-
ManipVQA: Injecting Robotic Affordance and Physically Grounded Information into Multi-Modal Large Language Models
Abstract: The integration of Multimodal Large Language Models (MLLMs) with robotic systems has significantly enhanced the ability of robots to interpret and act upon natural language instructions. Despite these advancements, conventional MLLMs are typically trained on generic image-text pairs, lacking essential robotics knowledge such as affordances and physical knowledge, which hampers their efficacy in ma… ▽ More
Submitted 17 March, 2024; originally announced March 2024.
Comments: Code and dataset will be made publicly available at https://github.com/SiyuanHuang95/ManipVQA
-
arXiv:2305.15861 [pdf, ps, other]
On the Weisfeiler-Leman dimension of permutation graphs
Abstract: It is proved that the Weisfeiler-Leman dimension of the class of permutation graphs is at most 18. Previously it was only known that this dimension is finite (Grußien, 2017).
Submitted 25 May, 2023; originally announced May 2023.
-
arXiv:2201.12312 [pdf, ps, other]
Isomorphism testing of $k$-spanning tournaments is Fixed Parameter Tractable
Abstract: An arc-colored tournament is said to be $k$-spanning for an integer $k\geq 1$ if the union of its arc-color classes of maximal valency at most $k$ is the arc set of a strongly connected digraph. It is proved that isomorphism testing of $k$-spanning tournaments is fixed-parameter tractable.
Submitted 13 December, 2023; v1 submitted 28 January, 2022; originally announced January 2022.
Comments: 8 pages
MSC Class: 05C20; 05C60; 05C85
-
arXiv:2107.10689 [pdf, ps, other]
Testing isomorphism of chordal graphs of bounded leafage is fixed-parameter tractable
Abstract: The computational complexity of the graph isomorphism problem is considered to be a major open problem in theoretical computer science. It is known that testing isomorphism of chordal graphs is polynomial-time equivalent to the general graph isomorphism problem. Every chordal graph can be represented as the intersection graph of some subtrees of a representing tree, and the leafage of a chordal gr… ▽ More
Submitted 15 February, 2022; v1 submitted 22 July, 2021; originally announced July 2021.
-
arXiv:2105.10679 [pdf, ps, other]
Tensor products of coherent configurations
Abstract: A Cartesian decomposition of a coherent configuration $\cal X$ is defined as a special set of its parabolics that form a Cartesian decomposition of the underlying set. It turns out that every tensor decomposition of $\cal X$ comes from a certain Cartesian decomposition. It is proved that if the coherent configuration $\cal X$ is thick, then there is a unique maximal Cartesian decomposition of… ▽ More
Submitted 22 May, 2021; originally announced May 2021.
Comments: 21 pages
MSC Class: 05E16; 05-08 ACM Class: G.2.m
-
arXiv:2005.11766 [pdf, ps, other]
The Weisfeiler-Leman dimension of distance-hereditary graphs
Abstract: A graph is said to be distance-hereditary if the distance function in every connected induced subgraph is the same as in the graph itself. We prove that the ordinary Weisfeiler-Leman algorithm correctly tests the isomorphism of any two graphs if one of them is distance-hereditary; more precisely, the Weisfeiler-Leman dimension of the class of finite distance-hereditary graphs is equal to $2$. The… ▽ More
Submitted 24 May, 2020; originally announced May 2020.
-
arXiv:2005.08887 [pdf, ps, other]
The Weisfeiler-Leman Algorithm and Recognition of Graph Properties
Abstract: The $k$-dimensional Weisfeiler-Leman algorithm ($k$-WL) is a very useful combinatorial tool in graph isomorphism testing. We address the applicability of $k$-WL to recognition of graph properties. Let $G$ be an input graph with $n$ vertices. We show that, if $n$ is prime, then vertex-transitivity of $G$ can be seen in a straightforward way from the output of 2-WL on $G$ and on the vertex-individua… ▽ More
Submitted 30 July, 2020; v1 submitted 18 May, 2020; originally announced May 2020.
Comments: 30 pages, 2 figures. This paper supersedes Section 5 in the first version of arXiv:2002.04590. The 3rd version is a thorough revision of the paper
-
arXiv:1912.10217 [pdf, ps, other]
Two-closure of supersolvable permutation group in polynomial time
Abstract: The $2$-closure $\overline{G}$ of a permutation group $G$ on $Ω$ is defined to be the largest permutation group on $Ω$, having the same orbits on $Ω\timesΩ$ as $G$. It is proved that if $G$ is supersolvable, then $\overline{G}$ can be found in polynomial time in $|Ω|$. As a byproduct of our technique, it is shown that the composition factors of $\overline{G}$ are cyclic or alternating of prime deg… ▽ More
Submitted 21 December, 2019; originally announced December 2019.
Comments: 20 pages
MSC Class: 20B25; 05E18 ACM Class: F.2.2
Journal ref: Computational Complexity, 29, No. 5 (2020) (MR4118452)
-
arXiv:1905.03008 [pdf, ps, other]
Walk refinement, walk logic, and the iteration number of the Weisfeiler-Leman algorithm
Abstract: We show that the 2-dimensional Weisfeiler-Leman algorithm stabilizes n-vertex graphs after at most O(n log n) iterations. This implies that if such graphs are distinguishable in 3-variable first order logic with counting, then they can also be distinguished in this logic by a formula of quantifier depth at most O(n log n). For this we exploit a new refinement based on counting walks and argue th… ▽ More
Submitted 9 May, 2019; v1 submitted 8 May, 2019; originally announced May 2019.
Comments: To appear at LICS 19
-
Testing isomorphism of circular-arc graphs in polynomial time
Abstract: A graph is said to be circular-arc if the vertices can be associated with arcs of a circle so that two vertices are adjacent if and only if the corresponding arcs overlap. It is proved that the isomorphism of circular-arc graphs can be tested by the Weisfeiler-Leman algorithm after individualization of two vertices.
Submitted 12 July, 2019; v1 submitted 26 March, 2019; originally announced March 2019.
Comments: Dear reader, recently we have found a problem in the proof of the main theorem. It seems that we will be able to fill in the gap in the arguments, and we are doing our best to do this as soon as possible. We appologize for publishing an unfinished work. The authors
MSC Class: 68Q25
-
arXiv:1812.06246 [pdf, ps, other]
Testing isomorphism of circulant objects in polynomial time
Abstract: Let ${\frak K}$ be a class of combinatorial objects invariant with respect to a given regular cyclic group. It is proved that the isomorphism of any two objects $X,Y\in{\frak K}$ can be tested in polynomial time in sizes of $X$ and $Y$.
Submitted 15 December, 2018; originally announced December 2018.
Comments: 8 pages
MSC Class: 05E18 05C60
Journal ref: J. Combin. Theory, A169, 105128 (2020)
-
arXiv:1708.07354 [pdf, ps, other]
The Weisfeiler-Leman Dimension of Planar Graphs is at most 3
Abstract: We prove that the Weisfeiler-Leman (WL) dimension of the class of all finite planar graphs is at most 3. In particular, every finite planar graph is definable in first-order logic with counting using at most 4 variables. The previously best known upper bounds for the dimension and number of variables were 14 and 15, respectively. First we show that, for dimension 3 and higher, the WL-algorithm c… ▽ More
Submitted 24 August, 2017; originally announced August 2017.
Comments: 34 pages, 3 figures, extended version of LICS 2017 paper
MSC Class: 03B70 ACM Class: F.4.1; F.2.2
-
arXiv:1706.06145 [pdf, ps, other]
Recognizing and testing isomorphism of Cayley graphs over an abelian group of order $4p$ in polynomial time
Abstract: We construct a polynomial-time algorithm that given a graph $X$ with $4p$ vertices ($p$ is prime), finds (if any) a Cayley representation of $X$ over the group $C_2\times C_2\times C_p$. This result, together with the known similar result for circulant graphs, shows that recognising and testing isomorphism of Cayley graphs over an abelian group of order $4p$ can be done in polynomial time.
Submitted 19 June, 2017; originally announced June 2017.
Comments: 22 pages
MSC Class: 05E18 05C85
-
arXiv:1704.00990 [pdf, ps, other]
Testing isomorphism of central Cayley graphs over almost simple groups in polynomial time
Abstract: A Cayley graph over a group G is said to be central if its connection set is a normal subset of G. It is proved that for any two central Cayley graphs over explicitly given almost simple groups of order n, the set of all isomorphisms from the first graph onto the second can be found in time poly(n).
Submitted 7 April, 2017; v1 submitted 4 April, 2017; originally announced April 2017.
Comments: 20 pages
MSC Class: 05C60; 05E18
Journal ref: J Math Sci., Vol. 234, no. 2 (2018) 219-236
-
arXiv:math/0506180 [pdf, ps, other]
Constructions in public-key cryptography over matrix groups
Abstract: The purpose of the paper is to give new key agreement protocols (a multi-party extension of the protocol due to Anshel-Anshel-Goldfeld and a generalization of the Diffie-Hellman protocol from abelian to solvable groups) and a new homomorphic public-key cryptosystem. They rely on difficulty of the conjugacy and membership problems for subgroups of a given group. To support these and other known c… ▽ More
Submitted 10 June, 2005; originally announced June 2005.
Report number: 2005-19
-
arXiv:cs/0309010 [pdf, ps, other]
Homomorphic public-key cryptosystems over groups and rings
Abstract: We propose a new homomorphic public-key cryptosystem over arbitrary nonidentity finite group based on the difficulty of the membership problem for groups of integer matrices. Besides, a homomorphic cryptosystem is designed for the first time over finite commutative rings.
Submitted 8 September, 2003; originally announced September 2003.
ACM Class: I.2.1; I.1.2; F.2.1
-
arXiv:cs/0301022 [pdf, ps, other]
Homomorphic public-key cryptosystems and encrypting boolean circuits
Abstract: In this paper homomorphic cryptosystems are designed for the first time over any finite group. Applying Barrington's construction we produce for any boolean circuit of the logarithmic depth its encrypted simulation of a polynomial size over an appropriate finitely generated group.
Submitted 28 February, 2003; v1 submitted 22 January, 2003; originally announced January 2003.
ACM Class: E.3.3
-
arXiv:cs/0207079 [pdf, ps, other]
On non-abelian homomorphic public-key cryptosystems
Abstract: An important problem of modern cryptography concerns secret public-key computations in algebraic structures. We construct homomorphic cryptosystems being (secret) epimorphisms f:G --> H, where G, H are (publically known) groups and H is finite. A letter of a message to be encrypted is an element h element of H, while its encryption g element of G is such that f(g)=h. A homomorphic cryptosystem a… ▽ More
Submitted 14 November, 2002; v1 submitted 23 July, 2002; originally announced July 2002.
Comments: 15 pages, LaTeX
ACM Class: E.3