
A three-person deterministic graphical game without Nash equilibria
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanič,
Vladimir Oudalov,
Jernej Vičič
Abstract:
We give an example of a three-person deterministic graphical game that has no Nash equilibrium in pure stationary strategies. The game has seven positions, four outcomes (a unique cycle and three terminal positions), and its normal form is of size 2 x 2 x 4 only. Thus, our example strengthens significantly the one obtained in 2014 by Gurvich and Oudalov; the latter has four players, five terminals…
▽ More
We give an example of a three-person deterministic graphical game that has no Nash equilibrium in pure stationary strategies. The game has seven positions, four outcomes (a unique cycle and three terminal positions), and its normal form is of size 2 x 2 x 4 only. Thus, our example strengthens significantly the one obtained in 2014 by Gurvich and Oudalov; the latter has four players, five terminals, and a 2 x 4 x 6 x 8 normal form. Furthermore, our example is minimal with respect to the number of players. Both examples are tight but not Nash-solvable. Such examples were known since 1975, but they were not related to deterministic graphical games. Moreover, due to the small size of our example, we can strengthen it further by showing that it has no Nash equilibrium not only in pure but also in independently mixed strategies, for both Markovian and a priori evaluations.
△ Less
Submitted 23 July, 2017; v1 submitted 24 October, 2016;
originally announced October 2016.
-
A Convex Programming-based Algorithm for Mean Payoff Stochastic Games with Perfect Information
Authors:
Endre Boros,
Khaled Elbassioni,
Vladimir Gurvich,
Kazuhisa Makino
Abstract:
We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, even when $|V_R|=0$. In fact, a pseu…
▽ More
We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, even when $|V_R|=0$. In fact, a pseudo-polynomial algorithm for BWR-games would already imply their polynomial solvability. In this short note, we show that BWR-games can be solved via convex programming in pseudo-polynomial time if the number of random positions is a constant.
△ Less
Submitted 21 October, 2016;
originally announced October 2016.
-
Decomposing 1-Sperner hypergraphs
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanič
Abstract:
A hypergraph is Sperner if no hyperedge contains another one. A Sperner hypergraph is equilizable (resp., threshold) if the characteristic vectors of its hyperedges are the (minimal) binary solutions to a linear equation (resp., inequality) with positive coefficients. These combinatorial notions have many applications and are motivated by the theory of Boolean functions and integer programming. We…
▽ More
A hypergraph is Sperner if no hyperedge contains another one. A Sperner hypergraph is equilizable (resp., threshold) if the characteristic vectors of its hyperedges are the (minimal) binary solutions to a linear equation (resp., inequality) with positive coefficients. These combinatorial notions have many applications and are motivated by the theory of Boolean functions and integer programming. We introduce in this paper the class of $1$-Sperner hypergraphs, defined by the property that for every two hyperedges the smallest of their two set differences is of size one. We characterize this class of Sperner hypergraphs by a decomposition theorem and derive several consequences from it. In particular, we obtain bounds on the size of $1$-Sperner hypergraphs and their transversal hypergraphs, show that the characteristic vectors of the hyperedges are linearly independent over the reals, and prove that $1$-Sperner hypergraphs are both threshold and equilizable. The study of $1$-Sperner hypergraphs is motivated also by their applications in graph theory, which we present in a companion paper.
△ Less
Submitted 27 May, 2018; v1 submitted 8 October, 2015;
originally announced October 2015.
-
On the Sprague-Grundy function of Exact $k$-Nim
Authors:
Endre Boros,
Vladimir Gurvich,
Nhan Bao Ho,
Kazuhisa Makino,
Peter Mursic
Abstract:
Moore's generalization of the game of {\sc Nim} is played as follows. Let $n$ and $k$ be two integers such that $1 \leq k \leq n$. Given $n$ piles of tokens, two players move alternately, removing tokens from at least one and at most $k$ of the piles. The player who makes the last move wins. The game was solved by Moore in 1910 and an explicit formula for its Sprague-Grundy function was given by J…
▽ More
Moore's generalization of the game of {\sc Nim} is played as follows. Let $n$ and $k$ be two integers such that $1 \leq k \leq n$. Given $n$ piles of tokens, two players move alternately, removing tokens from at least one and at most $k$ of the piles. The player who makes the last move wins. The game was solved by Moore in 1910 and an explicit formula for its Sprague-Grundy function was given by Jenkyns and Mayberry in 1980, for the case $n = k+1$ only. We introduce another generalization of {\sc Nim}, called {\sc Exact $k$-Nim}, in which each move reduces exactly $k$ piles. We give an explicit formula for the Sprague-Grundy function of {\sc Exact $k$-Nim} in case $2k \geq n$. In case $n=2k$ our formula is surprisingly similar to Jenkyns and Mayberry's one.
△ Less
Submitted 17 January, 2017; v1 submitted 18 August, 2015;
originally announced August 2015.
-
A Potential Reduction Algorithm for Two-person Zero-sum Mean Payoff Stochastic Games
Authors:
Endre Boros,
Khaled Elbassioni,
Vladimir Gurvich,
Kazuhisa Makino
Abstract:
We suggest a new algorithm for two-person zero-sum undiscounted stochastic games focusing on stationary strategies. Given a positive real $ε$, let us call a stochastic game $ε$-ergodic, if its values from any two initial positions differ by at most $ε$. The proposed new algorithm outputs for every $ε>0$ in finite time either a pair of stationary strategies for the two players guaranteeing that the…
▽ More
We suggest a new algorithm for two-person zero-sum undiscounted stochastic games focusing on stationary strategies. Given a positive real $ε$, let us call a stochastic game $ε$-ergodic, if its values from any two initial positions differ by at most $ε$. The proposed new algorithm outputs for every $ε>0$ in finite time either a pair of stationary strategies for the two players guaranteeing that the values from any initial positions are within an $ε$-range, or identifies two initial positions $u$ and $v$ and corresponding stationary strategies for the players proving that the game values starting from $u$ and $v$ are at least $ε/24$ apart. In particular, the above result shows that if a stochastic game is $ε$-ergodic, then there are stationary strategies for the players proving $24ε$-ergodicity. This result strengthens and provides a constructive version of an existential result by Vrieze (1980) claiming that if a stochastic game is $0$-ergodic, then there are $ε$-optimal stationary strategies for every $ε> 0$. The suggested algorithm is based on a potential transformation technique that changes the range of local values at all positions without changing the normal form of the game.
△ Less
Submitted 14 August, 2015;
originally announced August 2015.
-
A Pseudo-Polynomial Algorithm for Mean Payoff Stochastic Games with Perfect Information and Few Random Positions
Authors:
Endre Boros,
Khaled Elbassioni,
Vladimir Gurvich,
Kazuhisa Makino
Abstract:
We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, or not, even when $|V_R|=0$. In fact…
▽ More
We consider two-person zero-sum stochastic mean payoff games with perfect information, or BWR-games, given by a digraph $G = (V, E)$, with local rewards $r: E \to \ZZ$, and three types of positions: black $V_B$, white $V_W$, and random $V_R$ forming a partition of $V$. It is a long-standing open question whether a polynomial time algorithm for BWR-games exists, or not, even when $|V_R|=0$. In fact, a pseudo-polynomial algorithm for BWR-games would already imply their polynomial solvability. In this paper, we show that BWR-games with a constant number of random positions can be solved in pseudo-polynomial time. More precisely, in any BWR-game with $|V_R|=O(1)$, a saddle point in uniformly optimal pure stationary strategies can be found in time polynomial in $|V_W|+|V_B|$, the maximum absolute local reward, and the common denominator of the transition probabilities.
△ Less
Submitted 23 March, 2017; v1 submitted 14 August, 2015;
originally announced August 2015.
-
On Equistable, Split, CIS, and Related Classes of Graphs
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanič
Abstract:
We consider several graphs classes defined in terms of conditions on cliques and stable sets, including CIS, split, equistable, and other related classes. We pursue a systematic study of the relations between them. As part of this study, we introduce two generalizations of CIS graphs, obtain a new characterization of split graphs, and a characterization of CIS line graphs.
We consider several graphs classes defined in terms of conditions on cliques and stable sets, including CIS, split, equistable, and other related classes. We pursue a systematic study of the relations between them. As part of this study, we introduce two generalizations of CIS graphs, obtain a new characterization of split graphs, and a characterization of CIS line graphs.
△ Less
Submitted 21 May, 2015;
originally announced May 2015.
-
On the Sprague-Grundy Function of Tetris Extensions of Proper {\sc Nim}
Authors:
Endre Boros,
Vladimir Gurvich,
Nhan Bao Ho,
Kazuhisa Makino
Abstract:
Given a hypergraph $\cH \subseteq 2^I \setminus \{\emptyset\}$ on the ground set $I = \{1, \ldots, n\}$, we assign to each $i \in I$ a nonnegative integer $x_i$, that is a pile of $x_i$ tokens, and consider the following generalization of the classical game of {\sc Nim}: Two players alternate turns. In a move a player chooses an arbitrary edge $H \in \cH$ and reduces all piles $i \in H$. The playe…
▽ More
Given a hypergraph $\cH \subseteq 2^I \setminus \{\emptyset\}$ on the ground set $I = \{1, \ldots, n\}$, we assign to each $i \in I$ a nonnegative integer $x_i$, that is a pile of $x_i$ tokens, and consider the following generalization of the classical game of {\sc Nim}: Two players alternate turns. In a move a player chooses an arbitrary edge $H \in \cH$ and reduces all piles $i \in H$. The player who is out of moves loses. We call the obtained game hypergraph {\sc Nim}. Such a game is called proper {\sc Nim}, when $\cH=2^I \setminus\{I,\emptyset\}$ is the family of all proper subsets of $I$. Jenkyns and Mayberry \cite{JM80} described the Sprague-Grundy (or SG in short) function of these games. In this paper we introduce Tetris extensions of hypergraph {\sc Nim}, and obtain a closed formula for the SG functions of the extensions of proper {\sc Nim}, when $n\geq 3$. Surprisingly, the case of $n=2$ is much more complicated. For this case we only suggest several partial results and conjectures.
△ Less
Submitted 29 March, 2018; v1 submitted 27 April, 2015;
originally announced April 2015.
-
Equistarable bipartite graphs
Authors:
Endre Boros,
Nina Chiarelli,
Martin Milanič
Abstract:
Recently, Milanič and Trotignon introduced the class of equistarable graphs as graphs without isolated vertices admitting positive weights on the edges such that a subset of edges is of total weight $1$ if and only if it forms a maximal star. Based on equistarable graphs, counterexamples to three conjectures on equistable graphs were constructed, in particular to Orlin's conjecture, which states t…
▽ More
Recently, Milanič and Trotignon introduced the class of equistarable graphs as graphs without isolated vertices admitting positive weights on the edges such that a subset of edges is of total weight $1$ if and only if it forms a maximal star. Based on equistarable graphs, counterexamples to three conjectures on equistable graphs were constructed, in particular to Orlin's conjecture, which states that every equistable graph is a general partition graph.
In this paper we characterize equistarable bipartite graphs. We show that a bipartite graph is equistarable if and only if every $2$-matching of the graph extends to a matching covering all vertices of degree at least $2$. As a consequence of this result, we obtain that Orlin's conjecture holds within the class of complements of line graphs of bipartite graphs.
We also connect equistarable graphs to the triangle condition, a combinatorial condition known to be necessary (but in general not sufficient) for equistability. We show that the triangle condition implies general partitionability for complements of line graphs of forests, and construct an infinite family of triangle non-equistable graphs within the class of complements of line graphs of bipartite graphs.
△ Less
Submitted 23 February, 2015;
originally announced February 2015.
-
A Nested Family of $k$-total Effective Rewards for Positional Games
Authors:
Endre Boros,
Khaled Elbassioni,
Vladimir Gurvich,
Kazuhisa Makino
Abstract:
We consider Gillette's two-person zero-sum stochastic games with perfect information. For each $k \in \ZZ_+$ we introduce an effective reward function, called $k$-total. For $k = 0$ and $1$ this function is known as {\it mean payoff} and {\it total reward}, respectively. We restrict our attention to the deterministic case. For all $k$, we prove the existence of a saddle point which can be realized…
▽ More
We consider Gillette's two-person zero-sum stochastic games with perfect information. For each $k \in \ZZ_+$ we introduce an effective reward function, called $k$-total. For $k = 0$ and $1$ this function is known as {\it mean payoff} and {\it total reward}, respectively. We restrict our attention to the deterministic case. For all $k$, we prove the existence of a saddle point which can be realized by uniformly optimal pure stationary strategies. We also demonstrate that $k$-total reward games can be embedded into $(k+1)$-total reward games.
△ Less
Submitted 14 August, 2015; v1 submitted 20 November, 2014;
originally announced December 2014.
-
On Quadratization of Pseudo-Boolean Functions
Authors:
Endre Boros,
Aritanan Gruber
Abstract:
We survey current term-wise techniques for quadratizing high-degree pseudo-Boolean functions and introduce a new one, which allows multiple splits of terms. We also introduce the first aggregative approach, which splits a collection of terms based on their common parts.
We survey current term-wise techniques for quadratizing high-degree pseudo-Boolean functions and introduce a new one, which allows multiple splits of terms. We also introduce the first aggregative approach, which splits a collection of terms based on their common parts.
△ Less
Submitted 25 April, 2014;
originally announced April 2014.
-
Quadratization of Symmetric Pseudo-Boolean Functions
Authors:
Martin Anthony,
Endre Boros,
Yves Crama,
Aritanan Gruber
Abstract:
A pseudo-Boolean function is a real-valued function $f(x)=f(x_1,x_2,\ldots,x_n)$ of $n$ binary variables; that is, a map** from $\{0,1\}^n$ to $\mathbb{R}$. For a pseudo-Boolean function $f(x)$ on $\{0,1\}^n$, we say that $g(x,y)$ is a quadratization of $f$ if $g(x,y)$ is a quadratic polynomial depending on $x$ and on $m$ auxiliary binary variables $y_1,y_2,\ldots,y_m$ such that…
▽ More
A pseudo-Boolean function is a real-valued function $f(x)=f(x_1,x_2,\ldots,x_n)$ of $n$ binary variables; that is, a map** from $\{0,1\}^n$ to $\mathbb{R}$. For a pseudo-Boolean function $f(x)$ on $\{0,1\}^n$, we say that $g(x,y)$ is a quadratization of $f$ if $g(x,y)$ is a quadratic polynomial depending on $x$ and on $m$ auxiliary binary variables $y_1,y_2,\ldots,y_m$ such that $f(x)= \min \{g(x,y) : y \in \{0,1\}^m \}$ for all $x \in \{0,1\}^n$. By means of quadratizations, minimization of $f$ is reduced to minimization (over its extended set of variables) of the quadratic function $g(x,y)$. This is of some practical interest because minimization of quadratic functions has been thoroughly studied for the last few decades, and much progress has been made in solving such problems exactly or heuristically. A related paper \cite{ABCG} initiated a systematic study of the minimum number of auxiliary $y$-variables required in a quadratization of an arbitrary function $f$ (a natural question, since the complexity of minimizing the quadratic function $g(x,y)$ depends, among other factors, on the number of binary variables). In this paper, we determine more precisely the number of auxiliary variables required by quadratizations of symmetric pseudo-Boolean functions $f(x)$, those functions whose value depends only on the Hamming weight of the input $x$ (the number of variables equal to $1$).
△ Less
Submitted 25 April, 2014;
originally announced April 2014.
-
On CIS Circulants
Authors:
Endre Boros,
Vladimir Gurvich,
Martin Milanic
Abstract:
A circulant is a Cayley graph over a cyclic group. A well-covered graph is a graph in which all maximal stable sets are of the same size, or in other words, they are all maximum. A CIS graph is a graph in which every maximal stable set and every maximal clique intersect. It is not difficult to show that a circulant G is a CIS graph if and only if G and its complement are both well-covered and the…
▽ More
A circulant is a Cayley graph over a cyclic group. A well-covered graph is a graph in which all maximal stable sets are of the same size, or in other words, they are all maximum. A CIS graph is a graph in which every maximal stable set and every maximal clique intersect. It is not difficult to show that a circulant G is a CIS graph if and only if G and its complement are both well-covered and the product of the independence and the clique numbers of G is equal to the number of vertices. It is also easy to demonstrate that both families, the circulants and the CIS graphs, are closed with respect to the operations of taking the complement and lexicographic product. We study the structure of the CIS circulants. It is well-known that all P_4-free graphs are CIS. In this paper, in addition to the simple family of the P_4-free circulants, we construct a non-trivial sparse but infinite family of CIS circulants. We are not aware of any CIS circulant that could not be obtained from graphs in this family by the operations of taking the complement and lexicographic product.
△ Less
Submitted 14 February, 2013;
originally announced February 2013.
-
Hardness Results for Approximate Pure Horn CNF Formulae Minimization
Authors:
Endre Boros,
Aritanan Gruber
Abstract:
We study the hardness of approximation of clause minimum and literal minimum representations of pure Horn functions in $n$ Boolean variables. We show that unless P=NP, it is not possible to approximate in polynomial time the minimum number of clauses and the minimum number of literals of pure Horn CNF representations to within a factor of $2^{\log^{1-o(1)} n}$. This is the case even when the input…
▽ More
We study the hardness of approximation of clause minimum and literal minimum representations of pure Horn functions in $n$ Boolean variables. We show that unless P=NP, it is not possible to approximate in polynomial time the minimum number of clauses and the minimum number of literals of pure Horn CNF representations to within a factor of $2^{\log^{1-o(1)} n}$. This is the case even when the inputs are restricted to pure Horn 3-CNFs with $O(n^{1+\varepsilon})$ clauses, for some small positive constant $\varepsilon$. Furthermore, we show that even allowing sub-exponential time computation, it is still not possible to obtain constant factor approximations for such problems unless the Exponential Time Hypothesis turns out to be false.
△ Less
Submitted 11 March, 2014; v1 submitted 16 April, 2012;
originally announced April 2012.
-
Characterization of the Vertices and Extreme Directions of the Negative Cycles Polyhedron and Hardness of Generating Vertices of 0/1-Polyhedra
Authors:
Endre Boros,
Khaled Elbassioni,
Vladimir Gurvich,
Hans Raj Tiwary
Abstract:
Given a graph $G=(V,E)$ and a weight function on the edges $w:E\mapsto\RR$, we consider the polyhedron $P(G,w)$ of negative-weight flows on $G$, and get a complete characterization of the vertices and extreme directions of $P(G,w)$. As a corollary, we show that, unless $P=NP$, there is no output polynomial-time algorithm to generate all the vertices of a 0/1-polyhedron. This strengthens the NP-h…
▽ More
Given a graph $G=(V,E)$ and a weight function on the edges $w:E\mapsto\RR$, we consider the polyhedron $P(G,w)$ of negative-weight flows on $G$, and get a complete characterization of the vertices and extreme directions of $P(G,w)$. As a corollary, we show that, unless $P=NP$, there is no output polynomial-time algorithm to generate all the vertices of a 0/1-polyhedron. This strengthens the NP-hardness result of Khachiyan et al. (2006) for non 0/1-polyhedra, and comes in contrast with the polynomiality of vertex enumeration for 0/1-polytopes \cite{BL98} [Bussieck and Lübbecke (1998)].
△ Less
Submitted 28 April, 2008; v1 submitted 24 January, 2008;
originally announced January 2008.