Skip to main content

Showing 1–27 of 27 results for author: Dreier, J

.
  1. arXiv:2403.15201  [pdf, other

    math.CO cs.DM cs.LO math.LO

    Flip-Breakability: A Combinatorial Dichotomy for Monadically Dependent Graph Classes

    Authors: Jan Dreier, Nikolas Mählmann, Szymon Toruńczyk

    Abstract: A conjecture in algorithmic model theory predicts that the model-checking problem for first-order logic is fixed-parameter tractable on a hereditary graph class if and only if the class is monadically dependent. Originating in model theory, this notion is defined in terms of logic, and encompasses nowhere dense classes, monadically stable classes, and classes of bounded twin-width. Working towards… ▽ More

    Submitted 27 March, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

    Comments: v2: added section "Conclusions and Future Work"

  2. arXiv:2311.18740  [pdf, other

    cs.LO cs.DM cs.DS math.CO math.LO

    First-Order Model Checking on Monadically Stable Graph Classes

    Authors: Jan Dreier, Ioannis Eleftheriadis, Nikolas Mählmann, Rose McCarty, Michał Pilipczuk, Szymon Toruńczyk

    Abstract: A graph class $\mathscr{C}$ is called monadically stable if one cannot interpret, in first-order logic, arbitrary large linear orders in colored graphs from $\mathscr{C}$. We prove that the model checking problem for first-order logic is fixed-parameter tractable on every monadically stable graph class. This extends the results of [Grohe, Kreutzer, and Siebertz; J. ACM '17] for nowhere dense class… ▽ More

    Submitted 30 November, 2023; originally announced November 2023.

    Comments: 55 pages, 13 figures

  3. arXiv:2307.01832  [pdf, other

    cs.LO cs.CC cs.DM cs.DS

    Evaluating Restricted First-Order Counting Properties on Nowhere Dense Classes and Beyond

    Authors: Jan Dreier, Daniel Mock, Peter Rossmanith

    Abstract: It is known that first-order logic with some counting extensions can be efficiently evaluated on graph classes with bounded expansion, where depth-$r$ minors have constant density. More precisely, the formulas are $\exists x_1 ... x_k \#y \varphi(x_1,...,x_k, y)>N$, where $\varphi$ is an FO-formula. If $\varphi$ is quantifier-free, we can extend this result to nowhere dense graph classes with an a… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

  4. arXiv:2305.02056  [pdf, other

    cs.CC cs.DM cs.DS cs.LO

    Approximate Evaluation of Quantitative Second Order Queries

    Authors: Jan Dreier, Robert Ganian, Thekla Hamm

    Abstract: Courcelle's theorem and its adaptations to cliquewidth have shaped the field of exact parameterized algorithms and are widely considered the archetype of algorithmic meta-theorems. In the past decade, there has been growing interest in develo** parameterized approximation algorithms for problems which are not captured by Courcelle's theorem and, in particular, are considered not fixed-parameter… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    MSC Class: 68Q27; 05C85; 03B70

  5. arXiv:2304.12109  [pdf, other

    cs.LO cs.CR

    Pseudorandom Finite Models

    Authors: Jan Dreier, Jamie Tucker-Foltz

    Abstract: We study pseudorandomness and pseudorandom generators from the perspective of logical definability. Building on results from ordinary derandomization and finite model theory, we show that it is possible to deterministically construct, in polynomial time, graphs and relational structures that are statistically indistinguishable from random structures by any sentence of first order or least fixed po… ▽ More

    Submitted 24 April, 2023; originally announced April 2023.

    Comments: Extended version of LICS 2023 conference paper

    MSC Class: 03B70

  6. arXiv:2302.03527  [pdf, other

    cs.LO cs.DM cs.DS math.CO math.LO

    First-Order Model Checking on Structurally Sparse Graph Classes

    Authors: Jan Dreier, Nikolas Mählmann, Sebastian Siebertz

    Abstract: A class of graphs is structurally nowhere dense if it can be constructed from a nowhere dense class by a first-order transduction. Structurally nowhere dense classes vastly generalize nowhere dense classes and constitute important examples of monadically stable classes. We show that the first-order model checking problem is fixed-parameter tractable on every structurally nowhere dense class of gra… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

  7. arXiv:2206.14509  [pdf, other

    cs.DM cs.LO math.CO math.LO

    Combinatorial and Algorithmic Aspects of Monadic Stability

    Authors: Jan Dreier, Nikolas Mählmann, Amer E. Mouawad, Sebastian Siebertz, Alexandre Vigny

    Abstract: Nowhere dense classes of graphs are classes of sparse graphs with rich structural and algorithmic properties, however, they fail to capture even simple classes of dense graphs. Monadically stable classes, originating from model theory, generalize nowhere dense classes and close them under transductions, i.e. transformations defined by colorings and simple first-order interpretations. In this work… ▽ More

    Submitted 29 June, 2022; originally announced June 2022.

  8. arXiv:2206.13765  [pdf, other

    cs.LO cs.DM math.CO math.LO

    Indiscernibles and Flatness in Monadically Stable and Monadically NIP Classes

    Authors: Jan Dreier, Nikolas Mählmann, Sebastian Siebertz, Szymon Toruńczyk

    Abstract: Monadically stable and monadically NIP classes of structures were initially studied in the context of model theory and defined in logical terms. They have recently attracted attention in the area of structural graph theory, as they generalize notions such as nowhere denseness, bounded cliquewidth, and bounded twinwidth. Our main result is the - to the best of our knowledge first - purely combina… ▽ More

    Submitted 27 November, 2023; v1 submitted 28 June, 2022; originally announced June 2022.

    Comments: v2: revised presentation; renamed flip-wideness to flip-flatness; changed the title from "Indiscernibles and Wideness [...]" to "Indiscernibles and Flatness [...]"

  9. arXiv:2202.13335  [pdf, other

    cs.DS cs.LO

    A logic-based algorithmic meta-theorem for mim-width

    Authors: Benjamin Bergougnoux, Jan Dreier, Lars Jaffke

    Abstract: We introduce a logic called distance neighborhood logic with acyclicity and connectivity constraints ($\mathsf{A\&C~DN}$ for short) which extends existential $\mathsf{MSO_1}$ with predicates for querying neighborhoods of vertex sets and for verifying connectivity and acyclicity of vertex sets in various powers of a graph. Building upon [Bergougnoux and Kanté, ESA 2019; SIDMA 2021], we show that th… ▽ More

    Submitted 8 December, 2022; v1 submitted 27 February, 2022; originally announced February 2022.

    MSC Class: 05C85

  10. arXiv:2202.13014  [pdf, other

    cs.DS cs.DM cs.LO math.CO

    Model Checking on Interpretations of Classes of Bounded Local Cliquewidth

    Authors: Édouard Bonnet, Jan Dreier, Jakub Gajarský, Stephan Kreutzer, Nikolas Mählmann, Pierre Simon, Szymon Toruńczyk

    Abstract: We present a fixed-parameter tractable algorithm for first-order model checking on interpretations of graph classes with bounded local cliquewidth. Notably, this includes interpretations of planar graphs, and more generally, of classes of bounded genus. To obtain this result we develop a new tool which works in a very general setting of dependent classes and which we believe can be an important in… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

    Comments: 28 pages, 5 figures

    MSC Class: 05C85 ACM Class: F.2.2

  11. arXiv:2202.08326  [pdf, other

    cs.DS

    SAT Backdoors: Depth Beats Size

    Authors: Jan Dreier, Sebastian Ordyniak, Stefan Szeider

    Abstract: For several decades, much effort has been put into identifying classes of CNF formulas whose satisfiability can be decided in polynomial time. Classic results are the linear-time tractability of Horn formulas (Aspvall, Plass, and Tarjan, 1979) and Krom (i.e., 2CNF) formulas (Dowling and Gallier, 1984). Backdoors, introduced by Williams Gomes and Selman (2003), gradually extend such a tractable cla… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

  12. arXiv:2201.11082  [pdf, other

    cs.LO cs.DM math.CO

    Treelike decompositions for transductions of sparse graphs

    Authors: Jan Dreier, Jakub Gajarský, Sandra Kiefer, Michał Pilipczuk, Szymon Toruńczyk

    Abstract: We give new decomposition theorems for classes of graphs that can be transduced in first-order logic from classes of sparse graphs -- more precisely, from classes of bounded expansion and from nowhere dense classes. In both cases, the decomposition takes the form of a single colored rooted tree of bounded depth where, in addition, there can be links between nodes that are not related in the tree.… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

    Comments: 39 pages, 2 figures

  13. Lacon-, Shrub- and Parity-Decompositions: Characterizing Transductions of Bounded Expansion Classes

    Authors: Jan Dreier

    Abstract: The concept of bounded expansion provides a robust way to capture sparse graph classes with interesting algorithmic properties. Most notably, every problem definable in first-order logic can be solved in linear time on bounded expansion graph classes. First-order interpretations and transductions of sparse graph classes lead to more general, dense graph classes that seem to inherit many of the nic… ▽ More

    Submitted 5 June, 2023; v1 submitted 21 April, 2021; originally announced April 2021.

    Journal ref: Logical Methods in Computer Science, Volume 19, Issue 2 (June 6, 2023) lmcs:9013

  14. arXiv:2104.09360  [pdf, other

    math.CO

    Twin-width and generalized coloring numbers

    Authors: Jan Dreier, Jakub Gajarsky, Yiting Jiang, Patrice Ossona de Mendez, Jean-Florent Raymond

    Abstract: In this paper, we prove that a graph $G$ with no $K_{s,s}$-subgraph and twin-width $d$ has $r$-admissibility and $r$-coloring numbers bounded from above by an exponential function of $r$ and that we can construct graphs achieving such a dependency in $r$.

    Submitted 19 April, 2021; originally announced April 2021.

  15. arXiv:2010.14814  [pdf, ps, other

    cs.LO cs.DM

    Approximate Evaluation of First-Order Counting Queries

    Authors: Jan Dreier, Peter Rossmanith

    Abstract: Kuske and Schweikardt introduced the very expressive first-order counting logic FOC(P) to model database queries with counting operations. They showed that there is an efficient model-checking algorithm on graphs with bounded degree, while Grohe and Schweikardt showed that probably no such algorithm exists for trees of bounded depth. We analyze the fragment FO({>0}) of this logic. While we remov… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

  16. arXiv:2006.14488  [pdf, ps, other

    cs.DM

    First-Order Model-Checking in Random Graphs and Complex Networks

    Authors: Jan Dreier, Philipp Kuinke, Peter Rossmanith

    Abstract: Complex networks are everywhere. They appear for example in the form of biological networks, social networks, or computer networks and have been studied extensively. Efficient algorithms to solve problems on complex networks play a central role in today's society. Algorithmic meta-theorems show that many problems can be solved efficiently. Since logic is a powerful tool to model problems, it has b… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  17. arXiv:2005.09244  [pdf, ps, other

    cs.CR

    A Faster Cryptographer's Conspiracy Santa

    Authors: Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade

    Abstract: In Conspiracy Santa, a variant of Secret Santa, a group of people offer each other Christmas gifts, where each member of the group receives a gift from the other members of the group. To that end, the members of the group form conspiracies, to decide on appropriate gifts, and usually divide the cost of each gift among all participants of that conspiracy. This requires to settle the shared expenses… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Journal ref: Theoretical Computer Science, Elsevier, In press

  18. arXiv:2004.11552  [pdf, other

    cs.CR math.CO

    Optimal Threshold Padlock Systems

    Authors: Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Léo Robert

    Abstract: In 1968, Liu described the problem of securing documents in a shared secret project. In an example, at least six out of eleven participating scientists need to be present to open the lock securing the secret documents. Shamir proposed a mathematical solution to this physical problem in 1979, by designing an efficient $k$-out-of-$n$ secret sharing scheme based on Lagrange's interpolation. Liu and S… ▽ More

    Submitted 30 March, 2021; v1 submitted 24 April, 2020; originally announced April 2020.

  19. arXiv:1910.00440  [pdf, other

    cs.CC cs.DS

    The Complexity of Packing Edge-Disjoint Paths

    Authors: Jan Dreier, Janosch Fuchs, Tim A. Hartmann, Philipp Kuinke, Peter Rossmanith, Bjoern Tauer, Hung-Lung Wang

    Abstract: We introduce and study the complexity of Path Packing. Given a graph $G$ and a list of paths, the task is to embed the paths edge-disjoint in $G$. This generalizes the well known Hamiltonian-Path problem. Since Hamiltonian Path is efficiently solvable for graphs of small treewidth, we study how this result translates to the much more general Path Packing. On the positive side, we give an FPT-alg… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

  20. A Formal Analysis of 5G Authentication

    Authors: David Basin, Jannik Dreier, Lucca Hirschi, Saša Radomirović, Ralf Sasse, Vincent Stettler

    Abstract: Mobile communication networks connect much of the world's population. The security of users' calls, SMSs, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose. We provide the first comprehensive formal model of a protocol from the AKA family: 5G… ▽ More

    Submitted 10 January, 2020; v1 submitted 27 June, 2018; originally announced June 2018.

    Comments: Categories (ACM class 2012): Security and privacy - Formal methods and theory of security -- Security requirements -- Formal security models -- Logic and verification; Network protocols - Protocol correctness -- Formal specifications; Security and privacy - Network security -- Mobile and wireless security - Security services -- Privacy-preserving protocols

    Report number: Accepted at CCS'18 ACM Class: D.4.6; D.2.4; C.2.2

  21. arXiv:1803.11114  [pdf, ps, other

    cs.DM

    The Fine Structure of Preferential Attachment Graphs I: Somewhere-Denseness

    Authors: Jan Dreier, Philipp Kuinke, Peter Rossmanith

    Abstract: Preferential attachment graphs are random graphs designed to mimic properties of typical real world networks. They are constructed by a random process that iteratively adds vertices and attaches them preferentially to vertices that already have high degree. We use improved concentration bounds for vertex degrees to show that preferential attachment graphs contain asymptotically almost surely (a.a.… ▽ More

    Submitted 29 March, 2018; originally announced March 2018.

  22. arXiv:1709.09152  [pdf, other

    cs.DM

    Local Structure Theorems for Erdos Renyi Graphs and their Algorithmic Application

    Authors: Jan Dreier, Philipp Kuinke, Ba Le Xuan, Peter Rossmanith

    Abstract: We analyze some local properties of sparse Erdos-Renyi graphs, where $d(n)/n$ is the edge probability. In particular we study the behavior of very short paths. For $d(n)=n^{o(1)}$ we show that $G(n,d(n)/n)$ has asymptotically almost surely (a.a.s.~) bounded local treewidth and therefore is a.a.s.~nowhere dense. We also discover a new and simpler proof that $G(n,d/n)$ has a.a.s.~bounded expansion f… ▽ More

    Submitted 25 January, 2018; v1 submitted 26 September, 2017; originally announced September 2017.

  23. arXiv:1606.01045  [pdf, ps, other

    cs.CR

    Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen

    Authors: Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade

    Abstract: Akari, Takuzu, Kakuro and KenKen are logic games similar to Sudoku. In Akari, a labyrinth on a grid has to be lit by placing lanterns, respecting various constraints. In Takuzu a grid has to be filled with 0's and 1's, while respecting certain constraints. In Kakuro a grid has to be filled with numbers such that the sums per row and column match given values; similarly in KenKen a grid has to be f… ▽ More

    Submitted 3 June, 2016; originally announced June 2016.

    Comments: FUN with algorithms 2016, Jun 2016, La Maddalena, Italy

  24. arXiv:1412.4973  [pdf, other

    cs.SI physics.soc-ph

    Overlap** Communities in Social Networks

    Authors: Jan Dreier, Philipp Kuinke, Rafael Przybylski, Felix Reidl, Peter Rossmanith, Somnath Sikdar

    Abstract: Complex networks can be typically broken down into groups or modules. Discovering this "community structure" is an important step in studying the large-scale structure of networks. Many algorithms have been proposed for community detection and benchmarks have been created to evaluate their performance. Typically algorithms for community detection either partition the graph (non-overlap** communi… ▽ More

    Submitted 18 December, 2014; v1 submitted 16 December, 2014; originally announced December 2014.

  25. arXiv:1409.7615  [pdf, other

    cs.SI physics.soc-ph

    Overlap** Communities in Complex Networks

    Authors: Jan Dreier

    Abstract: Communities are subsets of a network that are densely connected inside and share only few connections to the rest of the network. The aim of this research is the development and evaluation of an efficient algorithm for detection of overlap**, fuzzy communities. The algorithm gets as input some members of each community that we aim to discover. We call these members seed nodes. The algorithm then… ▽ More

    Submitted 26 September, 2014; originally announced September 2014.

  26. arXiv:1210.6780  [pdf, ps, other

    cs.CR cs.GT

    Brandt's Fully Private Auction Protocol Revisited

    Authors: Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade

    Abstract: Auctions have a long history, having been recorded as early as 500 B.C. Nowadays, electronic auctions have been a great success and are increasingly used. Many cryptographic protocols have been proposed to address the various security requirements of these electronic transactions, in particular to ensure privacy. Brandt developed a protocol that computes the winner using homomorphic operations on… ▽ More

    Submitted 14 May, 2013; v1 submitted 25 October, 2012; originally announced October 2012.

    Comments: Africacrypt 2013, Le Caire : Egypt (2013)

  27. Two-dimensional wave patterns of spreading depolarization: retracting, re-entrant, and stationary waves

    Authors: Markus A. Dahlem, Rudolf Graf, Anthony J. Strong, Jens P. Dreier, Yuliya A. Dahlem, Michaela Sieber, Wolfgang Hanke, Klaus Podoll, Eckehard Schoell

    Abstract: We present spatio-temporal characteristics of spreading depolarizations (SD) in two experimental systems: retracting SD wave segments observed with intrinsic optical signals in chicken retina, and spontaneously occurring re-entrant SD waves that repeatedly spread across gyrencephalic feline cortex observed by laser speckle flowmetry. A mathematical framework of reaction-diffusion systems with au… ▽ More

    Submitted 4 March, 2009; originally announced March 2009.