Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Bibliometrics
Skip Table Of Content Section
research-article
Selection and Sorting in the “Restore” Model
Article No.: 11, Pages 1–18https://doi.org/10.1145/3168005

We consider the classical selection and sorting problems in a model where the initial permutation of the input has to be restored after completing thecomputation. Such algorithms are useful for designing space-efficient algorithms, when one encounters ...

research-article
Analyzing Node-Weighted Oblivious Matching Problem via Continuous LP with Jump Discontinuity
Article No.: 12, Pages 1–25https://doi.org/10.1145/3168008

We prove the first non-trivial performance ratio strictly above 0.5 for the weighted Ranking algorithm on the oblivious matching problem where nodes in a general graph can have arbitrary weights.

We have discovered a new structural property of the ...

research-article
Known Algorithms on Graphs of Bounded Treewidth Are Probably Optimal
Article No.: 13, Pages 1–30https://doi.org/10.1145/3170442

We obtain a number of lower bounds on the running time of algorithms solving problems on graphs of bounded treewidth. We prove the results under the Strong Exponential Time Hypothesis of Impagliazzo and Paturi. In particular, assuming that n-variable m-...

research-article
Deterministic Truncation of Linear Matroids
Article No.: 14, Pages 1–20https://doi.org/10.1145/3170444

Let M=(E,I) be a matroid of rank n. A k-truncation of M is a matroid M=(E,I) such that for any AE, A∈ ∈I if and only if |A|≤ k and AI. Given a linear representation, A, of M, we consider the problem of finding a linear representation, Ak, of the ...

research-article
Efficient Computation of Middle Levels Gray Codes
Article No.: 15, Pages 1–29https://doi.org/10.1145/3170443

For any integer n≥ 1, a middle levels Gray code is a cyclic listing of all bitstrings of length 2n+1 that have either n or n+1 entries equal to 1 such that any two consecutive bitstrings in the list differ in exactly one bit. The question whether such a ...

research-article
Approximation Algorithms for Minimum-Load k-Facility Location
Article No.: 16, Pages 1–29https://doi.org/10.1145/3173047

We consider a facility-location problem that abstracts settings where the cost of serving the clients assigned to a facility is incurred by the facility. Formally, we consider the minimum-load k-facility location (MLkFL) problem, which is defined as ...

research-article
Incremental Exact Min-Cut in Polylogarithmic Amortized Update Time
Article No.: 17, Pages 1–21https://doi.org/10.1145/3174803

We present a deterministic incremental algorithm for exactly maintaining the size of a minimum cut with O(log3 n log log2 n) amortized time per edge insertion and O(1) query time. This result partially answers an open question posed by Thorup (2007). It ...

research-article
Randomized Embeddings with Slack and High-Dimensional Approximate Nearest Neighbor
Article No.: 18, Pages 1–21https://doi.org/10.1145/3178540

Approximate nearest neighbor search (ϵ-ANN) in high dimensions has been mainly addressed by Locality Sensitive Hashing (LSH), which has complexity with polynomial dependence in dimension, sublinear query time, but subquadratic space requirement. We ...

research-article
The Alternating Stock Size Problem and the Gasoline Puzzle
Article No.: 19, Pages 1–23https://doi.org/10.1145/3178539

Given a set S of integers whose sum is zero, consider the problem of finding a permutation of these integers such that (i) all prefix sums of the ordering are nonnegative and (ii) the maximum value of a prefix sum is minimized. Kellerer et al. call this ...

research-article
Perfect Phylogenies via Branchings in Acyclic Digraphs and a Generalization of Dilworth’s Theorem
Article No.: 20, Pages 1–26https://doi.org/10.1145/3182178

Motivated by applications in cancer genomics and following the work of Hajirasouliha and Raphael (WABI 2014), Hujdurović et al. (IEEE TCBB, 2018) introduced the minimum conflict-free row split (MCRS) problem: split each row of a given binary matrix into ...

research-article
Distributed Online and Stochastic Queueing on a Multiple Access Channel
Article No.: 21, Pages 1–22https://doi.org/10.1145/3182396

We consider the problems of online and stochastic packet queueing in a distributed system of n nodes with queues, where the communication between the nodes is done via a multiple access channel. In the online setting, in each round, an arbitrary number ...

research-article
Computing 2-Walks in Polynomial Time
Article No.: 22, Pages 1–18https://doi.org/10.1145/3183368

A 2-walk of a graph is a walk visiting every vertex at least once and at most twice. By generalizing decompositions of Tutte and Thomassen, Gao, Richter, and Yu proved that every 3-connected planar graph contains a closed 2-walk such that all vertices ...

research-article
Tight Space Bounds for Two-Dimensional Approximate Range Counting
Article No.: 23, Pages 1–17https://doi.org/10.1145/3205454

We study the problem of two-dimensional orthogonal range counting with additive error. Given a set P of n points drawn from an n× n grid and an error parameter ε, the goal is to build a data structure, such that for any orthogonal range R, it can return ...

research-article
Public Access
Computing the Gromov-Hausdorff Distance for Metric Trees
Article No.: 24, Pages 1–20https://doi.org/10.1145/3185466

The Gromov-Hausdorff (GH) distance is a natural way to measure distance between two metric spaces. We prove that it is NP-hard to approximate the GH distance better than a factor of 3 for geodesic metrics on a pair of trees. We complement this result by ...

research-article
Exact Algorithms for Terrain Guarding
Article No.: 25, Pages 1–20https://doi.org/10.1145/3186897

Given a 1.5-dimensional terrain T, also known as an x-monotone polygonal chain, the Terrain Guarding problem seeks a set of points of minimum size on T that guards all of the points on T. Here, we say that a point p guards a point q if no point of the ...

Subjects

Comments