arxiv: v1 [cs.ds] 6 Apr 2016
|
|
- Peregrine Collins
- 7 years ago
- Views:
Transcription
1 A Multivariate Approach for Checking Resiliency in Access Control Jason Crampton 1, Gregory Gutin 1, Stéphane Pérennes 2, and Rémi Watrigant 1 1 Royal Holloway University of London, United Kingdom. 2 INRIA/I3S Sophia Antipolis, France. arxiv: v1 [cs.ds] 6 Apr 2016 Abstract. In recent years, several combinatorial problems were introduced in the area of access control. Typically, such problems deal with an authorization policy, seen as a relation UR U R, where (u, r) UR means that user u is authorized to access resource r. Li, Tripunitara and Wang (2009) introduced the Resiliency Checking Problem (RCP), in which in addition to an authorization policy, we are given a subset of resources P R as well as integers s 0, d 1 and t 1. It asks whether upon removal of any set of at most s users, there still exist d pairwise disjoint sets of at most t users such that each set collectively has access to all resources in P. This problem possesses several parameters which appear to take small values in practice. We thus analyze the parameterized complexity of RCP with respect to these parameters, by considering all possible combinations of P, s, d, t. In every case, we are able to decide whether the problem is in FPT, XP, W[2]-hard, para-nphard or para-conp-hard. We also consider the restricted case where s = 0 for which we also determine the complexity for all possible combinations of the parameters, obtaining for some cases a best possible running time under the ETH. 1 Introduction 1.1 Context and definition of the problem Access control is a fundamental aspect of the security of any multi-user computing system. Typically, it is based on the idea of specifying and enforcing an authorization policy, identifying which interactions between a set of users U and a set of resources R are to be allowed by the system [9]. More formally, an authorization policy is defined as a relation UR U R, where (u, r) UR means that user u is authorized to access resource r. Quite recently, we have seen the introduction of resiliency policies, whose satisfaction indicates that a system will continue to function as intended in the absence of some number of authorized users [8, 10]. Li, Tripunitara and Wang s seminal work [8] introduces a number of problems associated with the satisfaction of a resiliency policy, motivated by practical purposes. Among others, they describe a situation where This research was partially supported by EPSRC grant EP/K005162/1. Gutin s research was also supported by Royal Society Wolfson Research Merit Award.
2 a system faces an emergency (e.g., a natural disaster), and some critical task needs to be performed in different sites by several teams of users. We thus require that each team has enough permissions (or ability) to carry out the task, while an upper bound on the size of teams can also be set (e.g., due to the limit of transportation means). For a user u U and a set of users V U, we define N UR (u) = {r R : (u, r) UR} the neighborhood of u and, by extension, N UR (V ) = u V N UR(u) the neighborhood of V, omitting the subscript UR if the authorization policy is clear from the context. Given an authorization policy UR U R, an instance of the Resiliency Checking Problem (RCP) is defined by a resiliency policy res(p, s, d, t), where P R, s 0, d 1 and t 1. We say that UR satisfies res(p, s, d, t) if and only if for every subset S U of at most s users, there exist d pairwise disjoint subsets of users V 1,..., V d such that for all i {1,..., d}: (i) V i S =, (ii) V i t, (iii) N(V i ) P. We now define the main problem we study in this paper: Resiliency Checking Problem (RCP) Input: UR U R, P R, s 0, d 1, t 1. Question: Does UR satisfy res(p, s, d, t)? Furthermore, we will adopt the bracket notation RCP used by Li et al. [8] to denote some restrictions of the problem, in which one or more parameters (among s, d and t) are fixed. In particular, we will consider the cases where s and d are respectively set to 0 and/or 1 (or other fixed positive values), while t might be set to, meaning that there is no constraint on the size of the sets (which is actually equivalent to t = P, implying that we may assume henceforth that t P ). For instance, RCP s = 0 denotes the variant in which s is fixed to 0, i.e. we ask for the satisfaction of res(p, 0, d, t). In the remainder of the paper, we set p = P. Given an instance of RCP, we say that a set of d pairwise disjoint subsets of users V = {V 1,..., V d } satisfying conditions (ii) and (iii) above is a set of teams. For such a set of teams, we define U(V ) = d i=1 V i. Given U U, the restriction of UR to U is defined by UR U = UR (U R). Finally, a set of users S U is called a blocker set if for every set of teams V = {V 1,..., V d }, we have U(V ) S. Equivalently, observe that S is a blocker set if and only if UR U\S does not satisfy res(p, 0, d, t). Throughout the paper, we set [d] = {1,..., d} for any integer d 1, and we will often make use of the O (.) notation, which omits polynomial factors and terms. 1.2 Parameters As one can see in the definition above, an instance of RCP contains several parameters (namely s, d and t) which may be used for the complexity analysis of
3 the problem. An interesting point of the work of Li et al. [8] is the following: while the number of users in an organization can be quite large, the other parameters (s, d, t, and even p) are expected to take smaller values in practice. In their experiments, the maximum values used are n = 100, p = 10 and d = 7 (they only run experiments on the variant where t =, but, as we observed previously, we may set t = p). With this in mind, we exploit the theory of fixed-parameter tractability in order to settle the parameterized complexity of the problem. Given an instance x (of size x ) of a decision problem, coming with a parameter 1 k, we are interested in algorithms deciding whether x is positive or negative in polynomial time when k is bounded above by a constant. More precisely, if such an algorithm has running time O(f(k) x O(1) ) for some computable function f, then we will say that this algorithm is FPT, while if its running time is O( x f(k) ) for some computable function f, we will say that this algorithm is XP (an FPT algorithm is thus an XP algorithm). By extension, FPT (resp. XP) denotes the class of all problems for which an FPT (resp. XP) algorithm exists. Proving the NP-hardness of a problem in the case where a parameter k is bounded above by a constant immediately forbids the existence of any XP (and thus FPT) algorithm unless P = NP. In this case, we will say that this parameterized problem is para-np-hard. A similar definition can be given using conp and conp-hard instead of NP and NP-hard, respectively, leading to the para-conp-hard complexity class. In the following, para-(co)nphard thus denotes the union of para-np-hard and para-conp-hard. Finally, the W[i]-hierarchy of parameterized problems is typically used to rule out the existence of an FPT algorithm, under the widely believed conjecture that FPT W[1]. For more details about fixed-parameter tractability, we refer the reader to the recent textbook and monograph of [2] and [5], respectively. 1.3 Related work As one can expect, the RCP problem is strongly related to some known combinatorial problems. Indeed, one can observe that RCP s = 0, d = 1 is equivalent to the Set Cover problem, while RCP s = 0, t = can be reduced in a straightforward way from the Domatic Partition problem. Li et al. [8] obtained several (mainly negative) results for RCP in some restricted cases which can be summarized by the following theorem. Theorem 1 ([8]). We have the following: RCP, RCP d = 1 and RCP t = are NP-hard and are in conp NP. RCP s = 0, d = 1, RCP s = 0, t = are NP-hard. RCP d = 1, t = can be solved in linear time. In addition, they developed and implemented an algorithm for RCP which roughly consists in(i) enumerating all subsets of at most s users, and (ii) for some carefully chosen subsets S, determining the satisfaction of res(p, 0, d, t) for 1 Note that one can aggregate several parameters p 1,..., p m by defining k = p p m, in which case we will say the parameter is (p 1,..., p m).
4 UR U\S. Step (ii) is achieved by a SAT formulation of the problem and the use of an off-the-shelf SAT solver, while they develop a pruning strategy in order to avoid running the SAT solver for every set S. Quite surprisingly, they observe that the bottleneck of their algorithm lies in the second step, where an instance of RCP s = 0 has to be solved. This motivated us to focus on the parameterized complexity of RCP s = 0 separately. p, s, d, t 1.4 Contribution and organization of the paper Our goal in this paper is thus to determine the parameterized complexity of RCP and RCP s = 0 with respect to parameters p, t p, s p, p, s, d d, t, s, by d considering s, t d, t every possible combination of them. In each case, we aim to determine whether the problem is(i) in FPT, (ii) in XP but W[i]-hard for some i 1 or (iii) parap s d (co)np-hard. XP FPT p, s, t p, s, d p, d, t t para-np-hard s, d, t W[2]-hard FPT p, s, d, t p, s, t p, s, d p, d, t XP s, d, t FPT p, d, t XP p, d p, t d, t p, t p, s p, d s, d s, t d, t W[2]-hard p s t d para-(co)np-hard (a) RCP W[2]-hard p d t para-np-hard (b) RCP s = 0 Fig. 1: Schemas of the complexity of RCP and RCP s = 0 after the results obtainedfpt in thisp, d, paper. t XP p, d p, t d, t Figure 1 summarizes the (already known and) obtained results for RCP and RCP s = 0 withw[2]-hard respect to all possible combinations of the parameters specified previously. p An arrow A B means that A is a larger parameter than d t 1 B, in the sense para-np-hard that an FPT algorithm parameterized by B implies an FPT algorithm parameterized by A, and, conversely, any negative result mentioned previously parameterized by A implies the same negative result parameterized by B. Since (under classical complexity assumptions) a decision problem is either in one of the previous cases (i), (ii) or (iii), one can observe that the parameterized complexity of RCP (and thus RCP s = 0 ) is now completely determined with respect to all possible combinations of parameters p, d and t. In the next section, we report all our results for the general case RCP, namely: membership in XP parameterized by (s, d, t) (Theorem 2), 1
5 membership in FPT parameterized by p only. para-conp-hardness parameterized by (d, t) (Theorem 4), para-np-hardness parameterized by (s, t) (Theorem 5). Note that the para-np-hardness for (s, d) was already known (Theorem 1), as well as the W[2]-hardness for (s, d, t) (see explanation in Section 2.2). Section 3 contains all our results for the restricted case RCP s = 0 : we first provide an FPT algorithm parameterized by (d, p) with an optimal running time (under ETH) when d is fixed (Theorems 6 and 7). We also investigate the question of data (user) reductions and present positive and negative kernelization results depending on the considered variant: RCP s = 0 or RCP s = 0, t = (Theorem 8). Note that still concerning RCP s = 0, its W[2]-hardness for (d, t) is inherited from RCP, while the XP membership results from a brute-force enumeration of all subsets of users of size dt. We finally conclude the paper in Section 4. 2 The general case 2.1 Introduction and preliminaries First, observe that there exists a simple XP algorithm for RCP parameterized by (s, d, t). Indeed, recall that the problem actually aims to check whether there exists a set S U of size at most s such that for any set of teams V = {V 1,..., V d } we have S U(V ), and note that finding a set of teams is exactly the RCP s = 0 problem, which is in XP parameterized by (d, t). Hence, since U(V ) dt, by finding iteratively a set of teams and branching on each element to be removed from it (and included in the future blocker set), one can determine whether there exists a blocker set of size at most s in XP time parameterized by (s, d, t): Theorem 2. RCP is in XP when parameterized by (s, d, t) Despite its simplicity, this result is actually somehow tight. First, as we will see later (Section 2.2), RCP is W[2]-hard with this parameterization. In addition, considering a strict subset of {s, d, t} as a parameter makes the problem para-(co)np-hard (Theorems 1, 4 and 5). A way of going further is to replace t by p. Indeed, one can observe that we may always assume that t p. With this modification, we show in the next result how to get rid of parameters s and d by designing an FPT algorithm parameterized by p only. The idea of this algorithm is to use a system of linear inequalities, and to eliminate some variables of it. To do so, we use the so-called Fourier-Motzking elimination algorithm [3] which we now describe. Unless otherwise stated, all coefficients of the considered systems of linear equations belong to Q. We say that a system S of linear inequalities is consistent if and only if there is an assignment of variables for which all inequalities hold. Lemma 1. Let S be a system of m linear inequalities over a set of variables V, and let x V. Then it is possible to obtain, in time polynomial in m and V,
6 a system S of at most m 2 /4 inequalities over the set of variables V \ {x}, such that S and S are equivalent: S is consistent if and only if S is consistent. Proof. Let Q 1,..., Q m be the set of inequalities of S, V = {x 1,..., x n }. W.l.o.g. we show how to eliminate variable x n. To do so, let [m] = I I I be a partition of the inequalities depending on the sign of the coefficient of x n (we may assume that coefficient of x n is either 1, 0 or 1 in each inequality). More precisely: for all i I, inequality Q i is of the form x n b i n 1 j=1 aj i x j for all i I, inequality Q i is of the form x n b i n 1 j=1 aj i x j for all i I, the coefficient of x n in Q i is 0 (i.e. x n does not appear in Q i ) One can observe that we can obtain an equivalent system by replacing all inequalities in I I by the following formula: n 1 n 1 max{b i a j i x j} x n min{b i a j i x j} i I i I j=1 Which is, itself, equivalent to the conjunction of I I linear inequalities: for all i 1 I and all i 2 I, let Q i1,i 2 be the following inequality: j=1 n 1 n 1 b i1 a j i 1 x j b i2 a j i 2 x j j=1 By ( the foregoing, S is equivalent to the system S composed of inequalities I Q i1 I,i2 I i1,i 2 ). As desired, x n does not appear in S, and observe that S has at most m 2 /4 inequalities, the worst case being when I = I = m/2. j=1 We are now ready to prove the main result of this section. Theorem 3. RCP is FPT parameterized by p. Proof. Without loss of generality, we may assume P = R as well as N(u) for all u U. For all N P, let U N = {u U : N(u) = N} (notice that we might have U N = for some N P ). Roughly speaking, the idea of the algorithm relies on the fact that in order to construct a set of team or a blocker set, it is sufficient to know the size of its intersection with U N, for every N P. Let us define the following set whose elements will be called configurations: { } b C = {N 1,..., N b } : b t, N i P, i [b], N i = P. Then, for any N P, we note i=1 C N = {c = {N 1,..., N bc } C : N = N i for some i [b c ]}
7 the set of configurations involving N. Observe that since we assume t p, we have C = O(2 p2 ). The link between sets of teams and configurations comes from the following definition: given a set of teams V, we say that a team T V has configuration c = {N 1,..., N b }, b t if c = {N(u), u T }. In other words, c represents the distincts neighborhoods of users of T in P. First, we define a system of linear inequalities L over the set of variables X Z, where X = {x c : c C} and Z = {z N : z P } as follows: x c = d (1) c C c C N x c U N z N for every N P (2) An assignment of variables X (resp. Z) will be called valid if x c {0,..., d} for all c C (resp. z N {0,..., max{s, U N }} for all N P ). While we would be able to solve this system in FPT time parameterized by p, the reader might realize that doing so would not solve RCP directly. Nevertheless, the link between this system and our problem is the following: Lemma 2. res(p, s, d, t) is satisfiable iff L has a valid assignment of variables X for every valid assignment of variables Z such that N P z N s. Proof. Suppose first that res(p, s, d, t) is satisfiable, and let zn be a valid assignment for Z such that N P z N s. We now define a set of users S by picking, in an arbitrary manner, zn users in U N, for each N P (since zn max{s, U N }, such a set S must exist). Since S is a set of at most s users, there exists a set of teams V = {T 1,..., T d } such that U(V ) S =. Then, for each c C, let x c be the number of teams of V having configuration c. Clearly we have c C x c = d, and thus constraint (1) is satisfied. Then, for all N P, we may assume w.l.o.g. that T i U N 1 for all i {1,..., d}. Hence c C N x c equals U(V ) U N, which is the number of users of U N involved in some teams of V. Since U(V ) S =, we have c C N x c U N zn, and thus constraint (2) is also satisfied, i.e. L has a valid assignment of variables X. Conversely, let S U, S s. For each N P, define zn = S U N, which is thus a valid assignment of variables Z. Hence, there exists a valid assignment {x c : c C} of variables X. Then, for c = {N 1,..., N b } C, b t, consider a set of users T consisting of a user chosen arbitrarily in U Ni per each i [b]. By definition of a configuration, T is a team. Then, since for all N P, we have, by constraint (2), that c C N x c U N zn, it is possible to construct x c pairwise disjoint such team for each c C, each having an empty intersection with S. In other words, for every S U, S s, there exists a set of teams V such that U(V ) S =, and thus res(p, s, d, t) is satisfiable. The next step of the algorithm is to eliminate all variables X from the previous system, using the Fourier-Motzkin elimination algorithm described in Lemma 1. Since in our case L has 2 p + 2 inequalities (equation (1) is turned
8 into two inequalities), and since X = C = O(2 p2 ), applying the Fourier- Motzkin elimination for each variable of X successively, it is possible to obtain an equivalent system of linear inequalities L involving only variables Z, and having a number of inequalities bounded by a function of p only. If we denote by Q 1,..., Q r the inequalities of L, inequality Q i, i [r], has the following form: a i N z N b i N P where a i N, bi Q are constants for all N P, (depending on the instance, in particular on values of U N, N P ). By Lemma 2, one can test if res(p, s, d, t) is unsatisfiable by looking for an assignement of Z such that N P z N s which makes L unsatisfiable. Since L is unsatisfiable if and only if one inequality is false, it is sufficient to consider every inequality Q i independently, and to look for a valid assignment of variables Z such that z N s and a i N z N < b i N P One can observe that this problem is polynomial for each inequality Q i. Indeed, we can first pre-process all cases in which b > 0 or a N > 0 for some N P, and only solve remaining cases of the form: z N s N P N P d N z N B N P with d N, B Q + for all N P. We now have a Knapsack instance, for which a classical pseudo-polynomial algorithm allows us to conclude the proof. 2.2 Negative results It is worth pointing out that the reduction of [8, Lemma 3] proving the NPhardness of RCP s = 0, d = 1 actually proves the W[2]-hardness of this problem parameterized by t (from Set Cover parameterized by the size of the solution [5]). Another implication of this reduction is the para-np-hardness of RCP when parameterized by (s, d). We now complement this result by showing that RCP d = 1, t = τ is conp-hard for every fixed τ 3, implying para-conphardness of RCP parameterized by (d, t). Theorem 4. RCP d = 1, t = τ is conp-hard for every fixed τ 3. Proof. We reduce from the δ-hitting Set problem, in which we are given a ground set V = {v 1,..., v n }, a set S = {S 1,..., S m } with S j V and S j = δ for all j [m] and an integer k, and where the goal is to find a set C V of
9 size at most k and such that C S j for all j [m]. This problem is known to be NP-hard for every δ 2 [6]. Hence, let (V, S, k) be an instance of δ-hitting Set defined as above. For every j [m], fix an arbitrary ordering of S j, which can thus be seen as a tuple (v i1,..., v iδ ), allowing us to define S j [x] = v ix for all x [δ]. We define a set of users U = U V U S, where U V = {u V 1,..., u V n } and U S = {u S 1,..., u S m}. We then define a set of resources R = R V R S {r }, where R S } for all j [m], and where RV contains one resource rq V for every subset Q of δ 1 users of U V. We now define the authorization policy UR by giving N(u) for every u U. For every i [n], N(u V i ) is composed of {pj x : j [m], x [δ] such that S j [x] = v i } together with all resources rq V such that uv i / Q, for every subset Q of δ 1 users of U V. For all j [m], N(u S j ) is composed of r together with R S \ P j. To conclude the construction, we let P = R, t = δ + 1, d = 1, and s = k. Clearly this reduction can be done in polynomial time. The remainder consists in proving that every team (i.e. sets of at most t users having collectively access to all R) is of the form T j = {u V i 1,..., u V i δ, u S j } such that S j = {v i1,..., v iδ }. If this is true, then observe that since, for every = m j=1 P j with P j = {p j 1,..., pj δ j [m], user u S j only belongs to team T j, we will be able to suppose w.l.o.g. that it does not belong to any blocker set, and thus the set of all teams will be in one-to-one correspondence with the sets in S, implying that the obtained instance has a blocker set of size at most s (= k) if and only if there is a hitting set of size at most k. Let T U of size at most t. By construction, we need at least δ users from U V to have access to all resources in R V (indeed, every set Q of δ 1 users from U V has only access to R V \ {rq V S }), and we also need at least one user from U to have access to r. Hence, T U V = δ and T U S = {u S j } for some j [m]. Now, notice that u S j has access to all resources in R but P j, which implies that T U V must have collectively access to all resources in P j. However, this can only happen if T U V = {u V i 1,..., u V i δ }, where S j = {v i1,..., v iδ }, concluding the proof. We also settle the case of RCP parameterized by (s, t) (and thus RCP s = 0 parameterized by t). Theorem 5. RCP s = 0, t = 4 is NP-hard. Proof. We reduce from the 3-Dimensional Matching problem, in which we are given three sets X, Y and Z of n elements each, a set M X Y Z of hyperedges, and an integer k. The goal is to find M M with M k such that e, e M with e e, e = (x, y, z), e = (x, y, z ), we have x x, y y and z z (in that case, we will say that these two hyperedges are disjoint). We note m = M, X = {x 1,..., x n }, Y = {y 1,..., y n } Z = {z 1,..., z n }, and M = {e 1,..., e m }.
10 We then define the following set of resources: P = {r X 1,..., r X m} {r Y 1,..., r Y m} {r Z 1,..., r Z m} {r X, r Y, r Z, r } and a set of users U composed of U X, U Y, U Z and U, where, for all ω {X, Y, Z, }, we note U ω = {u ω 1,..., u ω n}. Then the authorization policy A is informally constructed as follows: for each hyperedge e j = {x i1, y i2, z i3 }, user u X i 1 (resp. u Y i 2, u Z i 3 ) has access to rj X (resp. rj Y, rz j ) and to r X (resp. r Y, r Z ), and user u j has access to all resources in P but rx j, ry j, rz j, r X, r Y and r Z. More formally, we have: A = {(u X i, r X j ) : x i belongs to e j, i [n], j [m]} {(u Y i, r Y j ) : y i belongs to e j, i [n], j [m]} {(u Z i, r Z j ) : z i belongs to e j, i [n], j [m]} {(u j, r ω h ) : ω {X, Y, Z}, j, h [m]j h} {(u ω i, r ω ) : i [n], ω {X, Y, Z}} {u j, r ) : j [m]} To conclude the construction, which can be done in polynomial time, we set d = k, and the resiliency policy is thus res(p, 0, d, 4). First, suppose that there exists a solution M for the 3-Dimensional Matching problem. Without loss of generality, assume that M = k, M = {e 1,..., e k }, and that e i = (x i, y i, z i ) for all i [k] (recall that all members of M are pairwise disjoint). Then, observe that for all i [k], user u i has access to all resources but ri X, ry i, rz i, r X, r Y and r Z. However, u X i has access to ri X and r X, user u Y i has access to ri Y and r Y, and user u Z i has access to ri Z and r Z. Hence, we have N({u X i, uy i, uz i, u i }) = P, and, since all members of M are pairwise disjoint, we thus constructed a set of teams for RCP s = 0, t = 4, or, in other words, res(p, 0, d, 4) is satisfiable. Conversely, suppose that there exist V 1,..., V d, pairwise disjoint subsets of U such that for all i [d], we have V i = 4 and N(V i ) = P. We first claim that for all i [d], V i intersects U X (resp. U Y, U Z and U ) on exactly one element. Indeed, otherwise, since V i = 4 and since all users in U X (resp. U Y, U Z, U ) have access to only r X (resp. r Y, r Z, r ) among {r X, r Y, r Z, r }, V i could not have access to all these resources. Thus, we know that for all i [d], we have V i = {u X i 1, u Y i 2, u Z i 3, u i 4 }, for some (i 1, i 2, i 3, i 4 ) [n] [n] [n] [m]. We claim that (x i1, y i2, z i3 ) = e i4. Indeed, observe that user u i 4 has access to all resources but ri X 4, ri Y 4, ri Z 4, r X, r Y and r Z. By construction, the only way for having N(V i ) = P is that user u X i 1 (resp. u Y i 2, u Z i 3 ) has access to resources ri X 4 (resp. ri Y 4, ri Z 4 ) or, in other words, that x i1 (resp. y i2, z i3 ) belongs to hyperedge e i4. Thus, there exists k pairwise disjoint hyperedges in M.
11 3 The case s = 0 We now turn to the particular case where s = 0. As we noted in Section 1, one motivation for studying this case is that it is the bottleneck of the algorithm of Li et al. [8] for RCP. Hence, we believe that designing efficient algorithms for this sub-case might help solving much larger instances of RCP than is possible currently. To this end, we now provide a complete characterization of the complexity when considering all possible combinations of parameters among p, d and t. We also investigate the question of reduction rules within the framework of kernelization, highlighting an interesting difference of behavior between RCP s = 0 and RCP s = 0, t =. 3.1 FPT algorithms The first algorithm is a dynamic programming-based approach similar to the one for Set Cover [5], in order to obtain an FPT algorithm for RCP s = 0 parameterized by (p, d). While this result was already known, given that RCP is itself FPT parameterized by p only, we provide for RCP s = 0 a better running time. In particular, as we will see later, a previous known reduction of Li et al. [8] actually proves that when d is fixed, the obtained running time is the best we can hope for, under the Exponential Time Hypothesis (ETH) 2. Theorem 6. RCP s = 0 can be solved in O (2 dp ) time. Proof. Let U = {u 1,..., u n }. We define a dynamic programming algorithm which, given any i [n] and any d-tuple of subsets of P (S 1,..., S d ), returns yes if there exist d mutually disjoint sets T 1,..., T d, each being a subset of {u 1,..., u i } and such that S j N(T j ) for all j [d], and returns no otherwise (in which case we will say that such an algorithm is correct). To do so, we define the following recursive formula DP. First, we set: DP (0, S 1,..., S d ) = 1 if and only if S j =, for all j [d]; DP (i,,..., ) = 1 for all i [n]. For the induction, let i [n] and S = (S 1,..., S d ) where S j P for all j [d]. Let J = {j [d] : S j }, and for all j J, define S j = (S 1,..., S j 1, S j \ N(u i ), S j+1,..., S d ). Finally, we set: DP (i, S) = DP (i 1, S) DP (i 1, S j ) j J Lemma 3. DP (i, S) is correct. 2 The ETH claims that SAT cannot be solved in O (2 o(n) ), where n is the number of variables in the CNF formula [7].
12 Proof. Suppose that T 1,..., T d are d mutually disjoint subsets of {u 1,..., u i } such that S j N(T j ) for all j [d]. We may assume that T j iff S j. Then, either u i / T j for all j [d], in which case DP (i 1, S) returns yes, or u i T j for some j [d], which implies S j and thus j J. In this case DP (i 1, S j ) returns yes. Conversely, if DP (i 1, S) return yes, then there exist d mutually disjoint sets T 1,..., T d, each being a subset of {u 1,..., u i 1 } (and thus a subset of {u 1,..., u i }), and such that S j N(T j ) for all j [d]. If DP (i 1, S j ) returns yes for some j J, then there exist d mutually disjoint sets T 1,..., T d, each being a subset of {u 1,..., u i } and such that S q N(T q ) for all q [d], q j, and S j \ N(u i ) N(T j ). In this case S j N(T j {u i }). Clearly, DP (n, P,..., P ) returns yes if and only if res(p, 0, d, t) is satisfiable. A table of size n2 dp is sufficient to store all intermediate results, while each step takes O(d) time, establishing the claimed running time. Li et al. [8] showed that RCP s = 0, t =, d = 3 is NP-hard, by a reduction from 3-Domatic Partition, which transforms a graph of n vertices into an instance (U, R, UR, res(p, 0, 3, )) with P = n. Since a 2 o(n) algorithm for 3- Domatic Partition would violate the ETH (by a linear reduction from SAT [1]), we have the following: Theorem 7. RCP s = 0, t =, d = 3 cannot be solved in 2 o(p) time unless the ETH fails. Hence, for fixed d, the algorithm described in Theorem 6 has an optimal running time. 3.2 User reductions We now focus on reduction rules which can be performed in polynomial time and result in an equivalent instance having a smaller number of users. More formally, we say that a (decision) problem has a kernel [5] of size f, for some computable function f : N N, if there exists a polynomial algorithm which, given an instance x with parameter k, outputs an instance x of size x with parameter k such that: (i) k k, (ii) x is positive if and only if x is positive, and (iii) x f(k). In the case of RCP s = 0 our aim is thus to obtain an equivalent instance with a number of users bounded by a function of d and t. While the role of t was so far of less interest for the complexity of the problem, we show that the problem behaves differently from the kernelization point of view, depending on whether t = or not. We first show that when t =, the problem admits a kernel with at most dp users. To do so, we will make use of the following: Lemma 4 (d-expansion Lemma [2]). Let d 1 be a positive integer and G = (A, B, E) be a bipartite graph with bipartition (A, B) and E A B such that for all b B, N(b). If B d A, then there exist non-empty vertex sets X A and Y B which can be found in time polynomial in the size of G, such that:
13 (i) N(Y ) X, and (ii) there is a d-expansion of X into Y : a collection M E (X Y ) such that every vertex of X is incident to exactly d edges of M, and exactly d X vertices of Y are incident to an edge of M. Theorem 8. RCP s = 0, t = admits a kernel with at most dp users. Proof. Suppose we are given an instance of RCP s = 0, t =. We present two reduction rules whose purpose is to decrease the number of users. For each of these rules, we will prove that the instance is positive iff the reduced instance is positive, in which case we will say that the rule is safe. Reduction Rule 1: if there exists u U with N(u) =, then delete u. Proof (of safeness). Simply observe that such a user cannot participate in any set of teams if the instance is positive, and, conversely, cannot turn a negative instance into a positive one if it is deleted. Reduction Rule 2: if there exist X P, Y U such that N(Y ) X and there is a d-expansion of X into Y, then delete X from P, Y from U, and (Y X) UR from UR. Proof (of safeness). If the instance is a positive one, then there exists a set of teams {V 1,..., V d }. Then, for all r P \ X, there does not exist u Y such that (u, r) UR, since N(Y ) X. Hence, N(V i \ Y ) P \ X, and thus {V 1 \ Y,..., V d \ Y } is a set of teams for the reduced instance, which is thus a positive one. Conversely, suppose that the reduced instance is a positive one: there exists V 1,..., V d, disjoints sets of users from U \ Y such that N(V i ) P \ X. Since there is a d-expansion of X into Y, for all r Y, there exists u r 1,... u r d Y such that (u r i, r) UR for all i [d], where ur i ur i for all r r and i i. Hence, for all i [d], if we set V i = V i {u r i all 1 i < j d, and N(V i instance as well, which proves that the rule is safe. : r Y }, we have V i V j = for ) P for all i [d], and thus we have a positive Since each reduction rule can be applied in polynomial time, and since each of them decreases the number of users by at least one, the algorithm runs in polynomial time. Finally, by Lemma 4, if none of the previous reduction rules applies, then U dp, and we thus have a kernel with at most dp users, as desired. As Li et al. [8] point out, RCP s = 0, d = 1 is equivalent to the Set Cover Problem. Known kernel lower bounds for this problem [4] lead to the following theorem, which is in sharp contrast to the previous case. Theorem 9. RCP s = 0, d = 1 (and thus RCP s = 0 ) does not admit a kernel with (p + t) O(1) users, unless conp NP/poly.
14 4 Conclusion and future work We considered RCP, a problem introduced recently in the area of access control that deals with the resiliency of a system. Given the large number of natural parameters in an instance of this problem, and given that these parameters are likely to take small values in practice, our goal was to provide a systematic analysis of the complexity of the problem using the framework of parameterized complexity. For all possible combinations of the natural parameters of the problem, we were able to settle the parameterized complexity of the problem. We also considered a restricted variant of the problem for which we gave some refined and tight complexity results as well as data reduction algorithms. A possible interesting further line of research would be to study resiliency aspects with respect to other problems. In the context of graphs for instance, we could define the problem of determining whether upon removal of at most s vertices, a given graph still satisfies some property given by another combinatorial problem, e.g. having a vertex cover of size k. We believe that considering structural parameterizations (together with s or not) might lead to interesting new results. As in our case, the complexity of such a new problem will certainly depend on the complexity of the considered underlying problem (i.e. the case s = 0). References 1. Nadia Creignou. The class of problems that are linearly equivalent to satisfiability or a uniform method for proving NP-completeness. Theoretical Computer Science, 145(1-2): , Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, George B Dantzig. Fourier-Motzkin elimination and its dual. Technical Report TR 72-18, Stanford University, Michael Dom, Daniel Lokshtanov, and Saket Saurabh. Incompressibility through colors and IDs. In Automata, Languages and Programming, 36th International Colloquium, ICALP 2009, Rhodes, Greece, July 5-12, 2009, Proceedings, Part I, pages , R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, M. R. Garey and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4): , Ninghui Li and Mahesh V. Tripunitara Qihua Wang. Resiliency policies in access control. ACM Trans. Inf. Syst. Secur., 12(4), Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38 47, Qihua Wang and Ninghui Li. Satisfiability and resiliency in workflow authorization systems. ACM Trans. Inf. Syst. Secur., 13(4):40, 2010.
Satisfiability and Resiliency in Workflow Systems
Satisfiability and Resiliency in Workflow Systems Qihua Wang Ninghui Li Center for Education and Research in Information Assurance and Security and Department of Computer Science Purdue University Abstract.
More informationHow To Solve A K Path In Time (K)
What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov
More informationExponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
More informationTutorial 8. NP-Complete Problems
Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem
More informationGenerating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
More informationApproximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
More informationLecture 17 : Equivalence and Order Relations DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More informationComplexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
More informationDetermination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
More information1 The Line vs Point Test
6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity
More informationOn the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we
More informationShort Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles
Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Venkatesh Raman and Saket Saurabh The Institute of Mathematical Sciences, Chennai 600 113. {vraman
More information1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since
More informationMinimum Bisection is NP-hard on Unit Disk Graphs
Minimum Bisection is NP-hard on Unit Disk Graphs Josep Díaz 1 and George B. Mertzios 2 1 Departament de Llenguatges i Sistemes Informátics, Universitat Politécnica de Catalunya, Spain. 2 School of Engineering
More informationEven Faster Algorithm for Set Splitting!
Even Faster Algorithm for Set Splitting! Daniel Lokshtanov Saket Saurabh Abstract In the p-set Splitting problem we are given a universe U, a family F of subsets of U and a positive integer k and the objective
More informationOn the Dimensionality of Voting Games
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008) On the Dimensionality of Voting Games Edith Elkind Electronics & Computer Science University of Southampton Southampton
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More information1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
More informationNear Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
More informationCOMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
More informationGuessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationA Note on Maximum Independent Sets in Rectangle Intersection Graphs
A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,
More informationBatch Scheduling of Deteriorating Products
Decision Making in Manufacturing and Services Vol. 1 2007 No. 1 2 pp. 25 34 Batch Scheduling of Deteriorating Products Maksim S. Barketau, T.C. Edwin Cheng, Mikhail Y. Kovalyov, C.T. Daniel Ng Abstract.
More informationInstitut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover
Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt
More informationNP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
More information3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
More informationDefinition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationThe chromatic spectrum of mixed hypergraphs
The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex
More informationNo: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationScheduling Real-time Tasks: Algorithms and Complexity
Scheduling Real-time Tasks: Algorithms and Complexity Sanjoy Baruah The University of North Carolina at Chapel Hill Email: baruah@cs.unc.edu Joël Goossens Université Libre de Bruxelles Email: joel.goossens@ulb.ac.be
More informationReading 13 : Finite State Automata and Regular Expressions
CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model
More informationCSC 373: Algorithm Design and Analysis Lecture 16
CSC 373: Algorithm Design and Analysis Lecture 16 Allan Borodin February 25, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 17 Announcements and Outline Announcements
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More information8 Divisibility and prime numbers
8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express
More informationSubset feedback vertex set is fixed parameter tractable
Subset feedback vertex set is fixed parameter tractable Marek Cygan Marcin Pilipczuk Michał Pilipczuk Jakub Onufry Wojtaszczyk Abstract The FEEDBACK VERTEX SET problem, given an undirected graph G and
More informationFairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
More informationTesting LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
More information24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
More informationarxiv:1203.1525v1 [math.co] 7 Mar 2012
Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined
More informationChapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationOptimal Index Codes for a Class of Multicast Networks with Receiver Side Information
Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net
More informationON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
More informationIntroduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
More information1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
More informationNan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA
A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce
More informationMechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
More informationOn the independence number of graphs with maximum degree 3
On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs
More informationLabeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
More informationOn the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More information1 Definitions. Supplementary Material for: Digraphs. Concept graphs
Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.
More informationHow To Find An Optimal Search Protocol For An Oblivious Cell
The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,
More informationLecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
More informationMichał Pilipczuk. Lista publikacji z dnia 31 października 2014. Volume 7392 of Lecture Notes in Computer Science (LNCS), Springer, 2012
Michał Pilipczuk Lista publikacji z dnia 31 października 2014 Prace oryginalne w czasopismach Przy publikacjach, które miały wcześniejszą wersję konferencyjną, uwzględniana jest informacja o tej wersji
More informationTHE DIMENSION OF A VECTOR SPACE
THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field
More informationTwo Algorithms for the Student-Project Allocation Problem
Two Algorithms for the Student-Project Allocation Problem David J. Abraham 1, Robert W. Irving 2, and David F. Manlove 2 1 Computer Science Department, Carnegie-Mellon University, 5000 Forbes Ave, Pittsburgh
More informationEnergy Efficient Monitoring in Sensor Networks
Energy Efficient Monitoring in Sensor Networks Amol Deshpande, Samir Khuller, Azarakhsh Malekian, Mohammed Toossi Computer Science Department, University of Maryland, A.V. Williams Building, College Park,
More informationConnectivity and cuts
Math 104, Graph Theory February 19, 2013 Measure of connectivity How connected are each of these graphs? > increasing connectivity > I G 1 is a tree, so it is a connected graph w/minimum # of edges. Every
More informationAsymptotically Faster Algorithms for the Parameterized face cover Problem
Asymptotically Faster Algorithms for the Parameterized face cover Problem Faisal N. Abu-Khzam 1, Henning Fernau 2 and Michael A. Langston 3 1 Division of Computer Science and Mathematics, Lebanese American
More informationRepresenting Reversible Cellular Automata with Reversible Block Cellular Automata
Discrete Mathematics and Theoretical Computer Science Proceedings AA (DM-CCG), 2001, 145 154 Representing Reversible Cellular Automata with Reversible Block Cellular Automata Jérôme Durand-Lose Laboratoire
More informationHandout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs
MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set
More informationMean Ramsey-Turán numbers
Mean Ramsey-Turán numbers Raphael Yuster Department of Mathematics University of Haifa at Oranim Tivon 36006, Israel Abstract A ρ-mean coloring of a graph is a coloring of the edges such that the average
More informationALMOST COMMON PRIORS 1. INTRODUCTION
ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationDuality of linear conic problems
Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least
More informationMath 4310 Handout - Quotient Vector Spaces
Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable
More informationBounded Treewidth in Knowledge Representation and Reasoning 1
Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.
More informationInvitation to Fixed-Parameter Algorithms
Rolf Niedermeier Invitation to Fixed-Parameter Algorithms October 23, 2002 Preface This work is based on my occupation with parameterized complexity and fixed-parameter algorithms which began more than
More informationThe Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
More informationARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.
A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of
More informationSchool Timetabling in Theory and Practice
School Timetabling in Theory and Practice Irving van Heuven van Staereling VU University, Amsterdam Faculty of Sciences December 24, 2012 Preface At almost every secondary school and university, some
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More informationOnline and Offline Selling in Limit Order Markets
Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. klchang@yahoo-inc.com 2 Yale University ajohnson@cs.yale.edu Abstract. Completely automated electronic
More informationMinimally Infeasible Set Partitioning Problems with Balanced Constraints
Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of
More informationFollow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu
COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part
More informationOn the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics
More informationCHAPTER 9. Integer Programming
CHAPTER 9 Integer Programming An integer linear program (ILP) is, by definition, a linear program with the additional constraint that all variables take integer values: (9.1) max c T x s t Ax b and x integral
More informationTriangle deletion. Ernie Croot. February 3, 2010
Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,
More informationLEARNING OBJECTIVES FOR THIS CHAPTER
CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional
More informationPermutation Betting Markets: Singleton Betting with Extra Information
Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete
More informationLecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
More informationLecture 16 : Relations and Functions DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence
More informationQuotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
More informationThe Student-Project Allocation Problem
The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.
More informationTree-representation of set families and applications to combinatorial decompositions
Tree-representation of set families and applications to combinatorial decompositions Binh-Minh Bui-Xuan a, Michel Habib b Michaël Rao c a Department of Informatics, University of Bergen, Norway. buixuan@ii.uib.no
More informationAdaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
More informationCompletion Time Scheduling and the WSRPT Algorithm
Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online
More informationRobust Geometric Programming is co-np hard
Robust Geometric Programming is co-np hard André Chassein and Marc Goerigk Fachbereich Mathematik, Technische Universität Kaiserslautern, Germany Abstract Geometric Programming is a useful tool with a
More informationFormal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
More informationConsistent Query Answering in Databases Under Cardinality-Based Repair Semantics
Consistent Query Answering in Databases Under Cardinality-Based Repair Semantics Leopoldo Bertossi Carleton University School of Computer Science Ottawa, Canada Joint work with: Andrei Lopatenko (Google,
More informationNotes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
More information