-
Combining Crown Structures for Vulnerability Measures
Authors:
Katrin Casel,
Tobias Friedrich,
Aikaterini Niklanovits,
Kirill Simonov,
Ziena Zeif
Abstract:
Over the past decades, various metrics have emerged in graph theory to grasp the complex nature of network vulnerability. In this paper, we study two specific measures: (weighted) vertex integrity (wVI) and (weighted) component order connectivity (wCOC). These measures not only evaluate the number of vertices required to decompose a graph into fragments, but also take into account the size of the…
▽ More
Over the past decades, various metrics have emerged in graph theory to grasp the complex nature of network vulnerability. In this paper, we study two specific measures: (weighted) vertex integrity (wVI) and (weighted) component order connectivity (wCOC). These measures not only evaluate the number of vertices required to decompose a graph into fragments, but also take into account the size of the largest remaining component. The main focus of our paper is on kernelization algorithms tailored to both measures. We capitalize on the structural attributes inherent in different crown decompositions, strategically combining them to introduce novel kernelization algorithms that advance the current state of the field. In particular, we extend the scope of the balanced crown decomposition provided by Casel et al.~[7] and expand the applicability of crown decomposition techniques.
In summary, we improve the vertex kernel of VI from $p^3$ to $p^2$, and of wVI from $p^3$ to $3(p^2 + p^{1.5} p_{\ell})$, where $p_{\ell} < p$ represents the weight of the heaviest component after removing a solution. For wCOC we improve the vertex kernel from $\mathcal{O}(k^2W + kW^2)$ to $3μ(k + \sqrtμW)$, where $μ= \max(k,W)$. We also give a combinatorial algorithm that provides a $2kW$ vertex kernel in FPT-runtime when parameterized by $r$, where $r \leq k$ is the size of a maximum $(W+1)$-packing. We further show that the algorithm computing the $2kW$ vertex kernel for COC can be transformed into a polynomial algorithm for two special cases, namely when $W=1$, which corresponds to the well-known vertex cover problem, and for claw-free graphs. In particular, we show a new way to obtain a $2k$ vertex kernel (or to obtain a 2-approximation) for the vertex cover problem by only using crown structures.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Hamiltonicity, Path Cover, and Independence Number: An FPT Perspective
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Danil Sagunov,
Kirill Simonov
Abstract:
The connection between Hamiltonicity and the independence numbers of graphs has been a fundamental aspect of Graph Theory since the seminal works of the 1960s. This paper presents a novel algorithmic perspective on these classical problems. Our contributions are twofold.
First, we establish that a wide array of problems in undirected graphs, encompassing problems such as Hamiltonian Path and Cyc…
▽ More
The connection between Hamiltonicity and the independence numbers of graphs has been a fundamental aspect of Graph Theory since the seminal works of the 1960s. This paper presents a novel algorithmic perspective on these classical problems. Our contributions are twofold.
First, we establish that a wide array of problems in undirected graphs, encompassing problems such as Hamiltonian Path and Cycle, Path Cover, Largest Linkage, and Topological Minor Containment are fixed-parameter tractable (FPT) parameterized by the independence number of a graph. To the best of our knowledge, these results mark the first instances of FPT problems for such parameterization.
Second, we extend the algorithmic scope of the Gallai-Milgram theorem. The original theorem by Gallai and Milgram, asserts that for a graph G with the independence number α(G), the vertex set of G can be covered by at most α(G) vertex-disjoint paths. We show that determining whether a graph can be covered by fewer than α(G) - k vertex-disjoint paths is FPT parameterized by k.
Notably, the independence number parameterization, which describes graph's density, departs from the typical flow of research in parameterized complexity, which focuses on parameters describing graph's sparsity, like treewidth or vertex cover.
△ Less
Submitted 9 March, 2024;
originally announced March 2024.
-
Tests of macrorealism in meson oscillation physics
Authors:
Massimo Blasone,
Fabrizio Illuminati,
Luciano Petruzziello,
Kyrylo Simonov,
Luca Smaldone
Abstract:
Macrorealism formalizes the intuitive notion that at any given time the system occupies a definite state and that the evolution of the system is independent of the measurements performed on it, in contrast to the principles of quantum mechanics. In this study, we carry out a comparative analysis between three-time Leggett--Garg-type inequalities and the conditions of no-signaling-in-time and arrow…
▽ More
Macrorealism formalizes the intuitive notion that at any given time the system occupies a definite state and that the evolution of the system is independent of the measurements performed on it, in contrast to the principles of quantum mechanics. In this study, we carry out a comparative analysis between three-time Leggett--Garg-type inequalities and the conditions of no-signaling-in-time and arrow-of-time for macrorealism within the context of meson oscillations. Our findings indicate that, under given initial conditions, no violations of Leggett--Garg inequalities are observed. However, no-signaling-in-time conditions are found to be violated, thereby revealing the impossibility of applying a macrorealistic description to the analysis of meson physics.
△ Less
Submitted 11 June, 2024; v1 submitted 20 February, 2024;
originally announced February 2024.
-
Universal Quantum Computation via Superposed Orders of Single-Qubit Gates
Authors:
Kyrylo Simonov,
Marcello Caleffi,
Jessica Illiano,
Angela Sara Cacciapuoti
Abstract:
Superposed orders of quantum channels have already been proved - both theoretically and experimentally - to enable unparalleled opportunities in the quantum communication domain. As a matter of fact, superposition of orders can be exploited within the quantum computing domain as well, by relaxing the (traditional) assumption underlying quantum computation about applying gates in a well-defined cau…
▽ More
Superposed orders of quantum channels have already been proved - both theoretically and experimentally - to enable unparalleled opportunities in the quantum communication domain. As a matter of fact, superposition of orders can be exploited within the quantum computing domain as well, by relaxing the (traditional) assumption underlying quantum computation about applying gates in a well-defined causal order. In this context, we address a fundamental question arising with quantum computing: whether superposed orders of single-qubit gates can enable universal quantum computation. As shown in this paper, the answer to this key question is a definitive "yes". Indeed, we prove that any two-qubit controlled quantum gate can be deterministically realized, including the so-called Barenco gate that alone enables universal quantum computation.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Dimension-independent weak value estimation via controlled SWAP operations
Authors:
Giulio Chiribella,
Kyrylo Simonov,
Xuanqiang Zhao
Abstract:
Weak values of quantum observables are a powerful tool for investigating a broad spectrum of quantum phenomena. For this reason, several methods to measure them in the laboratory have been proposed. Some of these methods require weak interactions and postselection, while others are deterministic, but require statistics over a number of experiments growing exponentially with the number of measured…
▽ More
Weak values of quantum observables are a powerful tool for investigating a broad spectrum of quantum phenomena. For this reason, several methods to measure them in the laboratory have been proposed. Some of these methods require weak interactions and postselection, while others are deterministic, but require statistics over a number of experiments growing exponentially with the number of measured particles. Here we propose a deterministic dimension-independent scheme for estimating weak values of arbitrary observables. The scheme, based on coherently controlled SWAP operations, does not require prior knowledge of the initial and final states, nor of the measured observables, and therefore can work with uncharacterized preparation and measurement devices. As a byproduct, our scheme provides an alternative expression for two-time states, that is, states describing quantum systems subject to pre and post-selections. Using this expression, we show that the controlled-SWAP scheme can be used to estimate weak values for a class of two-time states associated to bipartite quantum states with positive partial transpose.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Tree Containment Above Minimum Degree is FPT
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Danil Sagunov,
Kirill Simonov
Abstract:
According to the classic Chv{á}tal's Lemma from 1977, a graph of minimum degree $δ(G)$ contains every tree on $δ(G)+1$ vertices.
Our main result is the following algorithmic "extension" of Chvátal's Lemma: For any $n$-vertex graph $G$, integer $k$, and a tree $T$ on at most $δ(G)+k$ vertices, deciding whether $G$ contains a subgraph isomorphic to $T$, can be done in time…
▽ More
According to the classic Chv{á}tal's Lemma from 1977, a graph of minimum degree $δ(G)$ contains every tree on $δ(G)+1$ vertices.
Our main result is the following algorithmic "extension" of Chvátal's Lemma: For any $n$-vertex graph $G$, integer $k$, and a tree $T$ on at most $δ(G)+k$ vertices, deciding whether $G$ contains a subgraph isomorphic to $T$, can be done in time $f(k)\cdot n^{\mathcal{O}(1)}$ for some function $f$ of $k$ only.
The proof of our main result is based on an interplay between extremal graph theory and parameterized algorithms.
△ Less
Submitted 14 October, 2023;
originally announced October 2023.
-
The $st$-Planar Edge Completion Problem is Fixed-Parameter Tractable
Authors:
Liana Khazaliya,
Philipp Kindermann,
Giuseppe Liotta,
Fabrizio Montecchiani,
Kirill Simonov
Abstract:
The problem of deciding whether a biconnected planar digraph $G=(V,E)$ can be augmented to become an $st$-planar graph by adding a set of oriented edges $E' \subseteq V \times V$ is known to be NP-complete. We show that the problem is fixed-parameter tractable when parameterized by the size of the set $E'$.
The problem of deciding whether a biconnected planar digraph $G=(V,E)$ can be augmented to become an $st$-planar graph by adding a set of oriented edges $E' \subseteq V \times V$ is known to be NP-complete. We show that the problem is fixed-parameter tractable when parameterized by the size of the set $E'$.
△ Less
Submitted 27 September, 2023;
originally announced September 2023.
-
Counting Vanishing Matrix-Vector Products
Authors:
Cornelius Brand,
Viktoriia Korchemna,
Michael Skotnica,
Kirill Simonov
Abstract:
Consider the following parameterized counting variation of the classic subset sum problem, which arises notably in the context of higher homotopy groups of topological spaces: Let $\mathbf{v} \in \mathbb{Q}^d$ be a rational vector, $(T_{1}, T_{2} \ldots T_{m})$ a list of $d \times d$ rational matrices, $S \in \mathbb{Q}^{h \times d}$ a rational matrix not necessarily square and $k$ a parameter. Th…
▽ More
Consider the following parameterized counting variation of the classic subset sum problem, which arises notably in the context of higher homotopy groups of topological spaces: Let $\mathbf{v} \in \mathbb{Q}^d$ be a rational vector, $(T_{1}, T_{2} \ldots T_{m})$ a list of $d \times d$ rational matrices, $S \in \mathbb{Q}^{h \times d}$ a rational matrix not necessarily square and $k$ a parameter. The goal is to compute the number of ways one can choose $k$ matrices $T_{i_1}, T_{i_2}, \ldots, T_{i_k}$ from the list such that $ST_{i_k} \cdots T_{i_1}\mathbf{v} = \mathbf{0} \in \mathbb{Q}^h$.
In this paper, we show that this problem is $\# W[2]$-hard for parameter $k$. As a consequence, computing the $k$-th homotopy group of a $d$-dimensional 1-connected topological space for $d > 3$ is $\# W[2]$-hard for parameter $k$. We also discuss a decision version of the problem and its several modifications for which we show $W[1]/W[2]$-hardness. This is in contrast to the parameterized $k$-sum problem, which is only $W[1]$-hard (Abboud-Lewi-Williams, ESA'14). In addition, we show that the decision version of the problem without parameter is an undecidable problem, and we give a fixed-parameter tractable algorithm for matrices of bounded size over finite fields, parameterized the matrix dimensions and the order of the field.
△ Less
Submitted 4 October, 2023; v1 submitted 24 September, 2023;
originally announced September 2023.
-
Upward and Orthogonal Planarity are W[1]-hard Parameterized by Treewidth
Authors:
Bart M. P. Jansen,
Liana Khazaliya,
Philipp Kindermann,
Giuseppe Liotta,
Fabrizio Montecchiani,
Kirill Simonov
Abstract:
Upward planarity testing and Rectilinear planarity testing are central problems in graph drawing. It is known that they are both NP-complete, but XP when parameterized by treewidth. In this paper we show that these two problems are W[1]-hard parameterized by treewidth, which answers open problems posed in two earlier papers. The key step in our proof is an analysis of the All-or-Nothing Flow probl…
▽ More
Upward planarity testing and Rectilinear planarity testing are central problems in graph drawing. It is known that they are both NP-complete, but XP when parameterized by treewidth. In this paper we show that these two problems are W[1]-hard parameterized by treewidth, which answers open problems posed in two earlier papers. The key step in our proof is an analysis of the All-or-Nothing Flow problem, a generalization of which was used as an intermediate step in the NP-completeness proof for both planarity testing problems. We prove that the flow problem is W[1]-hard parameterized by treewidth on planar graphs, and that the existing chain of reductions to the planarity testing problems can be adapted without blowing up the treewidth. Our reductions also show that the known $n^{O(tw)}$-time algorithms cannot be improved to run in time $n^{o(tw)}$ unless ETH fails.
△ Less
Submitted 3 September, 2023;
originally announced September 2023.
-
Consistency-Checking Problems: A Gateway to Parameterized Sample Complexity
Authors:
Robert Ganian,
Liana Khazaliya,
Kirill Simonov
Abstract:
Recently, Brand, Ganian and Simonov introduced a parameterized refinement of the classical PAC-learning sample complexity framework. A crucial outcome of their investigation is that for a very wide range of learning problems, there is a direct and provable correspondence between fixed-parameter PAC-learnability (in the sample complexity setting) and the fixed-parameter tractability of a correspond…
▽ More
Recently, Brand, Ganian and Simonov introduced a parameterized refinement of the classical PAC-learning sample complexity framework. A crucial outcome of their investigation is that for a very wide range of learning problems, there is a direct and provable correspondence between fixed-parameter PAC-learnability (in the sample complexity setting) and the fixed-parameter tractability of a corresponding "consistency checking" search problem (in the setting of computational complexity). The latter can be seen as generalizations of classical search problems where instead of receiving a single instance, one receives multiple yes- and no-examples and is tasked with finding a solution which is consistent with the provided examples.
Apart from a few initial results, consistency checking problems are almost entirely unexplored from a parameterized complexity perspective. In this article, we provide an overview of these problems and their connection to parameterized sample complexity, with the primary aim of facilitating further research in this direction. Afterwards, we establish the fixed-parameter (in)-tractability for some of the arguably most natural consistency checking problems on graphs, and show that their complexity-theoretic behavior is surprisingly very different from that of classical decision problems. Our new results cover consistency checking variants of problems as diverse as (k-)Path, Matching, 2-Coloring, Independent Set and Dominating Set, among others.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
Turán's Theorem Through Algorithmic Lens
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Danil Sagunov,
Kirill Simonov
Abstract:
The fundamental theorem of Turán from Extremal Graph Theory determines the exact bound on the number of edges $t_r(n)$ in an $n$-vertex graph that does not contain a clique of size $r+1$. We establish an interesting link between Extremal Graph Theory and Algorithms by providing a simple compression algorithm that in linear time reduces the problem of finding a clique of size $\ell$ in an $n$-verte…
▽ More
The fundamental theorem of Turán from Extremal Graph Theory determines the exact bound on the number of edges $t_r(n)$ in an $n$-vertex graph that does not contain a clique of size $r+1$. We establish an interesting link between Extremal Graph Theory and Algorithms by providing a simple compression algorithm that in linear time reduces the problem of finding a clique of size $\ell$ in an $n$-vertex graph $G$ with $m \ge t_r(n)-k$ edges, where $\ell\leq r+1$, to the problem of finding a maximum clique in a graph on at most $5k$ vertices. This also gives us an algorithm deciding in time $2.49^{k}\cdot(n + m)$ whether $G$ has a clique of size $\ell$. As a byproduct of the new compression algorithm, we give an algorithm that in time $2^{\mathcal{O}(td^2)} \cdot n^2$ decides whether a graph contains an independent set of size at least $n/(d+1) + t$. Here $d$ is the average vertex degree of the graph $G$. The multivariate complexity analysis based on ETH indicates that the asymptotical dependence on several parameters in the running times of our algorithms is tight.
△ Less
Submitted 14 July, 2023;
originally announced July 2023.
-
Approximating Long Cycle Above Dirac's Guarantee
Authors:
Fedor F. Fomin,
Petr A. Golovach,
Danil Sagunov,
Kirill Simonov
Abstract:
Parameterization above (or below) a guarantee is a successful concept in parameterized algorithms. The idea is that many computational problems admit ``natural'' guarantees bringing to algorithmic questions whether a better solution (above the guarantee) could be obtained efficiently. The above guarantee paradigm has led to several exciting discoveries in the areas of parameterized algorithms and…
▽ More
Parameterization above (or below) a guarantee is a successful concept in parameterized algorithms. The idea is that many computational problems admit ``natural'' guarantees bringing to algorithmic questions whether a better solution (above the guarantee) could be obtained efficiently. The above guarantee paradigm has led to several exciting discoveries in the areas of parameterized algorithms and kernelization. We argue that this paradigm could bring forth fresh perspectives on well-studied problems in approximation algorithms. Our example is the longest cycle problem. One of the oldest results in extremal combinatorics is the celebrated Dirac's theorem from 1952. Dirac's theorem provides the following guarantee on the length of the longest cycle: for every 2-connected n-vertex graph G with minimum degree δ(G)\leq n/2, the length of a longest cycle L is at least 2δ(G). Thus, the ``essential'' part in finding the longest cycle is in approximating the ``offset'' k = L - 2 δ(G). The main result of this paper is the above-guarantee approximation theorem for k. Informally, the theorem says that approximating the offset k is not harder than approximating the total length L of a cycle. In other words, for any (reasonably well-behaved) function f, a polynomial time algorithm constructing a cycle of length f(L) in an undirected graph with a cycle of length L, yields a polynomial time algorithm constructing a cycle of length 2δ(G)+Ω(f(k)).
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
A Parameterized Theory of PAC Learning
Authors:
Cornelius Brand,
Robert Ganian,
Kirill Simonov
Abstract:
Probably Approximately Correct (i.e., PAC) learning is a core concept of sample complexity theory, and efficient PAC learnability is often seen as a natural counterpart to the class P in classical computational complexity. But while the nascent theory of parameterized complexity has allowed us to push beyond the P-NP ``dichotomy'' in classical computational complexity and identify the exact bounda…
▽ More
Probably Approximately Correct (i.e., PAC) learning is a core concept of sample complexity theory, and efficient PAC learnability is often seen as a natural counterpart to the class P in classical computational complexity. But while the nascent theory of parameterized complexity has allowed us to push beyond the P-NP ``dichotomy'' in classical computational complexity and identify the exact boundaries of tractability for numerous problems, there is no analogue in the domain of sample complexity that could push beyond efficient PAC learnability.
As our core contribution, we fill this gap by develo** a theory of parameterized PAC learning which allows us to shed new light on several recent PAC learning results that incorporated elements of parameterized complexity. Within the theory, we identify not one but two notions of fixed-parameter learnability that both form distinct counterparts to the class FPT -- the core concept at the center of the parameterized complexity paradigm -- and develop the machinery required to exclude fixed-parameter learnability. We then showcase the applications of this theory to identify refined boundaries of tractability for CNF and DNF learning as well as for a range of learning problems on graphs.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Proportionally Fair Matching with Multiple Groups
Authors:
Sayan Bandyapadhyay,
Fedor V. Fomin,
Tanmay Inamdar,
Kirill Simonov
Abstract:
The study of fair algorithms has become mainstream in machine learning and artificial intelligence due to its increasing demand in dealing with biases and discrimination. Along this line, researchers have considered fair versions of traditional optimization problems including clustering, regression, ranking and voting. However, most of the efforts have been channeled into designing heuristic algor…
▽ More
The study of fair algorithms has become mainstream in machine learning and artificial intelligence due to its increasing demand in dealing with biases and discrimination. Along this line, researchers have considered fair versions of traditional optimization problems including clustering, regression, ranking and voting. However, most of the efforts have been channeled into designing heuristic algorithms, which often do not provide any guarantees on the quality of the solution. In this work, we study matching problems with the notion of proportional fairness. Proportional fairness is one of the most popular notions of group fairness where every group is represented up to an extent proportional to the final selection size. Matching with proportional fairness or more commonly, proportionally fair matching, was introduced in [Chierichetti et al., AISTATS, 2019], where the problem was studied with only two groups. However, in many practical applications, the number of groups -- although often a small constant -- is larger than two. In this work, we make the first step towards understanding the computational complexity of proportionally fair matching with more than two groups. We design exact and approximation algorithms achieving reasonable guarantees on the quality of the matching as well as on the time complexity. Our algorithms are also supported by suitable hardness bounds.
△ Less
Submitted 10 January, 2023;
originally announced January 2023.
-
No-signaling-in-time as a condition for macrorealism: the case of neutrino oscillations
Authors:
Massimo Blasone,
Fabrizio Illuminati,
Luciano Petruzziello,
Kyrylo Simonov,
Luca Smaldone
Abstract:
We consider two necessary and sufficient conditions for macrorealism recently appeared in the literature, known as no-signaling-in-time and arrow-of-time conditions, respectively, and study them in the context of neutrino flavor transitions, within both the plane wave description and the wave packet approach. We then compare the outcome of the above investigation with the implication of various fo…
▽ More
We consider two necessary and sufficient conditions for macrorealism recently appeared in the literature, known as no-signaling-in-time and arrow-of-time conditions, respectively, and study them in the context of neutrino flavor transitions, within both the plane wave description and the wave packet approach. We then compare the outcome of the above investigation with the implication of various formulations of Leggett--Garg inequalities. In particular, we show that the fulfillment of the addressed conditions for macrorealism in neutrino oscillations implies the fulfillment of Leggett--Garg inequalities, whereas the converse is not true. Finally, in the framework of wave packet approach, we also prove that, for distances longer than the coherence length, the no-signaling-in-time condition is always violated whilst Leggett--Garg inequalities are not.
△ Less
Submitted 9 February, 2023; v1 submitted 30 November, 2022;
originally announced November 2022.
-
The Fine-Grained Complexity of Graph Homomorphism Parameterized by Clique-Width
Authors:
Robert Ganian,
Thekla Hamm,
Viktoriia Korchemna,
Karolina Okrasa,
Kirill Simonov
Abstract:
The generic homomorphism problem, which asks whether an input graph $G$ admits a homomorphism into a fixed target graph $H$, has been widely studied in the literature. In this article, we provide a fine-grained complexity classification of the running time of the homomorphism problem with respect to the clique-width of $G$ (denoted $\operatorname{cw}$) for virtually all choices of $H$ under the St…
▽ More
The generic homomorphism problem, which asks whether an input graph $G$ admits a homomorphism into a fixed target graph $H$, has been widely studied in the literature. In this article, we provide a fine-grained complexity classification of the running time of the homomorphism problem with respect to the clique-width of $G$ (denoted $\operatorname{cw}$) for virtually all choices of $H$ under the Strong Exponential Time Hypothesis. In particular, we identify a property of $H$ called the signature number $s(H)$ and show that for each $H$, the homomorphism problem can be solved in time $\mathcal{O}^*(s(H)^{\operatorname{cw}})$. Crucially, we then show that this algorithm can be used to obtain essentially tight upper bounds. Specifically, we provide a reduction that yields matching lower bounds for each $H$ that is either a projective core or a graph admitting a factorization with additional properties -- allowing us to cover all possible target graphs under long-standing conjectures.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Observability of spontaneous collapse in flavor oscillations and its relation to the CP and CPT symmetries
Authors:
Kyrylo Simonov
Abstract:
Spontaneous collapse models aim at solving the measurement problem of quantum mechanics by introducing collapse of wave function as an ontologically objective mechanism that suppresses macroscopic superpositions. In particular, the strength of collapse depends on the mass of the system. Flavor oscillating systems such as neutral mesons feature superpositions of states of different masses and, henc…
▽ More
Spontaneous collapse models aim at solving the measurement problem of quantum mechanics by introducing collapse of wave function as an ontologically objective mechanism that suppresses macroscopic superpositions. In particular, the strength of collapse depends on the mass of the system. Flavor oscillating systems such as neutral mesons feature superpositions of states of different masses and, hence, could be used to test the validity of spontaneous collapse models. Recently, it has been shown that the mass-proportional CSL model causes exponential dam** of the neutral meson oscillations which, however, is not strong enough to be observed in the present accelerator facilities. In this Letter, we study how the violation of the $\mathcal{CP}$ symmetry in mixing changes the spontaneous collapse effect on flavor oscillations and its observability.
△ Less
Submitted 20 September, 2022; v1 submitted 30 August, 2022;
originally announced August 2022.
-
Testing Upward Planarity of Partial $2$-Trees
Authors:
Steven Chaplick,
Emilio Di Giacomo,
Fabrizio Frati,
Robert Ganian,
Chrysanthi N. Raftopoulou,
Kirill Simonov
Abstract:
We present an $O(n^2)$-time algorithm to test whether an $n$-vertex directed partial $2$-tree is upward planar. This result improves upon the previously best known algorithm, which runs in $O(n^4)$ time.
We present an $O(n^2)$-time algorithm to test whether an $n$-vertex directed partial $2$-tree is upward planar. This result improves upon the previously best known algorithm, which runs in $O(n^4)$ time.
△ Less
Submitted 26 August, 2022;
originally announced August 2022.
-
Measuring incompatibility and clustering quantum observables with a quantum switch
Authors:
Ning Gao,
Dantong Li,
Anchit Mishra,
Junchen Yan,
Kyrylo Simonov,
Giulio Chiribella
Abstract:
The existence of incompatible observables is a cornerstone of quantum mechanics and a valuable resource in quantum technologies. Here we introduce a measure of incompatibility, called the mutual eigenspace disturbance (MED), which quantifies the amount of disturbance induced by the measurement of a sharp observable on the eigenspaces of another. The MED provides a metric on the space of von Neuman…
▽ More
The existence of incompatible observables is a cornerstone of quantum mechanics and a valuable resource in quantum technologies. Here we introduce a measure of incompatibility, called the mutual eigenspace disturbance (MED), which quantifies the amount of disturbance induced by the measurement of a sharp observable on the eigenspaces of another. The MED provides a metric on the space of von Neumann measurements, and can be efficiently estimated by letting the measurement processes act in an indefinite order, using a setup known as the quantum switch, which also allows one to quantify the noncommutativity of arbitrary quantum processes. Thanks to these features, the MED can be used in quantum machine learning tasks. We demonstrate this application by providing an unsupervised algorithm that clusters unknown von Neumann measurements. Our algorithm is robust to noise can be used to identify groups of observers that share approximately the same measurement context.
△ Less
Submitted 9 May, 2023; v1 submitted 12 August, 2022;
originally announced August 2022.
-
Activation of thermal states by coherently controlled thermalization processes
Authors:
Kyrylo Simonov,
Saptarshi Roy,
Tamal Guha,
Zoltán Zimborás,
Giulio Chiribella
Abstract:
Thermalization processes degrade the states of any working medium, turning any initial state into a passive state from which no work can be extracted. Recently, it has been shown that this degradation can be avoided if two identical thermalization processes take place in coherently controlled order, in a scenario known as the quantum SWITCH. In some situations, control over the order even enables…
▽ More
Thermalization processes degrade the states of any working medium, turning any initial state into a passive state from which no work can be extracted. Recently, it has been shown that this degradation can be avoided if two identical thermalization processes take place in coherently controlled order, in a scenario known as the quantum SWITCH. In some situations, control over the order even enables work extraction when the medium was initially in a passive state. This activation phenomenon, however, is subject to a limitation: to extract non-zero work, the initial temperature of the medium should be less than half of the temperature of the reservoirs. Here we analyze this limitation, showing that it still holds true even when the medium interacts with $N\ge 2$ reservoirs in a coherently-controlled order. Then, we show that the limitation can be lifted when the medium and the control systems are initially correlated. In particular, when the medium and control are entangled, work extraction becomes possible for every initial value of the local temperature of the medium.
△ Less
Submitted 7 November, 2023; v1 submitted 8 August, 2022;
originally announced August 2022.
-
Fixed-Parameter Tractability of Maximum Colored Path and Beyond
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Tuukka Korhonen,
Kirill Simonov,
Giannos Stamoulis
Abstract:
We introduce a general method for obtaining fixed-parameter algorithms for problems about finding paths in undirected graphs, where the length of the path could be unbounded in the parameter. The first application of our method is as follows.
We give a randomized algorithm, that given a colored $n$-vertex undirected graph, vertices $s$ and $t$, and an integer $k$, finds an $(s,t)$-path containin…
▽ More
We introduce a general method for obtaining fixed-parameter algorithms for problems about finding paths in undirected graphs, where the length of the path could be unbounded in the parameter. The first application of our method is as follows.
We give a randomized algorithm, that given a colored $n$-vertex undirected graph, vertices $s$ and $t$, and an integer $k$, finds an $(s,t)$-path containing at least $k$ different colors in time $2^k n^{O(1)}$. This is the first FPT algorithm for this problem, and it generalizes the algorithm of Björklund, Husfeldt, and Taslaman [SODA 2012] on finding a path through $k$ specified vertices. It also implies the first $2^k n^{O(1)}$ time algorithm for finding an $(s,t)$-path of length at least $k$.
Our method yields FPT algorithms for even more general problems. For example, we consider the problem where the input consists of an $n$-vertex undirected graph $G$, a matroid $M$ whose elements correspond to the vertices of $G$ and which is represented over a finite field of order $q$, a positive integer weight function on the vertices of $G$, two sets of vertices $S,T \subseteq V(G)$, and integers $p,k,w$, and the task is to find $p$ vertex-disjoint paths from $S$ to $T$ so that the union of the vertices of these paths contains an independent set of $M$ of cardinality $k$ and weight $w$, while minimizing the sum of the lengths of the paths. We give a $2^{p+O(k^2 \log (q+k))} n^{O(1)} w$ time randomized algorithm for this problem.
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
Weighted Model Counting with Twin-Width
Authors:
Robert Ganian,
Filip Pokrývka,
André Schidler,
Kirill Simonov,
Stefan Szeider
Abstract:
Bonnet et al. (FOCS 2020) introduced the graph invariant twin-width and showed that many NP-hard problems are tractable for graphs of bounded twin-width, generalizing similar results for other width measures, including treewidth and clique-width. In this paper, we investigate the use of twin-width for solving the propositional satisfiability problem (SAT) and propositional model counting. We parti…
▽ More
Bonnet et al. (FOCS 2020) introduced the graph invariant twin-width and showed that many NP-hard problems are tractable for graphs of bounded twin-width, generalizing similar results for other width measures, including treewidth and clique-width. In this paper, we investigate the use of twin-width for solving the propositional satisfiability problem (SAT) and propositional model counting. We particularly focus on Bounded-ones Weighted Model Counting (BWMC), which takes as input a CNF formula $F$ along with a bound $k$ and asks for the weighted sum of all models with at most $k$ positive literals. BWMC generalizes not only SAT but also (weighted) model counting.
We develop the notion of "signed" twin-width of CNF formulas and establish that BWMC is fixed-parameter tractable when parameterized by the certified signed twin-width of $F$ plus $k$. We show that this result is tight: it is neither possible to drop the bound $k$ nor use the vanilla twin-width instead if one wishes to retain fixed-parameter tractability, even for the easier problem SAT. Our theoretical results are complemented with an empirical evaluation and comparison of signed twin-width on various classes of CNF formulas.
△ Less
Submitted 3 June, 2022;
originally announced June 2022.
-
The Quantum Internet: Enhancing Classical Internet Services one Qubit at a Time
Authors:
Angela Sara Cacciapuoti,
Jessica Illiano,
Seid Koudia,
Kyrylo Simonov,
Marcello Caleffi
Abstract:
Nowadays, the classical Internet has mainly envisioned as the underlying communication infrastructure of the Quantum Internet, aimed at providing services such as signaling and coordination messages. However, the interplay between classical and Quantum Internet is complex and its understanding is pivotal for an effective design of the Quantum Internet protocol stack. The aim of the paper is to she…
▽ More
Nowadays, the classical Internet has mainly envisioned as the underlying communication infrastructure of the Quantum Internet, aimed at providing services such as signaling and coordination messages. However, the interplay between classical and Quantum Internet is complex and its understanding is pivotal for an effective design of the Quantum Internet protocol stack. The aim of the paper is to shed the light on this interplay, by highlighting that such an interplay is indeed bidirectional rather than unidirectional. And the Quantum Internet exhibits the potential of supporting and even enhancing classical Internet functionalities.
△ Less
Submitted 19 May, 2022;
originally announced May 2022.
-
Parameterized Algorithms for Upward Planarity
Authors:
Steven Chaplick,
Emilio Di Giacomo,
Fabrizio Frati,
Robert Ganian,
Chrysanthi N. Raftopoulou,
Kirill Simonov
Abstract:
We obtain new parameterized algorithms for the classical problem of determining whether a directed acyclic graph admits an upward planar drawing. Our results include a new fixed-parameter algorithm parameterized by the number of sources, an XP-algorithm parameterized by treewidth, and a fixed-parameter algorithm parameterized by treedepth. All three algorithms are obtained using a novel framework…
▽ More
We obtain new parameterized algorithms for the classical problem of determining whether a directed acyclic graph admits an upward planar drawing. Our results include a new fixed-parameter algorithm parameterized by the number of sources, an XP-algorithm parameterized by treewidth, and a fixed-parameter algorithm parameterized by treedepth. All three algorithms are obtained using a novel framework for the problem that combines SPQR tree-decompositions with parameterized techniques. Our approach unifies and pushes beyond previous tractability results for the problem on series-parallel digraphs, single-source digraphs and outerplanar digraphs.
△ Less
Submitted 10 March, 2022;
originally announced March 2022.
-
Longest Cycle above Erdős-Gallai Bound
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Danil Sagunov,
Kirill Simonov
Abstract:
In 1959, Erdős and Gallai proved that every graph G with average vertex degree ad(G)\geq 2 contains a cycle of length at least ad(G). We provide an algorithm that for k\geq 0 in time 2^{O(k)} n^{O(1)} decides whether a 2-connected n-vertex graph G contains a cycle of length at least ad(G)+k. This resolves an open problem explicitly mentioned in several papers. The main ingredients of our algorithm…
▽ More
In 1959, Erdős and Gallai proved that every graph G with average vertex degree ad(G)\geq 2 contains a cycle of length at least ad(G). We provide an algorithm that for k\geq 0 in time 2^{O(k)} n^{O(1)} decides whether a 2-connected n-vertex graph G contains a cycle of length at least ad(G)+k. This resolves an open problem explicitly mentioned in several papers. The main ingredients of our algorithm are new graph-theoretical results interesting on their own.
△ Less
Submitted 7 February, 2022;
originally announced February 2022.
-
Detours in Directed Graphs
Authors:
Fedor V. Fomin,
Petr A. Golovach,
William Lochet,
Danil Sagunov,
Kirill Simonov,
Saket Saurabh
Abstract:
We study two "above guarantee" versions of the classical Longest Path problem on undirected and directed graphs and obtain the following results. In the first variant of Longest Path that we study, called Longest Detour, the task is to decide whether a graph has an (s,t)-path of length at least dist_G(s,t)+k (where dist_G(s,t) denotes the length of a shortest path from s to t). Bezáková et al. pro…
▽ More
We study two "above guarantee" versions of the classical Longest Path problem on undirected and directed graphs and obtain the following results. In the first variant of Longest Path that we study, called Longest Detour, the task is to decide whether a graph has an (s,t)-path of length at least dist_G(s,t)+k (where dist_G(s,t) denotes the length of a shortest path from s to t). Bezáková et al. proved that on undirected graphs the problem is fixed-parameter tractable (FPT) by providing an algorithm of running time 2^{O (k)} n. Further, they left the parameterized complexity of the problem on directed graphs open. Our first main result establishes a connection between Longest Detour on directed graphs and 3-Disjoint Paths on directed graphs. Using these new insights, we design a 2^{O(k)} n^{O(1)} time algorithm for the problem on directed planar graphs. Further, the new approach yields a significantly faster FPT algorithm on undirected graphs.
In the second variant of Longest Path, namely Longest Path Above Diameter, the task is to decide whether the graph has a path of length at least diam(G)+k (diam(G) denotes the length of a longest shortest path in a graph G). We obtain dichotomy results about Longest Path Above Diameter on undirected and directed graphs. For (un)directed graphs, Longest Path Above Diameter is NP-complete even for k=1. However, if the input undirected graph is 2-connected, then the problem is FPT. On the other hand, for 2-connected directed graphs, we show that Longest Path Above Diameter is solvable in polynomial time for each k\in{1,\dots, 4} and is NP-complete for every k\geq 5. The parameterized complexity of Longest Path Above Diameter on general directed graphs remains an interesting open problem.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
How to Find a Good Explanation for Clustering?
Authors:
Sayan Bandyapadhyay,
Fedor V. Fomin,
Petr A. Golovach,
William Lochet,
Nidhi Purohit,
Kirill Simonov
Abstract:
$k$-means and $k$-median clustering are powerful unsupervised machine learning techniques. However, due to complicated dependences on all the features, it is challenging to interpret the resulting cluster assignments. Moshkovitz, Dasgupta, Rashtchian, and Frost [ICML 2020] proposed an elegant model of explainable $k$-means and $k$-median clustering. In this model, a decision tree with $k…
▽ More
$k$-means and $k$-median clustering are powerful unsupervised machine learning techniques. However, due to complicated dependences on all the features, it is challenging to interpret the resulting cluster assignments. Moshkovitz, Dasgupta, Rashtchian, and Frost [ICML 2020] proposed an elegant model of explainable $k$-means and $k$-median clustering. In this model, a decision tree with $k$ leaves provides a straightforward characterization of the data set into clusters.
We study two natural algorithmic questions about explainable clustering. (1) For a given clustering, how to find the "best explanation" by using a decision tree with $k$ leaves? (2) For a given set of points, how to find a decision tree with $k$ leaves minimizing the $k$-means/median objective of the resulting explainable clustering? To address the first question, we introduce a new model of explainable clustering. Our model, inspired by the notion of outliers in robust statistics, is the following. We are seeking a small number of points (outliers) whose removal makes the existing clustering well-explainable. For addressing the second question, we initiate the study of the model of Moshkovitz et al. from the perspective of multivariate complexity. Our rigorous algorithmic analysis sheds some light on the influence of parameters like the input size, dimension of the data, the number of outliers, the number of clusters, and the approximation ratio, on the computational complexity of explainable clustering.
△ Less
Submitted 16 December, 2021; v1 submitted 13 December, 2021;
originally announced December 2021.
-
How Deep the Theory of Quantum Communications Goes: Superadditivity, Superactivation and Causal Activation
Authors:
Seid Koudia,
Angela Sara Cacciapuoti,
Kyrylo Simonov,
Marcello Caleffi
Abstract:
In the theory of quantum communications, a deeper structure has been recently unveiled, showing that the capacity does not completely characterize the channel ability to transmit information due to phenomena -- namely, superadditivity, superactivation and causal activation -- with no counterpart in the classical world. Although how deep goes this structure is yet to be fully uncovered, it is cruci…
▽ More
In the theory of quantum communications, a deeper structure has been recently unveiled, showing that the capacity does not completely characterize the channel ability to transmit information due to phenomena -- namely, superadditivity, superactivation and causal activation -- with no counterpart in the classical world. Although how deep goes this structure is yet to be fully uncovered, it is crucial for the communication engineering community to own the implications of these phenomena for understanding and deriving the fundamental limits of communications. Hence, the aim of this treatise is to shed light on these phenomena by providing the reader with an easy access and guide towards the relevant literature and the prominent results from a communication engineering perspective.
△ Less
Submitted 20 June, 2022; v1 submitted 16 August, 2021;
originally announced August 2021.
-
FPT Approximation for Fair Minimum-Load Clustering
Authors:
Sayan Bandyapadhyay,
Fedor V. Fomin,
Petr A. Golovach,
Nidhi Purohit,
Kirill Simonov
Abstract:
In this paper, we consider the Minimum-Load $k$-Clustering/Facility Location (MLkC) problem where we are given a set $P$ of $n$ points in a metric space that we have to cluster and an integer $k$ that denotes the number of clusters. Additionally, we are given a set $F$ of cluster centers in the same metric space. The goal is to select a set $C\subseteq F$ of $k$ centers and assign each point in…
▽ More
In this paper, we consider the Minimum-Load $k$-Clustering/Facility Location (MLkC) problem where we are given a set $P$ of $n$ points in a metric space that we have to cluster and an integer $k$ that denotes the number of clusters. Additionally, we are given a set $F$ of cluster centers in the same metric space. The goal is to select a set $C\subseteq F$ of $k$ centers and assign each point in $P$ to a center in $C$, such that the maximum load over all centers is minimized. Here the load of a center is the sum of the distances between it and the points assigned to it.
Although clustering/facility location problems have a rich literature, the minimum-load objective is not studied substantially, and hence MLkC has remained a poorly understood problem. More interestingly, the problem is notoriously hard even in some special cases including the one in line metrics as shown by Ahmadian et al. [ACM Trans. Algo. 2018]. They also show APX-hardness of the problem in the plane. On the other hand, the best-known approximation factor for MLkC is $O(k)$, even in the plane.
In this work, we study a fair version of MLkC inspired by the work of Chierichetti et al. [NeurIPS, 2017], which generalizes MLkC. Here the input points are colored by one of the $\ell$ colors denoting the group they belong to. MLkC is the special case with $\ell=1$. Considering this problem, we are able to obtain a $3$-approximation in $f(k,\ell)\cdot n^{O(1)}$ time. Also, our scheme leads to an improved $(1 + ε)$-approximation in case of Euclidean norm, and in this case, the running time depends only polynomially on the dimension $d$. Our results imply the same approximations for MLkC with running time $f(k)\cdot n^{O(1)}$, achieving the first constant approximations for this problem in general and Euclidean metric spaces.
△ Less
Submitted 20 July, 2021;
originally announced July 2021.
-
Lossy Kernelization of Same-Size Clustering
Authors:
Sayan Bandyapadhyay,
Fedor V. Fomin,
Petr A. Golovach,
Nidhi Purohit,
Kirill Simonov
Abstract:
In this work, we study the $k$-median clustering problem with an additional equal-size constraint on the clusters, from the perspective of parameterized preprocessing. Our main result is the first lossy ($2$-approximate) polynomial kernel for this problem, parameterized by the cost of clustering. We complement this result by establishing lower bounds for the problem that eliminate the existences o…
▽ More
In this work, we study the $k$-median clustering problem with an additional equal-size constraint on the clusters, from the perspective of parameterized preprocessing. Our main result is the first lossy ($2$-approximate) polynomial kernel for this problem, parameterized by the cost of clustering. We complement this result by establishing lower bounds for the problem that eliminate the existences of an (exact) kernel of polynomial size and a PTAS.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Parameterized Complexity of Feature Selection for Categorical Data Clustering
Authors:
Sayan Bandyapadhyay,
Fedor V. Fomin,
Petr A. Golovach,
Kirill Simonov
Abstract:
We develop new algorithmic methods with provable guarantees for feature selection in regard to categorical data clustering. While feature selection is one of the most common approaches to reduce dimensionality in practice, most of the known feature selection methods are heuristics. We study the following mathematical model. We assume that there are some inadvertent (or undesirable) features of the…
▽ More
We develop new algorithmic methods with provable guarantees for feature selection in regard to categorical data clustering. While feature selection is one of the most common approaches to reduce dimensionality in practice, most of the known feature selection methods are heuristics. We study the following mathematical model. We assume that there are some inadvertent (or undesirable) features of the input data that unnecessarily increase the cost of clustering. Consequently, we want to select a subset of the original features from the data such that there is a small-cost clustering on the selected features. More precisely, for given integers $\ell$ (the number of irrelevant features) and $k$ (the number of clusters), budget $B$, and a set of $n$ categorical data points (represented by $m$-dimensional vectors whose elements belong to a finite set of values $Σ$), we want to select $m-\ell$ relevant features such that the cost of any optimal $k$-clustering on these features does not exceed $B$. Here the cost of a cluster is the sum of Hamming distances ($\ell_0$-distances) between the selected features of the elements of the cluster and its center. The clustering cost is the total sum of the costs of the clusters. We use the framework of parameterized complexity to identify how the complexity of the problem depends on parameters $k$, $B$, and $|Σ|$. Our main result is an algorithm that solves the Feature Selection problem in time $f(k,B,|Σ|)\cdot m^{g(k,|Σ|)}\cdot n^2$ for some functions $f$ and $g$. In other words, the problem is fixed-parameter tractable parameterized by $B$ when $|Σ|$ and $k$ are constants. Our algorithm is based on a solution to a more general problem, Constrained Clustering with Outliers. We also complement our algorithmic findings with complexity lower bounds.
△ Less
Submitted 19 August, 2021; v1 submitted 8 May, 2021;
originally announced May 2021.
-
Algorithmic Extensions of Dirac's Theorem
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Danil Sagunov,
Kirill Simonov
Abstract:
In 1952, Dirac proved the following theorem about long cycles in graphs with large minimum vertex degrees: Every $n$-vertex $2$-connected graph $G$ with minimum vertex degree $δ\geq 2$ contains a cycle with at least $\min\{2δ,n\}$ vertices. In particular, if $δ\geq n/2$, then $G$ is Hamiltonian. The proof of Dirac's theorem is constructive, and it yields an algorithm computing the corresponding cy…
▽ More
In 1952, Dirac proved the following theorem about long cycles in graphs with large minimum vertex degrees: Every $n$-vertex $2$-connected graph $G$ with minimum vertex degree $δ\geq 2$ contains a cycle with at least $\min\{2δ,n\}$ vertices. In particular, if $δ\geq n/2$, then $G$ is Hamiltonian. The proof of Dirac's theorem is constructive, and it yields an algorithm computing the corresponding cycle in polynomial time. The combinatorial bound of Dirac's theorem is tight in the following sense. There are 2-connected graphs that do not contain cycles of length more than $2δ+1$. Also, there are non-Hamiltonian graphs with all vertices but one of degree at least $n/2$. This prompts naturally to the following algorithmic questions. For $k\geq 1$,
(A) How difficult is to decide whether a 2-connected graph contains a cycle of length at least $\min\{2δ+k,n\}$?
(B) How difficult is to decide whether a graph $G$ is Hamiltonian, when at least $n - k$ vertices of $G$ are of degrees at least $n/2-k$?
The first question was asked by Fomin, Golovach, Lokshtanov, Panolan, Saurabh, and Zehavi. The second question is due to Jansen, Kozma, and Nederlof. Even for a very special case of $k=1$, the existence of a polynomial-time algorithm deciding whether $G$ contains a cycle of length at least $\min\{2δ+1,n\}$ was open. We resolve both questions by proving the following algorithmic generalization of Dirac's theorem: If all but $k$ vertices of a $2$-connected graph $G$ are of degree at least $δ$, then deciding whether $G$ has a cycle of length at least $\min\{2δ+k, n\}$ can be done in time $2^{\mathcal{O}(k)}\cdot n^{\mathcal{O}(1)}$.
The proof of the algorithmic generalization of Dirac's theorem builds on new graph-theoretical results that are interesting on their own.
△ Less
Submitted 11 April, 2024; v1 submitted 6 November, 2020;
originally announced November 2020.
-
Electronic Coupling between the Unoccupied States of the Organic and Inorganic Sub-Lattices of Methylammonium Lead Iodide a Hybrid Organic-Inorganic Perovskite Single Crystal
Authors:
Gabriel J. Man,
Cody M. Sterling,
Chinnathambi Kamal,
Konstantin A. Simonov,
Sebastian Svanström,
Joydev Acharya,
Fredrik O. L. Johansson,
Erika Giangrisostomi,
Ruslan Ovsyannikov,
Thomas Huthwelker,
Sergei M. Butorin,
Pabitra K. Nayak,
Michael Odelius,
Håkan Rensmo
Abstract:
Organic-inorganic halide perovskites have been intensively re-investigated due to their applications, yet the opto-electronic function of the organic cation remains unclear. Through organic-selective resonant Auger electron spectroscopy measurements on well-defined single crystal surfaces, we find evidence for electronic coupling in the unoccupied states between the organic and inorganic sub-latti…
▽ More
Organic-inorganic halide perovskites have been intensively re-investigated due to their applications, yet the opto-electronic function of the organic cation remains unclear. Through organic-selective resonant Auger electron spectroscopy measurements on well-defined single crystal surfaces, we find evidence for electronic coupling in the unoccupied states between the organic and inorganic sub-lattices of the prototypical hybrid perovskite, which is contrary to the notion based on previous studies that the organic cation is electronically inert. The coupling is relevant for electron dynamics in the material and for understanding opto-electronic functionality.
△ Less
Submitted 18 May, 2021; v1 submitted 3 November, 2020;
originally announced November 2020.
-
EPTAS for $k$-means Clustering of Affine Subspaces
Authors:
Eduard Eiben,
Fedor V. Fomin,
Petr A. Golovach,
William Lochet,
Fahad Panolan,
Kirill Simonov
Abstract:
We consider a generalization of the fundamental $k$-means clustering for data with incomplete or corrupted entries. When data objects are represented by points in $\mathbb{R}^d$, a data point is said to be incomplete when some of its entries are missing or unspecified. An incomplete data point with at most $Δ$ unspecified entries corresponds to an axis-parallel affine subspace of dimension at most…
▽ More
We consider a generalization of the fundamental $k$-means clustering for data with incomplete or corrupted entries. When data objects are represented by points in $\mathbb{R}^d$, a data point is said to be incomplete when some of its entries are missing or unspecified. An incomplete data point with at most $Δ$ unspecified entries corresponds to an axis-parallel affine subspace of dimension at most $Δ$, called a $Δ$-point. Thus we seek a partition of $n$ input $Δ$-points into $k$ clusters minimizing the $k$-means objective. For $Δ=0$, when all coordinates of each point are specified, this is the usual $k$-means clustering. We give an algorithm that finds an $(1+ ε)$-approximate solution in time $f(k,ε, Δ) \cdot n^2 \cdot d$ for some function $f$ of $k,ε$, and $Δ$ only.
△ Less
Submitted 19 October, 2020;
originally announced October 2020.
-
Work extraction from coherently activated maps via quantum switch
Authors:
Kyrylo Simonov,
Gianluca Francica,
Giacomo Guarnieri,
Mauro Paternostro
Abstract:
We characterize the impact that the application of two maps in a quantum-controlled order has on the process of work extraction via unitary cycles and its optimization. The control is based on the quantum switch model that applies maps in an order not necessarily compatible with the underlying causal structure and, in principle, can be implemented experimentally. First, we show that the activation…
▽ More
We characterize the impact that the application of two maps in a quantum-controlled order has on the process of work extraction via unitary cycles and its optimization. The control is based on the quantum switch model that applies maps in an order not necessarily compatible with the underlying causal structure and, in principle, can be implemented experimentally. First, we show that the activation of quantum maps through the quantum switch model always entails a non-negative gain in ergotropy compared to their consecutive application. We also establish a condition that the maps should fulfill in order to achieve a non-zero ergotropic gain. We then perform a thorough analysis of maps applied to a two-level system and provide general conditions for achieving a positive gain on the incoherent part of ergotropy. Our results are illustrated with several examples and applied to qubit and $d$-dimensional quantum systems. In particular, we demonstrate that a non-zero work can be extracted from a system thermalized by two coherently controlled reservoirs.
△ Less
Submitted 30 March, 2022; v1 submitted 23 September, 2020;
originally announced September 2020.
-
Particle mixing and the emergence of classicality: A spontaneous-collapse-model view
Authors:
Kyrylo Simonov
Abstract:
Spontaneous collapse models aim to resolve the measurement problem in quantum mechanics by considering wave-function collapse as a physical process. We analyze how these models affect a decaying flavor-oscillating system whose evolution is governed by a phenomenological non-Hermitian Hamiltonian. In turn, we apply two popular collapse models, the Quantum Mechanics with Universal Position Localizat…
▽ More
Spontaneous collapse models aim to resolve the measurement problem in quantum mechanics by considering wave-function collapse as a physical process. We analyze how these models affect a decaying flavor-oscillating system whose evolution is governed by a phenomenological non-Hermitian Hamiltonian. In turn, we apply two popular collapse models, the Quantum Mechanics with Universal Position Localization and the Continuous Spontaneous Localization models, to a neutral meson system. By using the equivalence between the approaches to the time evolution of decaying systems with a non-Hermitian Hamiltonian and a dissipator of the Lindblad form in an enlarged Hilbert space, we show that spontaneous collapse can induce the decay dynamics in both quantum state and master equations. Moreover, we show that the decay property of a flavor-oscillating system is intimately connected to the time (a)symmetry of the noise field underlying the collapse mechanism. This (a)symmetry, in turn, is related to the definition of the stochastic integral and can provide a physical intuition behind the Itō-Stratonovich dilemma in stochastic calculus.
△ Less
Submitted 25 August, 2020;
originally announced August 2020.
-
On Coresets for Fair Clustering in Metric and Euclidean Spaces and Their Applications
Authors:
Sayan Bandyapadhyay,
Fedor V. Fomin,
Kirill Simonov
Abstract:
Fair clustering is a constrained variant of clustering where the goal is to partition a set of colored points, such that the fraction of points of any color in every cluster is more or less equal to the fraction of points of this color in the dataset. This variant was recently introduced by Chierichetti et al. [NeurIPS, 2017] in a seminal work and became widely popular in the clustering literature…
▽ More
Fair clustering is a constrained variant of clustering where the goal is to partition a set of colored points, such that the fraction of points of any color in every cluster is more or less equal to the fraction of points of this color in the dataset. This variant was recently introduced by Chierichetti et al. [NeurIPS, 2017] in a seminal work and became widely popular in the clustering literature. In this paper, we propose a new construction of coresets for fair clustering based on random sampling. The new construction allows us to obtain the first coreset for fair clustering in general metric spaces. For Euclidean spaces, we obtain the first coreset whose size does not depend exponentially on the dimension. Our coreset results solve open questions proposed by Schmidt et al. [WAOA, 2019] and Huang et al. [NeurIPS, 2019]. The new coreset construction helps to design several new approximation and streaming algorithms. In particular, we obtain the first true constant-approximation algorithm for metric fair clustering, whose running time is fixed-parameter tractable (FPT). In the Euclidean case, we derive the first $(1+ε)$-approximation algorithm for fair clustering whose time complexity is near-linear and does not depend exponentially on the dimension of the space. Besides, our coreset construction scheme is fairly general and gives rise to coresets for a wide range of constrained clustering problems. This leads to improved constant-approximations for these problems in general metrics and near-linear time $(1+ε)$-approximations in the Euclidean metric.
△ Less
Submitted 20 July, 2020;
originally announced July 2020.
-
A characterization of singular Schrödinger operators on the half-line
Authors:
Raffaele Scandone,
Lorenzo Luperi Baglini,
Kyrylo Simonov
Abstract:
We study a class of delta-like perturbations of the Laplacian on the half-line, characterized by Robin boundary conditions at the origin. Using the formalism of nonstandard analysis, we derive a simple connection with a suitable family of Schrödinger operators with potentials of very large (infinite) magnitude and very short (infinitesimal) range. As a consequence, we also derive a similar result…
▽ More
We study a class of delta-like perturbations of the Laplacian on the half-line, characterized by Robin boundary conditions at the origin. Using the formalism of nonstandard analysis, we derive a simple connection with a suitable family of Schrödinger operators with potentials of very large (infinite) magnitude and very short (infinitesimal) range. As a consequence, we also derive a similar result for point interactions in the Euclidean space $\mathbb{R}^3$, in the case of radial potentials. Moreover, we discuss explicitly our results in the case of potentials that are linear in a neighbourhood of the origin.
△ Less
Submitted 30 November, 2020; v1 submitted 8 April, 2020;
originally announced April 2020.
-
Building large k-cores from sparse graphs
Authors:
Fedor V. Fomin,
Danil Sagunov,
Kirill Simonov
Abstract:
A popular model to measure network stability is the $k$-core, that is the maximal induced subgraph in which every vertex has degree at least $k$. For example, $k$-cores are commonly used to model the unraveling phenomena in social networks. In this model, users having less than $k$ connections within the network leave it, so the remaining users form exactly the $k$-core. In this paper we study the…
▽ More
A popular model to measure network stability is the $k$-core, that is the maximal induced subgraph in which every vertex has degree at least $k$. For example, $k$-cores are commonly used to model the unraveling phenomena in social networks. In this model, users having less than $k$ connections within the network leave it, so the remaining users form exactly the $k$-core. In this paper we study the question whether it is possible to make the network more robust by spending only a limited amount of resources on new connections. A mathematical model for the $k$-core construction problem is the following Edge $k$-Core optimization problem. We are given a graph $G$ and integers $k$, $b$ and $p$. The task is to ensure that the $k$-core of $G$ has at least $p$ vertices by adding at most $b$ edges.
The previous studies on Edge $k$-Core demonstrate that the problem is computationally challenging. In particular, it is NP-hard when $k=3$, W[1]-hard being parameterized by $k+b+p$ (Chitnis and Talmon, 2018), and APX-hard (Zhou et al, 2019). Nevertheless, we show that there are efficient algorithms with provable guarantee when the $k$-core has to be constructed from a sparse graph with some additional structural properties. Our results are 1) When the input graph is a forest, Edge $k$-Core is solvable in polynomial time; 2) Edge $k$-Core is fixed-parameter tractable (FPT) being parameterized by the minimum size of a vertex cover in the input graph. On the other hand, with such parameterization, the problem does not admit a polynomial kernel subject to a widely-believed assumption from complexity theory; 3) Edge $k$-Core is FPT parameterized by $\mathrm{tw}+k$. This improves upon a result of Chitnis and Talmon by not requiring $b$ to be small. Each of our algorithms is built upon a new graph-theoretical result interesting in its own.
△ Less
Submitted 7 July, 2020; v1 submitted 18 February, 2020;
originally announced February 2020.
-
Manipulating Districts to Win Elections: Fine-Grained Complexity
Authors:
Eduard Eiben,
Fedor V. Fomin,
Fahad Panolan,
Kirill Simonov
Abstract:
Gerrymandering is a practice of manipulating district boundaries and locations in order to achieve a political advantage for a particular party. Lewenberg, Lev, and Rosenschein [AAMAS 2017] initiated the algorithmic study of a geographically-based manipulation problem, where voters must vote at the ballot box closest to them. In this variant of gerrymandering, for a given set of possible locations…
▽ More
Gerrymandering is a practice of manipulating district boundaries and locations in order to achieve a political advantage for a particular party. Lewenberg, Lev, and Rosenschein [AAMAS 2017] initiated the algorithmic study of a geographically-based manipulation problem, where voters must vote at the ballot box closest to them. In this variant of gerrymandering, for a given set of possible locations of ballot boxes and known political preferences of $n$ voters, the task is to identify locations for $k$ boxes out of $m$ possible locations to guarantee victory of a certain party in at least $l$ districts. Here integers $k$ and $l$ are some selected parameter.
It is known that the problem is NP-complete already for 4 political parties and prior to our work only heuristic algorithms for this problem were developed. We initiate the rigorous study of the gerrymandering problem from the perspectives of parameterized and fine-grained complexity and provide asymptotically matching lower and upper bounds on its computational complexity. We prove that the problem is W[1]-hard parameterized by $k+n$ and that it does not admit an $f(n,k)\cdot m^{o(\sqrt{k})}$ algorithm for any function $f$ of $k$ and $n$ only, unless Exponential Time Hypothesis (ETH) fails. Our lower bounds hold already for $2$ parties. On the other hand, we give an algorithm that solves the problem for a constant number of parties in time $(m+n)^{O(\sqrt{k})}$.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Kagome silicene: a novel exotic form of two-dimensional epitaxial silicon
Authors:
Y. Sassa,
F. O. L. Johansson,
A. Lindblad,
M. G. Yazdi,
K. Simonov,
J. Weissenrieder,
M. Muntwiler,
F. Iyikanat,
H. Sahin,
T. Angot,
E. Salomon,
G. Le Lay
Abstract:
Since the discovery of graphene, intensive efforts have been made in search of novel two-dimensional (2D) materials. Decreasing the materials dimensionality to their ultimate thinness is a promising route to unveil new physical phenomena, and potentially improve the performance of devices. Among recent 2D materials, analogs of graphene, the group IV elements have attracted much attention for their…
▽ More
Since the discovery of graphene, intensive efforts have been made in search of novel two-dimensional (2D) materials. Decreasing the materials dimensionality to their ultimate thinness is a promising route to unveil new physical phenomena, and potentially improve the performance of devices. Among recent 2D materials, analogs of graphene, the group IV elements have attracted much attention for their unexpected and tunable physical properties. Depending on the growth conditions and substrates, several structures of silicene, germanene, and stanene can be formed. Here, we report the synthesis of a Kagome lattice of silicene on aluminum (111) substrates. We provide evidence of such an exotic 2D Si allotrope through scanning tunneling microscopy (STM) observations, high-resolution core-level (CL) and angle-resolved photoelectron spectroscopy (ARPES) measurements, along with Density Functional Theory calculations.
△ Less
Submitted 30 January, 2020;
originally announced January 2020.
-
Beyond Shannon Limits: Quantum Communications through Quantum Paths
Authors:
Marcello Caleffi,
Kyrylo Simonov,
Angela Sara Cacciapuoti
Abstract:
A crucial step towards the 6th generation (6G) of networks would be a shift in communication paradigm beyond the limits of Shannon's theory. In both classical and quantum Shannon's information theory, communication channels are generally assumed to combine through classical trajectories, so that the associated network path traversed by the information carrier is well-defined. Counter-intuitively,…
▽ More
A crucial step towards the 6th generation (6G) of networks would be a shift in communication paradigm beyond the limits of Shannon's theory. In both classical and quantum Shannon's information theory, communication channels are generally assumed to combine through classical trajectories, so that the associated network path traversed by the information carrier is well-defined. Counter-intuitively, quantum mechanics enables a quantum information carrier to propagate through a quantum path, i.e., through a path such that the causal order of the constituting communications channels becomes indefinite. Quantum paths exhibit astonishing features, such as providing non-null capacity even when no information can be sent through any classical path. In this paper, we study the quantum capacity achievable via a quantum path and establish upper and the lower bounds for it. Our findings reveal the substantial advantage achievable with a quantum path over any classical placements of communications channels in terms of ultimate achievable communication rates. Furthermore, we identify the region where a quantum path incontrovertibly outperforms the amount of transmissible information beyond the limits of conventional quantum Shannon's theory, and we quantify this advantage over classical paths through a conservative estimate.
△ Less
Submitted 29 March, 2023; v1 submitted 18 December, 2019;
originally announced December 2019.
-
Refined Complexity of PCA with Outliers
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Fahad Panolan,
Kirill Simonov
Abstract:
Principal component analysis (PCA) is one of the most fundamental procedures in exploratory data analysis and is the basic step in applications ranging from quantitative finance and bioinformatics to image analysis and neuroscience. However, it is well-documented that the applicability of PCA in many real scenarios could be constrained by an "immune deficiency" to outliers such as corrupted observ…
▽ More
Principal component analysis (PCA) is one of the most fundamental procedures in exploratory data analysis and is the basic step in applications ranging from quantitative finance and bioinformatics to image analysis and neuroscience. However, it is well-documented that the applicability of PCA in many real scenarios could be constrained by an "immune deficiency" to outliers such as corrupted observations. We consider the following algorithmic question about the PCA with outliers. For a set of $n$ points in $\mathbb{R}^{d}$, how to learn a subset of points, say 1% of the total number of points, such that the remaining part of the points is best fit into some unknown $r$-dimensional subspace? We provide a rigorous algorithmic analysis of the problem. We show that the problem is solvable in time $n^{O(d^2)}$. In particular, for constant dimension the problem is solvable in polynomial time. We complement the algorithmic result by the lower bound, showing that unless Exponential Time Hypothesis fails, in time $f(d)n^{o(d)}$, for any function $f$ of $d$, it is impossible not only to solve the problem exactly but even to approximate it within a constant factor.
△ Less
Submitted 10 May, 2019;
originally announced May 2019.
-
Low-rank binary matrix approximation in column-sum norm
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Fahad Panolan,
Kirill Simonov
Abstract:
We consider $\ell_1$-Rank-$r$ Approximation over GF(2), where for a binary $m\times n$ matrix ${\bf A}$ and a positive integer $r$, one seeks a binary matrix ${\bf B}$ of rank at most $r$, minimizing the column-sum norm $||{\bf A} -{\bf B}||_1$. We show that for every $\varepsilon\in (0, 1)$, there is a randomized $(1+\varepsilon)$-approximation algorithm for $\ell_1$-Rank-$r$ Approximation over G…
▽ More
We consider $\ell_1$-Rank-$r$ Approximation over GF(2), where for a binary $m\times n$ matrix ${\bf A}$ and a positive integer $r$, one seeks a binary matrix ${\bf B}$ of rank at most $r$, minimizing the column-sum norm $||{\bf A} -{\bf B}||_1$. We show that for every $\varepsilon\in (0, 1)$, there is a randomized $(1+\varepsilon)$-approximation algorithm for $\ell_1$-Rank-$r$ Approximation over GF(2) of running time $m^{O(1)}n^{O(2^{4r}\cdot \varepsilon^{-4})}$. This is the first polynomial time approximation scheme (PTAS) for this problem.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.
-
Gravity, entanglement and CPT-symmetry violation in particle mixing
Authors:
Kyrylo Simonov,
Antonio Capolupo,
Salvatore Marco Giampaolo
Abstract:
We study the probability oscillations of mixed particles in the presence of self-gravitational interaction. We show a breaking of the CPT-symmetry due to the contemporary violation of the T-symmetry and the CP-symmetry preservation. This violation is directly associated to the rising of the entanglement among the elements of the system that can be seen as a pure many-body effect scaling with the n…
▽ More
We study the probability oscillations of mixed particles in the presence of self-gravitational interaction. We show a breaking of the CPT-symmetry due to the contemporary violation of the T-symmetry and the CP-symmetry preservation. This violation is directly associated to the rising of the entanglement among the elements of the system that can be seen as a pure many-body effect scaling with the number of the elements in the system. This effect could have played a relevant role in the first stages of the Universe or in core of very dense systems. Experiments based on Rydberg atoms confined in microtraps can simulate the mixing and the mutual interaction and could allow to test the mechanism here presented.
△ Less
Submitted 3 November, 2019; v1 submitted 25 March, 2019;
originally announced March 2019.
-
Parameterized k-Clustering: The distance matters!
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Kirill Simonov
Abstract:
We consider the $k$-Clustering problem, which is for a given multiset of $n$ vectors $X\subset \mathbb{Z}^d$ and a nonnegative number $D$, to decide whether $X$ can be partitioned into $k$ clusters $C_1, \dots, C_k$ such that the cost
\[\sum_{i=1}^k \min_{c_i\in \mathbb{R}^d}\sum_{x \in C_i} \|x-c_i\|_p^p \leq D,\] where $\|\cdot\|_p$ is the Minkowski ($L_p$) norm of order $p$. For $p=1$, $k$-Cl…
▽ More
We consider the $k$-Clustering problem, which is for a given multiset of $n$ vectors $X\subset \mathbb{Z}^d$ and a nonnegative number $D$, to decide whether $X$ can be partitioned into $k$ clusters $C_1, \dots, C_k$ such that the cost
\[\sum_{i=1}^k \min_{c_i\in \mathbb{R}^d}\sum_{x \in C_i} \|x-c_i\|_p^p \leq D,\] where $\|\cdot\|_p$ is the Minkowski ($L_p$) norm of order $p$. For $p=1$, $k$-Clustering is the well-known $k$-Median. For $p=2$, the case of the Euclidean distance, $k$-Clustering is $k$-Means. We show that the parameterized complexity of $k$-Clustering strongly depends on the distance order $p$. In particular, we prove that for every $p\in (0,1]$, $k$-Clustering is solvable in time $2^{O(D \log{D})} (nd)^{O(1)}$, and hence is fixed-parameter tractable when parameterized by $D$. On the other hand, we prove that for distances of orders $p=0$ and $p=\infty$, no such algorithm exists, unless FPT=W[1].
△ Less
Submitted 22 February, 2019;
originally announced February 2019.
-
Infinitesimal and Infinite Numbers as an Approach to Quantum Mechanics
Authors:
Vieri Benci,
Lorenzo Luperi Baglini,
Kyrylo Simonov
Abstract:
Non-Archimedean mathematics is an approach based on fields which contain infinitesimal and infinite elements. Within this approach, we construct a space of a particular class of generalized functions, ultrafunctions. The space of ultrafunctions can be used as a richer framework for a description of a physical system in quantum mechanics. In this paper, we provide a discussion of the space of ultra…
▽ More
Non-Archimedean mathematics is an approach based on fields which contain infinitesimal and infinite elements. Within this approach, we construct a space of a particular class of generalized functions, ultrafunctions. The space of ultrafunctions can be used as a richer framework for a description of a physical system in quantum mechanics. In this paper, we provide a discussion of the space of ultrafunctions and its advantages in the applications of quantum mechanics, particularly for the Schrödinger equation for a Hamiltonian with the delta function potential.
△ Less
Submitted 26 April, 2019; v1 submitted 30 January, 2019;
originally announced January 2019.
-
Strong deformations of DNA: Effect on the persistence length
Authors:
Kyryło A. Simonov
Abstract:
Extreme deformations of the DNA double helix attracted a lot of attention during the past decades. Particularly, the determination of the persistence length of DNA with extreme local disruptions, or kinks, has become a crucial problem in the studies of many important biological processes. In this paper we review an approach to calculate the persistence length of the double helix by taking into acc…
▽ More
Extreme deformations of the DNA double helix attracted a lot of attention during the past decades. Particularly, the determination of the persistence length of DNA with extreme local disruptions, or kinks, has become a crucial problem in the studies of many important biological processes. In this paper we review an approach to calculate the persistence length of the double helix by taking into account the formation of kinks of arbitrary configuration. The reviewed approach improves the Kratky--Porod model to determine the type and nature of kinks that occur in the double helix, by measuring a reduction of the persistence length of the kinkable DNA.
△ Less
Submitted 16 October, 2018;
originally announced October 2018.
-
Can a spontaneous collapse in flavour oscillations be tested at KLOE?
Authors:
K. Simonov,
B. C. Hiesmayr
Abstract:
Why do we never see a table in a superposition of here and there? This problem gets a solution by so called collapse models assuming the collapse as a genuinely physical process. Here we consider two specific collapse models and apply them to systems at high energies, i.e. flavour oscillating neutral meson systems. We find on one hand a potentially new interpretation of the decay rates introduced…
▽ More
Why do we never see a table in a superposition of here and there? This problem gets a solution by so called collapse models assuming the collapse as a genuinely physical process. Here we consider two specific collapse models and apply them to systems at high energies, i.e. flavour oscillating neutral meson systems. We find on one hand a potentially new interpretation of the decay rates introduced by hand in the standard formalism and on the other hand that these systems at high energies constrain by experimental data the possible collapse scenarios.
△ Less
Submitted 2 May, 2017;
originally announced May 2017.
-
Query Combinators
Authors:
Clark C. Evans,
Kyrylo Simonov
Abstract:
We introduce Rabbit, a combinator-based query language. Rabbit is designed to let data analysts and other accidental programmers query complex structured data.
We combine the functional data model and the categorical semantics of computations to develop denotational semantics of database queries. In Rabbit, a query is modeled as a Kleisli arrow for a monadic container determined by the query car…
▽ More
We introduce Rabbit, a combinator-based query language. Rabbit is designed to let data analysts and other accidental programmers query complex structured data.
We combine the functional data model and the categorical semantics of computations to develop denotational semantics of database queries. In Rabbit, a query is modeled as a Kleisli arrow for a monadic container determined by the query cardinality. In this model, monadic composition can be used to navigate the database, while other query combinators can aggregate, filter, sort and paginate data; construct compound data; connect self-referential data; and reorganize data with grou** and data cube operations. A context-aware query model, with the input context represented as a comonadic container, can express query parameters and window functions. Rabbit semantics enables pipeline notation, encouraging its users to construct database queries as a series of distinct steps, each individually crafted and tested. We believe that Rabbit can serve as a practical tool for data analytics.
△ Less
Submitted 27 February, 2017;
originally announced February 2017.