The problem of enumerating connected subgraphs of a given size in a graph has been extensively studied in recent years. In this short communication, we propose an algorithm with a delay of O(κΔ) for enumerating all ...
详细信息
We consider the problem of fairly dividing indivisible goods among agents with additive valuations. It is known that an Epistemic EFX and 2/3-MMS allocation can be obtained using the Envy-Cycle-Elimination (ECE) algor...
详细信息
Pole-swapping algorithms, generalizations of bulge-chasing algorithms, have been shown to be a viable alternative to the bulge-chasing QZ algorithm for solving the generalized eigenvalue problem for a matrix pencil A...
详细信息
This article introduces a new symbolic regression algorithm based on the SPINEX (Similarity-based Predictions with Explainable Neighbors Exploration) family. This new algorithm (SPINEX_SymbolicRegression) adopts a sim...
详细信息
We study a geometric facility location problem under imprecision. Given n unit intervals in the real line, each with one of k colors, the goal is to place one point in each interval such that the resulting minimum col...
详细信息
Finding a minimum-weight strongly connected spanning subgraph of an edge-weighted directed graph is equivalent to the weighted version of the well-known strong connectivity augmentation problem. This problem is NP-har...
详细信息
A tournament is an orientation of a complete graph. A vertex that can reach every other vertex within two steps is called a king. We study the complexity of finding k kings in a tournament graph. We show that the rand...
详细信息
We study Dominating Set and Independent Set for dynamic graphs in the vertex-arrival model. We say that a dynamic algorithm for one of these problems is k-stable when it makes at most k changes to its output independe...
详细信息
We give a parallel O(log(n))-time algorithm on a CRCW PRAM to assign vertical and horizontal segments to the vertices of any planar bipartite graph G in the following manner: i) Two segments cannot share an interior p...
详细信息
In this paper, we discuss the asymptotic behavior of the Upper Confidence Bound (UCB) algorithm in the context of multiarmed bandit problems and discuss its implication in downstream inferential tasks. While inferenti...
详细信息
暂无评论