Are problems having a polynomial time upper bound actually thought to be feasible?

Author(s):  
Akeo ADACHI ◽  
Takumi KASAI
Keyword(s):  
2011 ◽  
Vol 22 (02) ◽  
pp. 473-490 ◽  
Author(s):  
VESA HALAVA ◽  
ŠTĚPÁN HOLUB

An instance of the (Generalized) Post Correspondence Problem is during the decision process typically reduced to one or more other instances, called its successors. In this paper we study the reduction tree of GPCP in the binary case. This entails in particular a detailed analysis of the structure of end blocks. We give an upper bound for the number of end blocks, and show that even if an instance has more than one successor, it can nevertheless be reduced to a single instance. This, in particular, implies that binary GPCP can be decided in polynomial time.


2020 ◽  
Author(s):  
Linda K. Sundermann ◽  
Jeff Wintersinger ◽  
Gunnar Rätsch ◽  
Jens Stoye ◽  
Quaid Morris

AbstractTumors contain multiple subpopulations of genetically distinct cancer cells. Reconstructing their evolutionary history can improve our understanding of how cancers develop and respond to treatment. Subclonal reconstruction methods cluster mutations into groups that co-occur within the same subpopulations, estimate the frequency of cells belonging to each subpopulation, and infer the ancestral relationships among the subpopulations by constructing a clone tree. However, often multiple clone trees are consistent with the data and current methods do not efficiently capture this uncertainty; nor can these methods scale to clone trees with a large number of subclonal populations.Here, we formalize the notion of a partial clone tree that defines a subset of the pairwise ancestral relationships in a clone tree, thereby implicitly representing the set of all clone trees that have these defined pairwise relationships. Also, we introduce a special partial clone tree, the Maximally-Constrained Ancestral Reconstruction (MAR), which summarizes all clone trees fitting the input data equally well. Finally, we extend commonly used clone tree validity conditions to apply to partial clone trees and describe SubMARine, a polynomial-time algorithm producing the subMAR, which approximates the MAR and guarantees that its defined relationships are a subset of those present in the MAR. We also extend SubMARine to work with subclonal copy number aberrations and define equivalence constraints for this purpose. In contrast with other clone tree reconstruction methods, SubMARine runs in time and space that scales polynomially in the number of subclones.We show through extensive simulation and a large lung cancer dataset that the subMAR equals the MAR in > 99.9% of cases where only a single clone tree exists and that it is a perfect match to the MAR in most of the other cases. Notably, SubMARine runs in less than 70 seconds on a single thread with less than one Gb of memory on all datasets presented in this paper, including ones with 50 nodes in a clone tree.The freely-available open-source code implementing SubMARine can be downloaded at https://github.com/morrislab/submarine.Author summaryCancer cells accumulate mutations over time and consist of genetically distinct subpopulations. Their evolutionary history (as represented by tumor phylogenies) can be inferred from bulk cancer genome sequencing data. Current tumor phylogeny reconstruction methods have two main issues: they are slow, and they do not efficiently represent uncertainty in the reconstruction.To address these issues, we developed SubMARine, a fast algorithm that summarizes all valid phylogenies in an intuitive format. SubMARine solved all reconstruction problems in this manuscript in less than 70 seconds, orders of magnitude faster than other methods. These reconstruction problems included those with up to 50 subclones; problems that are too large for other algorithms to even attempt. SubMARine achieves these result because, unlike other algorithms, it performs its reconstruction by identifying an upper-bound on the solution set of trees. In the vast majority of cases, this upper bound is tight: when only a single solution exists, SubMARine converges to it > 99.9% of the time; when multiple solutions exist, our algorithm correctly recovers the uncertain relationships in more than 80% of cases.In addition to solving these two major challenges, we introduce some useful new concepts for and open research problems in the field of tumor phylogeny reconstruction. Specifically, we formalize the concept of a partial clone tree which provides a set of constraints on the solution set of clone trees; and provide a complete set of conditions under which a partial clone tree is valid. These conditions guarantee that all trees in the solution set satisfy the constraints implied by the partial clone tree.


2015 ◽  
Vol 58 (2) ◽  
pp. 306-316 ◽  
Author(s):  
Kaveh Khoshkhah ◽  
Manouchehr Zaker

AbstractLet G be a graph and let τ be an assignment of nonnegative integer thresholds to the vertices of G. A subset of vertices, D, is said to be a τ-dynamicmonopoly if V(G) can be partitioned into subsets D0 , D1, …, Dk such that D0 = D and for any i ∊ {0, . . . , k−1}, each vertex v in Di+1 has at least τ(v) neighbors in D0∪··· ∪Di. Denote the size of smallest τ-dynamicmonopoly by dynτ(G) and the average of thresholds in τ by τ. We show that the values of dynτ(G) over all assignments τ with the same average threshold is a continuous set of integers. For any positive number t, denote the maximum dynτ(G) taken over all threshold assignments τ with τ ≤ t, by Ldynt(G). In fact, Ldynt(G) shows the worst-case value of a dynamicmonopoly when the average threshold is a given number t. We investigate under what conditions on t, there exists an upper bound for Ldynt(G) of the form c|G|, where c < 1. Next, we show that Ldynt(G) is coNP-hard for planar graphs but has polynomial-time solution for forests.


Author(s):  
Stefan Lendl ◽  
Britta Peis ◽  
Veerle Timmermans

AbstractGiven two matroids $$\mathcal {M}_{1} = (E, \mathcal {B}_{1})$$ M 1 = ( E , B 1 ) and $$\mathcal {M}_{2} = (E, \mathcal {B}_{2})$$ M 2 = ( E , B 2 ) on a common ground set E with base sets $$\mathcal {B}_1$$ B 1 and $$\mathcal {B}_2$$ B 2 , some integer $$k \in \mathbb {N}$$ k ∈ N , and two cost functions $$c_{1}, c_{2} :E \rightarrow \mathbb {R}$$ c 1 , c 2 : E → R , we consider the optimization problem to find a basis $$X \in \mathcal {B}_{1}$$ X ∈ B 1 and a basis $$Y \in \mathcal {B}_{2}$$ Y ∈ B 2 minimizing the cost $$\sum _{e\in X} c_1(e)+\sum _{e\in Y} c_2(e)$$ ∑ e ∈ X c 1 ( e ) + ∑ e ∈ Y c 2 ( e ) subject to either a lower bound constraint $$|X \cap Y| \le k$$ | X ∩ Y | ≤ k , an upper bound constraint $$|X \cap Y| \ge k$$ | X ∩ Y | ≥ k , or an equality constraint $$|X \cap Y| = k$$ | X ∩ Y | = k on the size of the intersection of the two bases X and Y. The problem with lower bound constraint turns out to be a generalization of the Recoverable Robust Matroid problem under interval uncertainty representation for which the question for a strongly polynomial-time algorithm was left as an open question in Hradovich et al. (J Comb Optim 34(2):554–573, 2017). We show that the two problems with lower and upper bound constraints on the size of the intersection can be reduced to weighted matroid intersection, and thus be solved with a strongly polynomial-time primal-dual algorithm. We also present a strongly polynomial, primal-dual algorithm that computes a minimum cost solution for every feasible size of the intersection k in one run with asymptotic running time equal to one run of Frank’s matroid intersection algorithm. Additionally, we discuss generalizations of the problems from matroids to polymatroids, and from two to three or more matroids. We obtain a strongly polynomial time algorithm for the recoverable robust polymatroid base problem with interval uncertainties.


2014 ◽  
Vol 31 (06) ◽  
pp. 1450043 ◽  
Author(s):  
Shi-Sheng Li ◽  
Ren-Xia Chen

We consider the scheduling problem in which two agents, each with a set of jobs, compete to perform their respective jobs on a single machine under a group technology (GT) environment. The jobs of agents are classified into groups according to their production similarities in advance, all jobs of the same group are required to be processed contiguously on the machine. A sequence-independent setup time precedes the processing of each group. We propose a polynomial time solution for the problem of minimizing the maximum regular cost of one agent, subject to an upper bound on the maximum regular cost of the second agent. We also show that the problem of minimizing the total completion time of the first agent, subject to an upper bound on the maximum lateness of the second agent is strongly [Formula: see text]-hard. The case where all groups of the first agent have the same number of jobs is shown to be polynomially solvable.


2014 ◽  
Vol 25 (04) ◽  
pp. 373-389 ◽  
Author(s):  
EDWIN BEGGS ◽  
JOSÉ FÉLIX COSTA ◽  
DIOGO POÇAS ◽  
JOHN V. TUCKER

We argue that dynamical systems involving discrete and continuous data can be modelled by Turing machines with oracles that are physical processes. Using the theory introduced in Beggs et al. [2,3], we consider the scope and limits of polynomial time computations by such systems. We propose a general polynomial time Church-Turing Thesis for feasible computations by analogue-digital systems, having the non-uniform complexity class BPP//log* as theoretical upper bound. We show why BPP//log* should be replace P/poly, which was proposed by Siegelmann for neural nets [23,24]. Then we examine whether other sources of hypercomputation can be found in analogue-digital systems besides the oracle itself. We prove that the higher polytime limit P/poly can be attained via non-computable analogue-digital interface protocols.


2020 ◽  
Vol 54 (4) ◽  
pp. 1027-1040
Author(s):  
Doost Ali Mojdeh ◽  
Babak Samadi ◽  
Ismael G. Yero

In this paper we define the global defensive k-alliance (number) in a digraph D, and give several bounds on this parameter with characterizations of all digraphs attaining the bounds. In particular, for the case k = −1, we give a lower (an upper) bound on this parameter for directed trees (rooted trees). Moreover, the characterization of all directed trees (rooted trees) for which the equality holds is given. Finally, we show that the problem of finding the global defensive k-alliance number of a digraph is NP-hard for any suitable non-negative value of k, and in contrast with it, we also show that finding a minimum global defensive (−1)-alliance for any rooted tree is polynomial-time solvable.


2011 ◽  
Vol 2 (2) ◽  
Author(s):  
Martin M. Merener

We review the attack given by Dinur and Nissim [6] on the output perturbation sanitizer, and generalize it to a setting that includes, as particular cases, databases with values in {0,1}---with the metric considered in [6]---and databases with real values, with other appropriate metrics (hence the binary case is not included in the real case). Previous works [12, 14] on the binary case gave results more efficient than ours. Those results could be used to extend the binary case to the real-valued case, hence implying our results. The contributions of this paper are: to make the implication explicit, and to give an alternative general proof. We state a property about the function dist that measures the error of the attacker's approximation of the database, which is satisfied in our cases of interest, and is sufficiently strong to prove the impossibility results regarding the privacy provided by the output-perturbation sanitizer, in both the real and binary cases. In this general context we establish an inequality (an upper bound to the probability of adversary's failure) that relates all the parameters of the problem---the size of the database, the relative error of the adversary, the number of queries made by the adversary (which determines its time complexity), its probability of failure, and the perturbation of the sanitizer---making explicit the trade-offs among them. From this inequality we deduce that for binary and real valued databases, the adversary described in [6] can defeat perturbation o(n1/2) with time complexity determined by o(n log n) number of queries (instead of O(n log2 n) as in [6]).


Sign in / Sign up

Export Citation Format

Share Document