Non-strict Temporal Exploration

被引:6
|
作者
Erlebach, Thomas [1 ]
Spooner, Jakob T. [1 ]
机构
[1] Univ Leicester, Sch Informat, Leicester, England
关键词
D O I
10.1007/978-3-030-54921-3_8
中图分类号
学科分类号
摘要
A temporal graph G = < G(1),..., G(L) > is a sequence of graphs G(i) subset of G, for some given underlying graph G of order n. We consider the non-strict variant of the Temporal Exploration problem, in which we are asked to decide if G admits a sequence W of consecutively crossed edges e is an element of G, such that W visits all vertices at least once and that each e is an element of W is crossed at a timestep t' is an element of [L] such that t' >= t, where t is the timestep during which the previous edge was crossed. This variant of the problem is shown to be NP-complete. We also consider the hardness of approximating the exploration time for yes-instances in which our order-n input graph satisfies certain assumptions that ensure exploration schedules always exist. The first is that each pair of vertices are contained in the same component at least once in every period of n steps, whilst the second is that the temporal diameter of our input graph is bounded by a constant c. For the latter of these two assumptions we show O(n(1/2) (-) (epsilon))-inapproximability and O(n(1-epsilon))-inapproximability in the c = 2 and c >= 3 cases, respectively. For graphs with temporal diameter c = 2, we also prove an O(root n log n) upper bound on worst-case time required for exploration, as well as an Omega(root n) lower bound.
引用
收藏
页码:129 / 145
页数:17
相关论文
共 50 条
  • [1] Transformation of non-strict structure-data access into scheduled strict access in non-strict dataflow languages
    Inenaga, K
    Kusakabe, S
    Amamiya, M
    [J]. PARALLEL AND DISTRIBUTED COMPUTING FOR SYMBOLIC AND IRREGULAR APPLICATIONS, 2000, : 288 - 310
  • [2] The Non-Strict Projection Lemma
    Meijer, Tomas J.
    Holicki, Tobias
    van den Eijnden, Sebastiaan
    Scherer, Carsten W.
    Heemels, W. P. M. H. Maurice
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (08) : 5584 - 5590
  • [3] Non-strict heterogeneous stacking
    Rooney, Niall
    Patterson, David
    Nugent, Chris
    [J]. PATTERN RECOGNITION LETTERS, 2007, 28 (09) : 1050 - 1061
  • [4] Strict and Non-Strict Security Boundary of Distribution Network
    Xiao, Jun
    Xiao, Jucheng
    Zhang, Liyuan
    Zu, Guoqiang
    Zhang, Baoqiang
    [J]. Diangong Jishu Xuebao/Transactions of China Electrotechnical Society, 2019, 34 (12): : 2637 - 2648
  • [5] Strictly Capturing Non-strict Closures
    Sullivan, Zachary J.
    Downen, Paul
    Ariola, Zena M.
    [J]. PEPM '21: PROCEEDINGS OF THE 2021 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION, 2021, : 74 - 89
  • [6] NON-STRICT LANGUAGES - PROGRAMMING AND IMPLEMENTATION
    WRAY, SC
    FAIRBAIRN, J
    [J]. COMPUTER JOURNAL, 1989, 32 (02): : 142 - 151
  • [7] Exception analysis for non-strict languages
    Glynn, K
    Stuckey, PJ
    Sulzmann, M
    Sondergaard, H
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (09) : 98 - 109
  • [8] Checking equivalence in a non-strict language
    Kolesar, John C.
    Piskac, Ruzica
    Hallahan, William T.
    [J]. Proceedings of the ACM on Programming Languages, 2022, 6 (OOPSLA2):
  • [9] On the availability of non-strict quorum systems
    Aiyer, A
    Alvizi, L
    Bazzi, RA
    [J]. DISTRIBUTED COMPUTING, PROCEEDINGS, 2005, 3724 : 48 - 62
  • [10] Implementing non-strict evaluation on OOVMs
    Perry, N
    [J]. IEE PROCEEDINGS-SOFTWARE, 2005, 152 (06): : 309 - 315