arxiv: v1 [cs.ds] 6 Apr 2016

Size: px
Start display at page:

Download "arxiv:1604.01550v1 [cs.ds] 6 Apr 2016"

Transcription

1 A Multivariate Approach for Checking Resiliency in Access Control Jason Crampton 1, Gregory Gutin 1, Stéphane Pérennes 2, and Rémi Watrigant 1 1 Royal Holloway University of London, United Kingdom. 2 INRIA/I3S Sophia Antipolis, France. arxiv: v1 [cs.ds] 6 Apr 2016 Abstract. In recent years, several combinatorial problems were introduced in the area of access control. Typically, such problems deal with an authorization policy, seen as a relation UR U R, where (u, r) UR means that user u is authorized to access resource r. Li, Tripunitara and Wang (2009) introduced the Resiliency Checking Problem (RCP), in which in addition to an authorization policy, we are given a subset of resources P R as well as integers s 0, d 1 and t 1. It asks whether upon removal of any set of at most s users, there still exist d pairwise disjoint sets of at most t users such that each set collectively has access to all resources in P. This problem possesses several parameters which appear to take small values in practice. We thus analyze the parameterized complexity of RCP with respect to these parameters, by considering all possible combinations of P, s, d, t. In every case, we are able to decide whether the problem is in FPT, XP, W[2]-hard, para-nphard or para-conp-hard. We also consider the restricted case where s = 0 for which we also determine the complexity for all possible combinations of the parameters, obtaining for some cases a best possible running time under the ETH. 1 Introduction 1.1 Context and definition of the problem Access control is a fundamental aspect of the security of any multi-user computing system. Typically, it is based on the idea of specifying and enforcing an authorization policy, identifying which interactions between a set of users U and a set of resources R are to be allowed by the system [9]. More formally, an authorization policy is defined as a relation UR U R, where (u, r) UR means that user u is authorized to access resource r. Quite recently, we have seen the introduction of resiliency policies, whose satisfaction indicates that a system will continue to function as intended in the absence of some number of authorized users [8, 10]. Li, Tripunitara and Wang s seminal work [8] introduces a number of problems associated with the satisfaction of a resiliency policy, motivated by practical purposes. Among others, they describe a situation where This research was partially supported by EPSRC grant EP/K005162/1. Gutin s research was also supported by Royal Society Wolfson Research Merit Award.

2 a system faces an emergency (e.g., a natural disaster), and some critical task needs to be performed in different sites by several teams of users. We thus require that each team has enough permissions (or ability) to carry out the task, while an upper bound on the size of teams can also be set (e.g., due to the limit of transportation means). For a user u U and a set of users V U, we define N UR (u) = {r R : (u, r) UR} the neighborhood of u and, by extension, N UR (V ) = u V N UR(u) the neighborhood of V, omitting the subscript UR if the authorization policy is clear from the context. Given an authorization policy UR U R, an instance of the Resiliency Checking Problem (RCP) is defined by a resiliency policy res(p, s, d, t), where P R, s 0, d 1 and t 1. We say that UR satisfies res(p, s, d, t) if and only if for every subset S U of at most s users, there exist d pairwise disjoint subsets of users V 1,..., V d such that for all i {1,..., d}: (i) V i S =, (ii) V i t, (iii) N(V i ) P. We now define the main problem we study in this paper: Resiliency Checking Problem (RCP) Input: UR U R, P R, s 0, d 1, t 1. Question: Does UR satisfy res(p, s, d, t)? Furthermore, we will adopt the bracket notation RCP used by Li et al. [8] to denote some restrictions of the problem, in which one or more parameters (among s, d and t) are fixed. In particular, we will consider the cases where s and d are respectively set to 0 and/or 1 (or other fixed positive values), while t might be set to, meaning that there is no constraint on the size of the sets (which is actually equivalent to t = P, implying that we may assume henceforth that t P ). For instance, RCP s = 0 denotes the variant in which s is fixed to 0, i.e. we ask for the satisfaction of res(p, 0, d, t). In the remainder of the paper, we set p = P. Given an instance of RCP, we say that a set of d pairwise disjoint subsets of users V = {V 1,..., V d } satisfying conditions (ii) and (iii) above is a set of teams. For such a set of teams, we define U(V ) = d i=1 V i. Given U U, the restriction of UR to U is defined by UR U = UR (U R). Finally, a set of users S U is called a blocker set if for every set of teams V = {V 1,..., V d }, we have U(V ) S. Equivalently, observe that S is a blocker set if and only if UR U\S does not satisfy res(p, 0, d, t). Throughout the paper, we set [d] = {1,..., d} for any integer d 1, and we will often make use of the O (.) notation, which omits polynomial factors and terms. 1.2 Parameters As one can see in the definition above, an instance of RCP contains several parameters (namely s, d and t) which may be used for the complexity analysis of

3 the problem. An interesting point of the work of Li et al. [8] is the following: while the number of users in an organization can be quite large, the other parameters (s, d, t, and even p) are expected to take smaller values in practice. In their experiments, the maximum values used are n = 100, p = 10 and d = 7 (they only run experiments on the variant where t =, but, as we observed previously, we may set t = p). With this in mind, we exploit the theory of fixed-parameter tractability in order to settle the parameterized complexity of the problem. Given an instance x (of size x ) of a decision problem, coming with a parameter 1 k, we are interested in algorithms deciding whether x is positive or negative in polynomial time when k is bounded above by a constant. More precisely, if such an algorithm has running time O(f(k) x O(1) ) for some computable function f, then we will say that this algorithm is FPT, while if its running time is O( x f(k) ) for some computable function f, we will say that this algorithm is XP (an FPT algorithm is thus an XP algorithm). By extension, FPT (resp. XP) denotes the class of all problems for which an FPT (resp. XP) algorithm exists. Proving the NP-hardness of a problem in the case where a parameter k is bounded above by a constant immediately forbids the existence of any XP (and thus FPT) algorithm unless P = NP. In this case, we will say that this parameterized problem is para-np-hard. A similar definition can be given using conp and conp-hard instead of NP and NP-hard, respectively, leading to the para-conp-hard complexity class. In the following, para-(co)nphard thus denotes the union of para-np-hard and para-conp-hard. Finally, the W[i]-hierarchy of parameterized problems is typically used to rule out the existence of an FPT algorithm, under the widely believed conjecture that FPT W[1]. For more details about fixed-parameter tractability, we refer the reader to the recent textbook and monograph of [2] and [5], respectively. 1.3 Related work As one can expect, the RCP problem is strongly related to some known combinatorial problems. Indeed, one can observe that RCP s = 0, d = 1 is equivalent to the Set Cover problem, while RCP s = 0, t = can be reduced in a straightforward way from the Domatic Partition problem. Li et al. [8] obtained several (mainly negative) results for RCP in some restricted cases which can be summarized by the following theorem. Theorem 1 ([8]). We have the following: RCP, RCP d = 1 and RCP t = are NP-hard and are in conp NP. RCP s = 0, d = 1, RCP s = 0, t = are NP-hard. RCP d = 1, t = can be solved in linear time. In addition, they developed and implemented an algorithm for RCP which roughly consists in(i) enumerating all subsets of at most s users, and (ii) for some carefully chosen subsets S, determining the satisfaction of res(p, 0, d, t) for 1 Note that one can aggregate several parameters p 1,..., p m by defining k = p p m, in which case we will say the parameter is (p 1,..., p m).

4 UR U\S. Step (ii) is achieved by a SAT formulation of the problem and the use of an off-the-shelf SAT solver, while they develop a pruning strategy in order to avoid running the SAT solver for every set S. Quite surprisingly, they observe that the bottleneck of their algorithm lies in the second step, where an instance of RCP s = 0 has to be solved. This motivated us to focus on the parameterized complexity of RCP s = 0 separately. p, s, d, t 1.4 Contribution and organization of the paper Our goal in this paper is thus to determine the parameterized complexity of RCP and RCP s = 0 with respect to parameters p, t p, s p, p, s, d d, t, s, by d considering s, t d, t every possible combination of them. In each case, we aim to determine whether the problem is(i) in FPT, (ii) in XP but W[i]-hard for some i 1 or (iii) parap s d (co)np-hard. XP FPT p, s, t p, s, d p, d, t t para-np-hard s, d, t W[2]-hard FPT p, s, d, t p, s, t p, s, d p, d, t XP s, d, t FPT p, d, t XP p, d p, t d, t p, t p, s p, d s, d s, t d, t W[2]-hard p s t d para-(co)np-hard (a) RCP W[2]-hard p d t para-np-hard (b) RCP s = 0 Fig. 1: Schemas of the complexity of RCP and RCP s = 0 after the results obtainedfpt in thisp, d, paper. t XP p, d p, t d, t Figure 1 summarizes the (already known and) obtained results for RCP and RCP s = 0 withw[2]-hard respect to all possible combinations of the parameters specified previously. p An arrow A B means that A is a larger parameter than d t 1 B, in the sense para-np-hard that an FPT algorithm parameterized by B implies an FPT algorithm parameterized by A, and, conversely, any negative result mentioned previously parameterized by A implies the same negative result parameterized by B. Since (under classical complexity assumptions) a decision problem is either in one of the previous cases (i), (ii) or (iii), one can observe that the parameterized complexity of RCP (and thus RCP s = 0 ) is now completely determined with respect to all possible combinations of parameters p, d and t. In the next section, we report all our results for the general case RCP, namely: membership in XP parameterized by (s, d, t) (Theorem 2), 1

5 membership in FPT parameterized by p only. para-conp-hardness parameterized by (d, t) (Theorem 4), para-np-hardness parameterized by (s, t) (Theorem 5). Note that the para-np-hardness for (s, d) was already known (Theorem 1), as well as the W[2]-hardness for (s, d, t) (see explanation in Section 2.2). Section 3 contains all our results for the restricted case RCP s = 0 : we first provide an FPT algorithm parameterized by (d, p) with an optimal running time (under ETH) when d is fixed (Theorems 6 and 7). We also investigate the question of data (user) reductions and present positive and negative kernelization results depending on the considered variant: RCP s = 0 or RCP s = 0, t = (Theorem 8). Note that still concerning RCP s = 0, its W[2]-hardness for (d, t) is inherited from RCP, while the XP membership results from a brute-force enumeration of all subsets of users of size dt. We finally conclude the paper in Section 4. 2 The general case 2.1 Introduction and preliminaries First, observe that there exists a simple XP algorithm for RCP parameterized by (s, d, t). Indeed, recall that the problem actually aims to check whether there exists a set S U of size at most s such that for any set of teams V = {V 1,..., V d } we have S U(V ), and note that finding a set of teams is exactly the RCP s = 0 problem, which is in XP parameterized by (d, t). Hence, since U(V ) dt, by finding iteratively a set of teams and branching on each element to be removed from it (and included in the future blocker set), one can determine whether there exists a blocker set of size at most s in XP time parameterized by (s, d, t): Theorem 2. RCP is in XP when parameterized by (s, d, t) Despite its simplicity, this result is actually somehow tight. First, as we will see later (Section 2.2), RCP is W[2]-hard with this parameterization. In addition, considering a strict subset of {s, d, t} as a parameter makes the problem para-(co)np-hard (Theorems 1, 4 and 5). A way of going further is to replace t by p. Indeed, one can observe that we may always assume that t p. With this modification, we show in the next result how to get rid of parameters s and d by designing an FPT algorithm parameterized by p only. The idea of this algorithm is to use a system of linear inequalities, and to eliminate some variables of it. To do so, we use the so-called Fourier-Motzking elimination algorithm [3] which we now describe. Unless otherwise stated, all coefficients of the considered systems of linear equations belong to Q. We say that a system S of linear inequalities is consistent if and only if there is an assignment of variables for which all inequalities hold. Lemma 1. Let S be a system of m linear inequalities over a set of variables V, and let x V. Then it is possible to obtain, in time polynomial in m and V,

6 a system S of at most m 2 /4 inequalities over the set of variables V \ {x}, such that S and S are equivalent: S is consistent if and only if S is consistent. Proof. Let Q 1,..., Q m be the set of inequalities of S, V = {x 1,..., x n }. W.l.o.g. we show how to eliminate variable x n. To do so, let [m] = I I I be a partition of the inequalities depending on the sign of the coefficient of x n (we may assume that coefficient of x n is either 1, 0 or 1 in each inequality). More precisely: for all i I, inequality Q i is of the form x n b i n 1 j=1 aj i x j for all i I, inequality Q i is of the form x n b i n 1 j=1 aj i x j for all i I, the coefficient of x n in Q i is 0 (i.e. x n does not appear in Q i ) One can observe that we can obtain an equivalent system by replacing all inequalities in I I by the following formula: n 1 n 1 max{b i a j i x j} x n min{b i a j i x j} i I i I j=1 Which is, itself, equivalent to the conjunction of I I linear inequalities: for all i 1 I and all i 2 I, let Q i1,i 2 be the following inequality: j=1 n 1 n 1 b i1 a j i 1 x j b i2 a j i 2 x j j=1 By ( the foregoing, S is equivalent to the system S composed of inequalities I Q i1 I,i2 I i1,i 2 ). As desired, x n does not appear in S, and observe that S has at most m 2 /4 inequalities, the worst case being when I = I = m/2. j=1 We are now ready to prove the main result of this section. Theorem 3. RCP is FPT parameterized by p. Proof. Without loss of generality, we may assume P = R as well as N(u) for all u U. For all N P, let U N = {u U : N(u) = N} (notice that we might have U N = for some N P ). Roughly speaking, the idea of the algorithm relies on the fact that in order to construct a set of team or a blocker set, it is sufficient to know the size of its intersection with U N, for every N P. Let us define the following set whose elements will be called configurations: { } b C = {N 1,..., N b } : b t, N i P, i [b], N i = P. Then, for any N P, we note i=1 C N = {c = {N 1,..., N bc } C : N = N i for some i [b c ]}

7 the set of configurations involving N. Observe that since we assume t p, we have C = O(2 p2 ). The link between sets of teams and configurations comes from the following definition: given a set of teams V, we say that a team T V has configuration c = {N 1,..., N b }, b t if c = {N(u), u T }. In other words, c represents the distincts neighborhoods of users of T in P. First, we define a system of linear inequalities L over the set of variables X Z, where X = {x c : c C} and Z = {z N : z P } as follows: x c = d (1) c C c C N x c U N z N for every N P (2) An assignment of variables X (resp. Z) will be called valid if x c {0,..., d} for all c C (resp. z N {0,..., max{s, U N }} for all N P ). While we would be able to solve this system in FPT time parameterized by p, the reader might realize that doing so would not solve RCP directly. Nevertheless, the link between this system and our problem is the following: Lemma 2. res(p, s, d, t) is satisfiable iff L has a valid assignment of variables X for every valid assignment of variables Z such that N P z N s. Proof. Suppose first that res(p, s, d, t) is satisfiable, and let zn be a valid assignment for Z such that N P z N s. We now define a set of users S by picking, in an arbitrary manner, zn users in U N, for each N P (since zn max{s, U N }, such a set S must exist). Since S is a set of at most s users, there exists a set of teams V = {T 1,..., T d } such that U(V ) S =. Then, for each c C, let x c be the number of teams of V having configuration c. Clearly we have c C x c = d, and thus constraint (1) is satisfied. Then, for all N P, we may assume w.l.o.g. that T i U N 1 for all i {1,..., d}. Hence c C N x c equals U(V ) U N, which is the number of users of U N involved in some teams of V. Since U(V ) S =, we have c C N x c U N zn, and thus constraint (2) is also satisfied, i.e. L has a valid assignment of variables X. Conversely, let S U, S s. For each N P, define zn = S U N, which is thus a valid assignment of variables Z. Hence, there exists a valid assignment {x c : c C} of variables X. Then, for c = {N 1,..., N b } C, b t, consider a set of users T consisting of a user chosen arbitrarily in U Ni per each i [b]. By definition of a configuration, T is a team. Then, since for all N P, we have, by constraint (2), that c C N x c U N zn, it is possible to construct x c pairwise disjoint such team for each c C, each having an empty intersection with S. In other words, for every S U, S s, there exists a set of teams V such that U(V ) S =, and thus res(p, s, d, t) is satisfiable. The next step of the algorithm is to eliminate all variables X from the previous system, using the Fourier-Motzkin elimination algorithm described in Lemma 1. Since in our case L has 2 p + 2 inequalities (equation (1) is turned

8 into two inequalities), and since X = C = O(2 p2 ), applying the Fourier- Motzkin elimination for each variable of X successively, it is possible to obtain an equivalent system of linear inequalities L involving only variables Z, and having a number of inequalities bounded by a function of p only. If we denote by Q 1,..., Q r the inequalities of L, inequality Q i, i [r], has the following form: a i N z N b i N P where a i N, bi Q are constants for all N P, (depending on the instance, in particular on values of U N, N P ). By Lemma 2, one can test if res(p, s, d, t) is unsatisfiable by looking for an assignement of Z such that N P z N s which makes L unsatisfiable. Since L is unsatisfiable if and only if one inequality is false, it is sufficient to consider every inequality Q i independently, and to look for a valid assignment of variables Z such that z N s and a i N z N < b i N P One can observe that this problem is polynomial for each inequality Q i. Indeed, we can first pre-process all cases in which b > 0 or a N > 0 for some N P, and only solve remaining cases of the form: z N s N P N P d N z N B N P with d N, B Q + for all N P. We now have a Knapsack instance, for which a classical pseudo-polynomial algorithm allows us to conclude the proof. 2.2 Negative results It is worth pointing out that the reduction of [8, Lemma 3] proving the NPhardness of RCP s = 0, d = 1 actually proves the W[2]-hardness of this problem parameterized by t (from Set Cover parameterized by the size of the solution [5]). Another implication of this reduction is the para-np-hardness of RCP when parameterized by (s, d). We now complement this result by showing that RCP d = 1, t = τ is conp-hard for every fixed τ 3, implying para-conphardness of RCP parameterized by (d, t). Theorem 4. RCP d = 1, t = τ is conp-hard for every fixed τ 3. Proof. We reduce from the δ-hitting Set problem, in which we are given a ground set V = {v 1,..., v n }, a set S = {S 1,..., S m } with S j V and S j = δ for all j [m] and an integer k, and where the goal is to find a set C V of

9 size at most k and such that C S j for all j [m]. This problem is known to be NP-hard for every δ 2 [6]. Hence, let (V, S, k) be an instance of δ-hitting Set defined as above. For every j [m], fix an arbitrary ordering of S j, which can thus be seen as a tuple (v i1,..., v iδ ), allowing us to define S j [x] = v ix for all x [δ]. We define a set of users U = U V U S, where U V = {u V 1,..., u V n } and U S = {u S 1,..., u S m}. We then define a set of resources R = R V R S {r }, where R S } for all j [m], and where RV contains one resource rq V for every subset Q of δ 1 users of U V. We now define the authorization policy UR by giving N(u) for every u U. For every i [n], N(u V i ) is composed of {pj x : j [m], x [δ] such that S j [x] = v i } together with all resources rq V such that uv i / Q, for every subset Q of δ 1 users of U V. For all j [m], N(u S j ) is composed of r together with R S \ P j. To conclude the construction, we let P = R, t = δ + 1, d = 1, and s = k. Clearly this reduction can be done in polynomial time. The remainder consists in proving that every team (i.e. sets of at most t users having collectively access to all R) is of the form T j = {u V i 1,..., u V i δ, u S j } such that S j = {v i1,..., v iδ }. If this is true, then observe that since, for every = m j=1 P j with P j = {p j 1,..., pj δ j [m], user u S j only belongs to team T j, we will be able to suppose w.l.o.g. that it does not belong to any blocker set, and thus the set of all teams will be in one-to-one correspondence with the sets in S, implying that the obtained instance has a blocker set of size at most s (= k) if and only if there is a hitting set of size at most k. Let T U of size at most t. By construction, we need at least δ users from U V to have access to all resources in R V (indeed, every set Q of δ 1 users from U V has only access to R V \ {rq V S }), and we also need at least one user from U to have access to r. Hence, T U V = δ and T U S = {u S j } for some j [m]. Now, notice that u S j has access to all resources in R but P j, which implies that T U V must have collectively access to all resources in P j. However, this can only happen if T U V = {u V i 1,..., u V i δ }, where S j = {v i1,..., v iδ }, concluding the proof. We also settle the case of RCP parameterized by (s, t) (and thus RCP s = 0 parameterized by t). Theorem 5. RCP s = 0, t = 4 is NP-hard. Proof. We reduce from the 3-Dimensional Matching problem, in which we are given three sets X, Y and Z of n elements each, a set M X Y Z of hyperedges, and an integer k. The goal is to find M M with M k such that e, e M with e e, e = (x, y, z), e = (x, y, z ), we have x x, y y and z z (in that case, we will say that these two hyperedges are disjoint). We note m = M, X = {x 1,..., x n }, Y = {y 1,..., y n } Z = {z 1,..., z n }, and M = {e 1,..., e m }.

10 We then define the following set of resources: P = {r X 1,..., r X m} {r Y 1,..., r Y m} {r Z 1,..., r Z m} {r X, r Y, r Z, r } and a set of users U composed of U X, U Y, U Z and U, where, for all ω {X, Y, Z, }, we note U ω = {u ω 1,..., u ω n}. Then the authorization policy A is informally constructed as follows: for each hyperedge e j = {x i1, y i2, z i3 }, user u X i 1 (resp. u Y i 2, u Z i 3 ) has access to rj X (resp. rj Y, rz j ) and to r X (resp. r Y, r Z ), and user u j has access to all resources in P but rx j, ry j, rz j, r X, r Y and r Z. More formally, we have: A = {(u X i, r X j ) : x i belongs to e j, i [n], j [m]} {(u Y i, r Y j ) : y i belongs to e j, i [n], j [m]} {(u Z i, r Z j ) : z i belongs to e j, i [n], j [m]} {(u j, r ω h ) : ω {X, Y, Z}, j, h [m]j h} {(u ω i, r ω ) : i [n], ω {X, Y, Z}} {u j, r ) : j [m]} To conclude the construction, which can be done in polynomial time, we set d = k, and the resiliency policy is thus res(p, 0, d, 4). First, suppose that there exists a solution M for the 3-Dimensional Matching problem. Without loss of generality, assume that M = k, M = {e 1,..., e k }, and that e i = (x i, y i, z i ) for all i [k] (recall that all members of M are pairwise disjoint). Then, observe that for all i [k], user u i has access to all resources but ri X, ry i, rz i, r X, r Y and r Z. However, u X i has access to ri X and r X, user u Y i has access to ri Y and r Y, and user u Z i has access to ri Z and r Z. Hence, we have N({u X i, uy i, uz i, u i }) = P, and, since all members of M are pairwise disjoint, we thus constructed a set of teams for RCP s = 0, t = 4, or, in other words, res(p, 0, d, 4) is satisfiable. Conversely, suppose that there exist V 1,..., V d, pairwise disjoint subsets of U such that for all i [d], we have V i = 4 and N(V i ) = P. We first claim that for all i [d], V i intersects U X (resp. U Y, U Z and U ) on exactly one element. Indeed, otherwise, since V i = 4 and since all users in U X (resp. U Y, U Z, U ) have access to only r X (resp. r Y, r Z, r ) among {r X, r Y, r Z, r }, V i could not have access to all these resources. Thus, we know that for all i [d], we have V i = {u X i 1, u Y i 2, u Z i 3, u i 4 }, for some (i 1, i 2, i 3, i 4 ) [n] [n] [n] [m]. We claim that (x i1, y i2, z i3 ) = e i4. Indeed, observe that user u i 4 has access to all resources but ri X 4, ri Y 4, ri Z 4, r X, r Y and r Z. By construction, the only way for having N(V i ) = P is that user u X i 1 (resp. u Y i 2, u Z i 3 ) has access to resources ri X 4 (resp. ri Y 4, ri Z 4 ) or, in other words, that x i1 (resp. y i2, z i3 ) belongs to hyperedge e i4. Thus, there exists k pairwise disjoint hyperedges in M.

11 3 The case s = 0 We now turn to the particular case where s = 0. As we noted in Section 1, one motivation for studying this case is that it is the bottleneck of the algorithm of Li et al. [8] for RCP. Hence, we believe that designing efficient algorithms for this sub-case might help solving much larger instances of RCP than is possible currently. To this end, we now provide a complete characterization of the complexity when considering all possible combinations of parameters among p, d and t. We also investigate the question of reduction rules within the framework of kernelization, highlighting an interesting difference of behavior between RCP s = 0 and RCP s = 0, t =. 3.1 FPT algorithms The first algorithm is a dynamic programming-based approach similar to the one for Set Cover [5], in order to obtain an FPT algorithm for RCP s = 0 parameterized by (p, d). While this result was already known, given that RCP is itself FPT parameterized by p only, we provide for RCP s = 0 a better running time. In particular, as we will see later, a previous known reduction of Li et al. [8] actually proves that when d is fixed, the obtained running time is the best we can hope for, under the Exponential Time Hypothesis (ETH) 2. Theorem 6. RCP s = 0 can be solved in O (2 dp ) time. Proof. Let U = {u 1,..., u n }. We define a dynamic programming algorithm which, given any i [n] and any d-tuple of subsets of P (S 1,..., S d ), returns yes if there exist d mutually disjoint sets T 1,..., T d, each being a subset of {u 1,..., u i } and such that S j N(T j ) for all j [d], and returns no otherwise (in which case we will say that such an algorithm is correct). To do so, we define the following recursive formula DP. First, we set: DP (0, S 1,..., S d ) = 1 if and only if S j =, for all j [d]; DP (i,,..., ) = 1 for all i [n]. For the induction, let i [n] and S = (S 1,..., S d ) where S j P for all j [d]. Let J = {j [d] : S j }, and for all j J, define S j = (S 1,..., S j 1, S j \ N(u i ), S j+1,..., S d ). Finally, we set: DP (i, S) = DP (i 1, S) DP (i 1, S j ) j J Lemma 3. DP (i, S) is correct. 2 The ETH claims that SAT cannot be solved in O (2 o(n) ), where n is the number of variables in the CNF formula [7].

12 Proof. Suppose that T 1,..., T d are d mutually disjoint subsets of {u 1,..., u i } such that S j N(T j ) for all j [d]. We may assume that T j iff S j. Then, either u i / T j for all j [d], in which case DP (i 1, S) returns yes, or u i T j for some j [d], which implies S j and thus j J. In this case DP (i 1, S j ) returns yes. Conversely, if DP (i 1, S) return yes, then there exist d mutually disjoint sets T 1,..., T d, each being a subset of {u 1,..., u i 1 } (and thus a subset of {u 1,..., u i }), and such that S j N(T j ) for all j [d]. If DP (i 1, S j ) returns yes for some j J, then there exist d mutually disjoint sets T 1,..., T d, each being a subset of {u 1,..., u i } and such that S q N(T q ) for all q [d], q j, and S j \ N(u i ) N(T j ). In this case S j N(T j {u i }). Clearly, DP (n, P,..., P ) returns yes if and only if res(p, 0, d, t) is satisfiable. A table of size n2 dp is sufficient to store all intermediate results, while each step takes O(d) time, establishing the claimed running time. Li et al. [8] showed that RCP s = 0, t =, d = 3 is NP-hard, by a reduction from 3-Domatic Partition, which transforms a graph of n vertices into an instance (U, R, UR, res(p, 0, 3, )) with P = n. Since a 2 o(n) algorithm for 3- Domatic Partition would violate the ETH (by a linear reduction from SAT [1]), we have the following: Theorem 7. RCP s = 0, t =, d = 3 cannot be solved in 2 o(p) time unless the ETH fails. Hence, for fixed d, the algorithm described in Theorem 6 has an optimal running time. 3.2 User reductions We now focus on reduction rules which can be performed in polynomial time and result in an equivalent instance having a smaller number of users. More formally, we say that a (decision) problem has a kernel [5] of size f, for some computable function f : N N, if there exists a polynomial algorithm which, given an instance x with parameter k, outputs an instance x of size x with parameter k such that: (i) k k, (ii) x is positive if and only if x is positive, and (iii) x f(k). In the case of RCP s = 0 our aim is thus to obtain an equivalent instance with a number of users bounded by a function of d and t. While the role of t was so far of less interest for the complexity of the problem, we show that the problem behaves differently from the kernelization point of view, depending on whether t = or not. We first show that when t =, the problem admits a kernel with at most dp users. To do so, we will make use of the following: Lemma 4 (d-expansion Lemma [2]). Let d 1 be a positive integer and G = (A, B, E) be a bipartite graph with bipartition (A, B) and E A B such that for all b B, N(b). If B d A, then there exist non-empty vertex sets X A and Y B which can be found in time polynomial in the size of G, such that:

13 (i) N(Y ) X, and (ii) there is a d-expansion of X into Y : a collection M E (X Y ) such that every vertex of X is incident to exactly d edges of M, and exactly d X vertices of Y are incident to an edge of M. Theorem 8. RCP s = 0, t = admits a kernel with at most dp users. Proof. Suppose we are given an instance of RCP s = 0, t =. We present two reduction rules whose purpose is to decrease the number of users. For each of these rules, we will prove that the instance is positive iff the reduced instance is positive, in which case we will say that the rule is safe. Reduction Rule 1: if there exists u U with N(u) =, then delete u. Proof (of safeness). Simply observe that such a user cannot participate in any set of teams if the instance is positive, and, conversely, cannot turn a negative instance into a positive one if it is deleted. Reduction Rule 2: if there exist X P, Y U such that N(Y ) X and there is a d-expansion of X into Y, then delete X from P, Y from U, and (Y X) UR from UR. Proof (of safeness). If the instance is a positive one, then there exists a set of teams {V 1,..., V d }. Then, for all r P \ X, there does not exist u Y such that (u, r) UR, since N(Y ) X. Hence, N(V i \ Y ) P \ X, and thus {V 1 \ Y,..., V d \ Y } is a set of teams for the reduced instance, which is thus a positive one. Conversely, suppose that the reduced instance is a positive one: there exists V 1,..., V d, disjoints sets of users from U \ Y such that N(V i ) P \ X. Since there is a d-expansion of X into Y, for all r Y, there exists u r 1,... u r d Y such that (u r i, r) UR for all i [d], where ur i ur i for all r r and i i. Hence, for all i [d], if we set V i = V i {u r i all 1 i < j d, and N(V i instance as well, which proves that the rule is safe. : r Y }, we have V i V j = for ) P for all i [d], and thus we have a positive Since each reduction rule can be applied in polynomial time, and since each of them decreases the number of users by at least one, the algorithm runs in polynomial time. Finally, by Lemma 4, if none of the previous reduction rules applies, then U dp, and we thus have a kernel with at most dp users, as desired. As Li et al. [8] point out, RCP s = 0, d = 1 is equivalent to the Set Cover Problem. Known kernel lower bounds for this problem [4] lead to the following theorem, which is in sharp contrast to the previous case. Theorem 9. RCP s = 0, d = 1 (and thus RCP s = 0 ) does not admit a kernel with (p + t) O(1) users, unless conp NP/poly.

14 4 Conclusion and future work We considered RCP, a problem introduced recently in the area of access control that deals with the resiliency of a system. Given the large number of natural parameters in an instance of this problem, and given that these parameters are likely to take small values in practice, our goal was to provide a systematic analysis of the complexity of the problem using the framework of parameterized complexity. For all possible combinations of the natural parameters of the problem, we were able to settle the parameterized complexity of the problem. We also considered a restricted variant of the problem for which we gave some refined and tight complexity results as well as data reduction algorithms. A possible interesting further line of research would be to study resiliency aspects with respect to other problems. In the context of graphs for instance, we could define the problem of determining whether upon removal of at most s vertices, a given graph still satisfies some property given by another combinatorial problem, e.g. having a vertex cover of size k. We believe that considering structural parameterizations (together with s or not) might lead to interesting new results. As in our case, the complexity of such a new problem will certainly depend on the complexity of the considered underlying problem (i.e. the case s = 0). References 1. Nadia Creignou. The class of problems that are linearly equivalent to satisfiability or a uniform method for proving NP-completeness. Theoretical Computer Science, 145(1-2): , Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, George B Dantzig. Fourier-Motzkin elimination and its dual. Technical Report TR 72-18, Stanford University, Michael Dom, Daniel Lokshtanov, and Saket Saurabh. Incompressibility through colors and IDs. In Automata, Languages and Programming, 36th International Colloquium, ICALP 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part I, pages , R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4): , Ninghui Li and Mahesh V. Tripunitara Qihua Wang. Resiliency policies in access control. ACM Trans. Inf. Syst. Secur., 12(4), Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38 47, Qihua Wang and Ninghui Li. Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur., 13(4):40, 2010.

Satisfiability and Resiliency in Workflow Systems

Satisfiability and Resiliency in Workflow Systems Satisfiability and Resiliency in Workflow Systems Qihua Wang Ninghui Li Center for Education and Research in Information Assurance and Security and Department of Computer Science Purdue University Abstract.

More information

How To Solve A K Path In Time (K)

How To Solve A K Path In Time (K) What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

Tutorial 8. NP-Complete Problems

Tutorial 8. NP-Complete Problems Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Lecture 17 : Equivalence and Order Relations DRAFT

Lecture 17 : Equivalence and Order Relations DRAFT CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

1 The Line vs Point Test

1 The Line vs Point Test 6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles

Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Venkatesh Raman and Saket Saurabh The Institute of Mathematical Sciences, Chennai 600 113. {vraman

More information

1. Prove that the empty set is a subset of every set.

1. Prove that the empty set is a subset of every set. 1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since

More information

Minimum Bisection is NP-hard on Unit Disk Graphs

Minimum Bisection is NP-hard on Unit Disk Graphs Minimum Bisection is NP-hard on Unit Disk Graphs Josep Díaz 1 and George B. Mertzios 2 1 Departament de Llenguatges i Sistemes Informátics, Universitat Politécnica de Catalunya, Spain. 2 School of Engineering

More information

Even Faster Algorithm for Set Splitting!

Even Faster Algorithm for Set Splitting! Even Faster Algorithm for Set Splitting! Daniel Lokshtanov Saket Saurabh Abstract In the p-set Splitting problem we are given a universe U, a family F of subsets of U and a positive integer k and the objective

More information

On the Dimensionality of Voting Games

On the Dimensionality of Voting Games Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008) On the Dimensionality of Voting Games Edith Elkind Electronics & Computer Science University of Southampton Southampton

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

More information

Batch Scheduling of Deteriorating Products

Batch Scheduling of Deteriorating Products Decision Making in Manufacturing and Services Vol. 1 2007 No. 1 2 pp. 25 34 Batch Scheduling of Deteriorating Products Maksim S. Barketau, T.C. Edwin Cheng, Mikhail Y. Kovalyov, C.T. Daniel Ng Abstract.

More information

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt

More information

NP-Completeness and Cook s Theorem

NP-Completeness and Cook s Theorem NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

The chromatic spectrum of mixed hypergraphs

The chromatic spectrum of mixed hypergraphs The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Scheduling Real-time Tasks: Algorithms and Complexity

Scheduling Real-time Tasks: Algorithms and Complexity Scheduling Real-time Tasks: Algorithms and Complexity Sanjoy Baruah The University of North Carolina at Chapel Hill Email: baruah@cs.unc.edu Joël Goossens Université Libre de Bruxelles Email: joel.goossens@ulb.ac.be

More information

Reading 13 : Finite State Automata and Regular Expressions

Reading 13 : Finite State Automata and Regular Expressions CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model

More information

CSC 373: Algorithm Design and Analysis Lecture 16

CSC 373: Algorithm Design and Analysis Lecture 16 CSC 373: Algorithm Design and Analysis Lecture 16 Allan Borodin February 25, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 17 Announcements and Outline Announcements

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

8 Divisibility and prime numbers

8 Divisibility and prime numbers 8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express

More information

Subset feedback vertex set is fixed parameter tractable

Subset feedback vertex set is fixed parameter tractable Subset feedback vertex set is fixed parameter tractable Marek Cygan Marcin Pilipczuk Michał Pilipczuk Jakub Onufry Wojtaszczyk Abstract The FEEDBACK VERTEX SET problem, given an undirected graph G and

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

24. The Branch and Bound Method

24. The Branch and Bound Method 24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

More information

arxiv:1203.1525v1 [math.co] 7 Mar 2012

arxiv:1203.1525v1 [math.co] 7 Mar 2012 Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined

More information

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a

More information

Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding

More information

1 Approximating Set Cover

1 Approximating Set Cover CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt

More information

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce

More information

Mechanisms for Fair Attribution

Mechanisms for Fair Attribution Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is

More information

On the independence number of graphs with maximum degree 3

On the independence number of graphs with maximum degree 3 On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs

More information

Labeling outerplanar graphs with maximum degree three

Labeling outerplanar graphs with maximum degree three Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics

More information

On the Unique Games Conjecture

On the Unique Games Conjecture On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

1 Definitions. Supplementary Material for: Digraphs. Concept graphs

1 Definitions. Supplementary Material for: Digraphs. Concept graphs Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

Lecture 22: November 10

Lecture 22: November 10 CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny

More information

Michał Pilipczuk. Lista publikacji z dnia 31 października 2014. Volume 7392 of Lecture Notes in Computer Science (LNCS), Springer, 2012

Michał Pilipczuk. Lista publikacji z dnia 31 października 2014. Volume 7392 of Lecture Notes in Computer Science (LNCS), Springer, 2012 Michał Pilipczuk Lista publikacji z dnia 31 października 2014 Prace oryginalne w czasopismach Przy publikacjach, które miały wcześniejszą wersję konferencyjną, uwzględniana jest informacja o tej wersji

More information

THE DIMENSION OF A VECTOR SPACE

THE DIMENSION OF A VECTOR SPACE THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field

More information

Two Algorithms for the Student-Project Allocation Problem

Two Algorithms for the Student-Project Allocation Problem Two Algorithms for the Student-Project Allocation Problem David J. Abraham 1, Robert W. Irving 2, and David F. Manlove 2 1 Computer Science Department, Carnegie-Mellon University, 5000 Forbes Ave, Pittsburgh

More information

Energy Efficient Monitoring in Sensor Networks

Energy Efficient Monitoring in Sensor Networks Energy Efficient Monitoring in Sensor Networks Amol Deshpande, Samir Khuller, Azarakhsh Malekian, Mohammed Toossi Computer Science Department, University of Maryland, A.V. Williams Building, College Park,

More information

Connectivity and cuts

Connectivity and cuts Math 104, Graph Theory February 19, 2013 Measure of connectivity How connected are each of these graphs? > increasing connectivity > I G 1 is a tree, so it is a connected graph w/minimum # of edges. Every

More information

Asymptotically Faster Algorithms for the Parameterized face cover Problem

Asymptotically Faster Algorithms for the Parameterized face cover Problem Asymptotically Faster Algorithms for the Parameterized face cover Problem Faisal N. Abu-Khzam 1, Henning Fernau 2 and Michael A. Langston 3 1 Division of Computer Science and Mathematics, Lebanese American

More information

Representing Reversible Cellular Automata with Reversible Block Cellular Automata

Representing Reversible Cellular Automata with Reversible Block Cellular Automata Discrete Mathematics and Theoretical Computer Science Proceedings AA (DM-CCG), 2001, 145 154 Representing Reversible Cellular Automata with Reversible Block Cellular Automata Jérôme Durand-Lose Laboratoire

More information

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs

Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set

More information

Mean Ramsey-Turán numbers

Mean Ramsey-Turán numbers Mean Ramsey-Turán numbers Raphael Yuster Department of Mathematics University of Haifa at Oranim Tivon 36006, Israel Abstract A ρ-mean coloring of a graph is a coloring of the edges such that the average

More information

ALMOST COMMON PRIORS 1. INTRODUCTION

ALMOST COMMON PRIORS 1. INTRODUCTION ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

More information

Bounded Treewidth in Knowledge Representation and Reasoning 1

Bounded Treewidth in Knowledge Representation and Reasoning 1 Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.

More information

Invitation to Fixed-Parameter Algorithms

Invitation to Fixed-Parameter Algorithms Rolf Niedermeier Invitation to Fixed-Parameter Algorithms October 23, 2002 Preface This work is based on my occupation with parameterized complexity and fixed-parameter algorithms which began more than

More information

The Graphical Method: An Example

The Graphical Method: An Example The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,

More information

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J. A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of

More information

School Timetabling in Theory and Practice

School Timetabling in Theory and Practice School Timetabling in Theory and Practice Irving van Heuven van Staereling VU University, Amsterdam Faculty of Sciences December 24, 2012 Preface At almost every secondary school and university, some

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Online and Offline Selling in Limit Order Markets

Online and Offline Selling in Limit Order Markets Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. klchang@yahoo-inc.com 2 Yale University ajohnson@cs.yale.edu Abstract. Completely automated electronic

More information

Minimally Infeasible Set Partitioning Problems with Balanced Constraints

Minimally Infeasible Set Partitioning Problems with Balanced Constraints Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of

More information

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

CHAPTER 9. Integer Programming

CHAPTER 9. Integer Programming CHAPTER 9 Integer Programming An integer linear program (ILP) is, by definition, a linear program with the additional constraint that all variables take integer values: (9.1) max c T x s t Ax b and x integral

More information

Triangle deletion. Ernie Croot. February 3, 2010

Triangle deletion. Ernie Croot. February 3, 2010 Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,

More information

LEARNING OBJECTIVES FOR THIS CHAPTER

LEARNING OBJECTIVES FOR THIS CHAPTER CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

Lecture 7: NP-Complete Problems

Lecture 7: NP-Complete Problems IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit

More information

Lecture 16 : Relations and Functions DRAFT

Lecture 16 : Relations and Functions DRAFT CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

The Student-Project Allocation Problem

The Student-Project Allocation Problem The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.

More information

Tree-representation of set families and applications to combinatorial decompositions

Tree-representation of set families and applications to combinatorial decompositions Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. buixuan@ii.uib.no

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

Completion Time Scheduling and the WSRPT Algorithm

Completion Time Scheduling and the WSRPT Algorithm Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online

More information

Robust Geometric Programming is co-np hard

Robust Geometric Programming is co-np hard Robust Geometric Programming is co-np hard André Chassein and Marc Goerigk Fachbereich Mathematik, Technische Universität Kaiserslautern, Germany Abstract Geometric Programming is a useful tool with a

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics

Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,

More information

Notes on Determinant

Notes on Determinant ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the

More information