Luciano Gualà’s research while affiliated with University of Rome Tor Vergata and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (71)


Temporal queries for dynamic temporal forests
  • Preprint

September 2024

·

1 Read

·

Luciano Gualà

·

Stefano Leucci

·

[...]

·

Alessandro Straziota

In a temporal forest each edge has an associated set of time labels that specify the time instants in which the edges are available. A temporal path from vertex u to vertex v in the forest is a selection of a label for each edge in the unique path from u to v, assuming it exists, such that the labels selected for any two consecutive edges are non-decreasing. We design linear-size data structures that maintain a temporal forest of rooted trees under addition and deletion of both edge labels and singleton vertices, insertion of root-to-node edges, and removal of edges with no labels. Such data structures can answer temporal reachability, earliest arrival, and latest departure queries. All queries and updates are handled in polylogarithmic worst-case time. Our results can be adapted to deal with latencies. More precisely, all the worst-case time bounds are asymptotically unaffected when latencies are uniform. For arbitrary latencies, the update time becomes amortized in the incremental case where only label additions and edge/singleton insertions are allowed as well as in the decremental case in which only label deletions and edge/singleton removals are allowed. To the best of our knowledge, the only previously known data structure supporting temporal reachability queries is due to Brito, Albertini, Casteigts, and Traven\c{c}olo [Social Network Analysis and Mining, 2021], which can handle general temporal graphs, answers queries in logarithmic time in the worst case, but requires an amortized update time that is quadratic in the number of vertices, up to polylogarithmic factors.


Maintaining k-MinHash Signatures over Fully-Dynamic Data Streams with Recovery

July 2024

We consider the task of performing Jaccard similarity queries over a large collection of items that are dynamically updated according to a streaming input model. An item here is a subset of a large universe U of elements. A well-studied approach to address this important problem in data mining is to design fast-similarity data sketches. In this paper, we focus on global solutions for this problem, i.e., a single data structure which is able to answer both Similarity Estimation and All-Candidate Pairs queries, while also dynamically managing an arbitrary, online sequence of element insertions and deletions received in input. We introduce and provide an in-depth analysis of a dynamic, buffered version of the well-known k-MinHash sketch. This buffered version better manages critical update operations thus significantly reducing the number of times the sketch needs to be rebuilt from scratch using expensive recovery queries. We prove that the buffered k-MinHash uses O(klogU)O(k \log |U|) memory words per subset and that its amortized update time per insertion/deletion is O(klogU)O(k \log |U|) with high probability. Moreover, our data structure can return the k-MinHash signature of any subset in O(k) time, and this signature is exactly the same signature that would be computed from scratch (and thus the quality of the signature is the same as the one guaranteed by the static k-MinHash). Analytical and experimental comparisons with the other, state-of-the-art global solutions for this problem given in [Bury et al.,WSDM'18] show that the buffered k-MinHash turns out to be competitive in a wide and relevant range of the online input parameters.


Graph Spanners for Group Steiner Distances

July 2024

·

1 Read

A spanner is a sparse subgraph of a given graph G which preserves distances, measured w.r.t.\ some distance metric, up to a multiplicative stretch factor. This paper addresses the problem of constructing graph spanners w.r.t.\ the group Steiner metric, which generalizes the recently introduced beer distance metric. In such a metric we are given a collection of groups of required vertices, and we measure the distance between two vertices as the length of the shortest path between them that traverses at least one required vertex from each group. We discuss the relation between group Steiner spanners and classic spanners and we show that they exhibit strong ties with sourcewise spanners w.r.t.\ the shortest path metric. Nevertheless, group Steiner spanners capture several interesting scenarios that are not encompassed by existing spanners. This happens, e.g., for the singleton case, in which each group consists of a single required vertex, thus modeling the setting in which routes need to traverse certain points of interests (in any order). We provide several constructions of group Steiner spanners for both the all-pairs and single-source case, which exhibit various size-stretch trade-offs. Notably, we provide spanners with almost-optimal trade-offs for the singleton case. Moreover, some of our spanners also yield novel trade-offs for classical sourcewise spanners. Finally, we also investigate the query times that can be achieved when our spanners are turned into group Steiner distance oracles with the same size, stretch, and building time.



Finding Diameter-Reducing Shortcuts in Trees

July 2023

·

7 Reads

Lecture Notes in Computer Science

In the k-Diameter-Optimally Augmenting Tree Problem we are given a tree T of n vertices as input. The tree is embedded in an unknown metric space and we have unlimited access to an oracle that, given two distinct vertices u and v of T, can answer queries reporting the cost of the edge (u, v) in constant time. We want to augment T with k shortcuts in order to minimize the diameter of the resulting graph.For k=1, O(nlogn)O(n \log n) time algorithms are known both for paths [Wang, CG 2018] and trees [Bilò, TCS 2022]. In this paper we investigate the case of multiple shortcuts. We show that no algorithm that performs o(n2)o(n^2) queries can provide a better than 10/9-approximate solution for trees for k3k\ge 3. For any constant ε>0\varepsilon > 0, we instead design a linear-time (1+ε)(1+\varepsilon )-approximation algorithm for paths and k=o(logn)k = o(\sqrt{\log n}), thus establishing a dichotomy between paths and trees for k3k\ge 3. We achieve the claimed running time by designing an ad-hoc data structure, which also serves as a key component to provide a linear-time 4-approximation algorithm for trees, and to compute the diameter of graphs with n+k1n \,+\, k\, -\, 1 edges in time O(nklogn)O(n k \log n) even for non-metric graphs. Our data structure and the latter result are of independent interest.KeywordsTree diameter augmentationFast diameter computationApproximation algorithmsTime-efficient algorithms


Fig. 1: The graph G of the lower bound construction. The edges of the tree T are solid and have cost 2; the non-tree edges are dashed and their colors reflect the different types of augmenting edges as defined in the proof of Lemma 1. To reduce clutter, only some of the augmenting edges are shown.
Fig. 6: Left: The tree T in which terminal vertices v are depicted as white circles labelled with their value α v , while Steiner vertex are black squares. The paths P of T corresponding to edges in T (M ) are shaded. Right: the forest obtained after cutting the edges (x i−1 , x i ) of each path P from T . Each tree contains exactly one vertex u in T (M ). Each vertex u in T (M ) is labelled with β u .
Finding Diameter-Reducing Shortcuts in Trees
  • Preprint
  • File available

May 2023

·

75 Reads

In the \emph{k-Diameter-Optimally Augmenting Tree Problem} we are given a tree T of n vertices as input. The tree is embedded in an unknown \emph{metric} space and we have unlimited access to an oracle that, given two distinct vertices u and v of T, can answer queries reporting the cost of the edge (u,v) in constant time. We want to augment T with k shortcuts in order to minimize the diameter of the resulting graph. For k=1, O(nlogn)O(n \log n) time algorithms are known both for paths [Wang, CG 2018] and trees [Bil\`o, TCS 2022]. In this paper we investigate the case of multiple shortcuts. We show that no algorithm that performs o(n2)o(n^2) queries can provide a better than 10/9-approximate solution for trees for k3k\geq 3. For any constant ε>0\varepsilon > 0, we instead design a linear-time (1+ε)(1+\varepsilon)-approximation algorithm for paths and k=o(logn)k = o(\sqrt{\log n}), thus establishing a dichotomy between paths and trees for k3k\geq 3. We achieve the claimed running time by designing an ad-hoc data structure, which also serves as a key component to provide a linear-time 4-approximation algorithm for trees, and to compute the diameter of graphs with n+k1n + k - 1 edges in time O(nklogn)O(n k \log n) even for non-metric graphs. Our data structure and the latter result are of independent interest.

Download

Blackout-Tolerant Temporal Spanners

December 2022

·

6 Reads

·

4 Citations

Lecture Notes in Computer Science

In this paper we introduce the notions of blackout-tolerant temporal α\alpha -spanner of a temporal graph G which is a subgraph of G that preserves the distances between pairs of vertices of interest in G up to a multiplicative factor of α\alpha , even when the graph edges at a single time-instant become unavailable. In particular, we consider the single-source, single-pair, and all-pairs cases and, for each case we look at three quality requirements: exact distances (i.e., α=1\alpha =1), almost-exact distances (i.e., α=1+ε\alpha = 1+\varepsilon for an arbitrarily small constant ε>0\varepsilon >0), and connectivity (i.e., unbounded α\alpha ). For each combination we provide tight bounds, up to polylogarithmic factors, on the size, which is measured as the number of edges, of the corresponding blackout-tolerant α\alpha -spanner for both general temporal graphs and for temporal cliques. Our result show that such spanners are either very sparse (i.e., they have O~(n)\widetilde{O}(n) edges) or they must have size Ω(n2)\varOmega (n^2) in the worst case, where n is the number of vertices of G. To complete the picture, we also investigate the case of multiple blackouts.KeywordsTemporal graphsTemporal spannersFault-tolerance


Resilient Level Ancestor, Bottleneck, and Lowest Common Ancestor Queries in Dynamic Trees

October 2022

·

21 Reads

Algorithmica

We study the problem of designing a resilient data structure maintaining a tree under the Faulty-RAM model [Finocchi and Italiano, STOC’04] in which up to δ\delta δ memory words can be corrupted by an adversary. Our data structure stores a rooted dynamic tree that can be updated via the addition of new leaves, requires linear size, and supports resilient (weighted) level ancestor queries, lowest common ancestor queries, and bottleneck vertex queries in O(δ)O(\delta ) O ( δ ) worst-case time per operation.


New approximation algorithms for the heterogeneous weighted delivery problem

August 2022

·

5 Reads

Theoretical Computer Science

We study the heterogeneous weighted delivery (HWD) problem introduced in [Bärtschi et al., STACS'17] where k heterogeneous mobile agents (e.g., robots, vehicles, etc.), initially positioned on vertices of an n-vertex edge-weighted graph G, have to deliver m messages. Each message is initially placed on a source vertex of G and needs to be delivered to a target vertex of G. Each agent can move along the edges of G and carry at most one message at any time. Each agent has a rate of energy consumption per unit of traveled distance and the goal is that of delivering all messages using the minimum overall amount of energy. This problem has been shown to be NP-hard even when k=1, and is 4ρ-approximable where ρ is the ratio between the maximum and minimum energy consumption of the agents. In this paper, we provide approximation algorithms with approximation ratios independent of the energy consumption rates. First, we design a polynomial-time 8-approximation algorithm for k=O(log⁡n), closing a problem left open in [Bärtschi et al., ATMOS'17]. This algorithm can be turned into an O(k)-approximation algorithm that always runs in polynomial-time, regardless of the values of k. Then, we show that HWD problem is 36-approximable in polynomial-time when each agent has one of two possible consumption rates. Finally, we design a polynomial-time O˜(log3⁡n)-approximation algorithm for the general case.


Figure 4: The set of edges selected for each vertex during the initialization phase.
Figure 6: Temporal clique G, for which any temporal 2-spanner has size Ω(n 2 ). All edges between vertices in A have time-label 3. All edges between vertices in B have time-label 1. All edges from vertices in A to vertices in B have time-label 2.
Figure 8: Example of the lower bound with h = 2 and β = 0. Each vertex v is labeled with l(v). Path π 1 starts at s and consists in all the black edges. The generic j-th vertex of π 1 is shown in blue if j is even and in red if j is odd. Path π 2 begins with an initial hop (the dashed green edge) from s to the vertex v with label 11 (i.e.m the 7-th vertex in π 1 ). Then π 2 consists of an alternating sequence of backward hops (shown in red) and forward hops (shown in blue). The arrows on the edges of π 2 are directed away from s along π 2 . For each traversed edge (u, v) of π 1 , σ(u, v) is either 5 or −3, while for each traversed edge (u, v) of π 2 , σ(u, v) is either −7 or 9.
Sparse Temporal Spanners with Low Stretch

June 2022

·

44 Reads

A temporal graph is an undirected graph G=(V,E) along with a function that assigns a time-label to each edge in E. A path in G with non-decreasing time-labels is called temporal path and the distance from u to v is the minimum length (i.e., the number of edges) of a temporal path from u to v. A temporal α\alpha-spanner of G is a (temporal) subgraph H that preserves the distances between any pair of vertices in V, up to a multiplicative stretch factor of α\alpha. The size of H is the number of its edges. In this work we study the size-stretch trade-offs of temporal spanners. We show that temporal cliques always admit a temporal (2k1)(2k-1)-spanner with O~(kn1+1k)\tilde{O}(kn^{1+\frac{1}{k}}) edges, where k>1k>1 is an integer parameter of choice. Choosing k=lognk=\lfloor\log n\rfloor, we obtain a temporal O(logn)O(\log n)-spanner with O~(n)\tilde{O}(n) edges that has almost the same size (up to logarithmic factors) as the temporal spanner in [Casteigts et al., JCSS 2021] which only preserves temporal connectivity. We then consider general temporal graphs. Since Ω(n2)\Omega(n^2) edges might be needed by any connectivity-preserving temporal subgraph [Axiotis et al., ICALP'16], we focus on approximating distances from a single source. We show that O~(n/log(1+ε))\tilde{O}(n/\log(1+\varepsilon)) edges suffice to obtain a stretch of (1+ε)(1+\varepsilon), for any small ε>0\varepsilon>0. This result is essentially tight since there are temporal graphs for which any temporal subgraph preserving exact distances from a single-source must use Ω(n2)\Omega(n^2) edges. We extend our analysis to prove an upper bound of O~(n2/β)\tilde{O}(n^2/\beta) on the size of any temporal β\beta-additive spanner, which is tight up to polylogarithmic factors. Finally, we investigate how the lifetime of G, i.e., the number of its distinct time-labels, affects the trade-off between the size and the stretch of a temporal spanner.


Citations (43)


... Reachability and connectivity problems on temporal graphs have drawn significant interest in recent years. These have been studied in the context of net-work design [3,8,14] and transport logistics [24] (where maximizing connectivity and reachability at minimum cost is desired), and the study of epidemics [11,18,19,38] and malware spread [36](where it is not). ...

Reference:

Temporal Reachability Dominating Sets: contagion in temporal graphs
Blackout-Tolerant Temporal Spanners
  • Citing Chapter
  • December 2022

Lecture Notes in Computer Science

... The parameter f that describes the degree of robustness against errors is known as the sensitivity of the oracle. A lot of work has been done in designing fault-tolerant structures for various problems like connectivity [20,32,33], finding shortest paths [2,12,36], and distance sensitivity oracles [5,7,14,24,30,31,34,47]. While the fault-tolerant model has been studied a lot for distances, the landscape of fault-tolerant diameter oracles is far less explored. ...

Multiple-Edge-Fault-Tolerant Approximate Shortest-Path Trees

Algorithmica

... In [12] it is shown that deciding whether the agents can deliver the data is (weakly) NP-complete. Additional research under various conditions and topological assumptions can be found in [4] which studies the game-theoretic task of selecting mobile agents to deliver multiple items on a network and optimizing or approximating the total energy consumption over all selected agents, in [2,5,7] which study data delivery and combine energy and time efficiency, and in [18,19] which are concerned with collaborative exploration in various topologies. ...

New Approximation Algorithms for the Heterogeneous Weighted Delivery Problem
  • Citing Chapter
  • June 2021

Lecture Notes in Computer Science

... Notable examples include load balancing in computational grids [2] and traffic routing in networks [3][4][5][6][7][8]. Additionally, this approach has been applied for modeling traffic flows and route choices in transport networks [9][10][11]; it has also been used to support decision-making for subcontracting production orders [12] among other applications. ...

Network Creation Games with Traceroute-Based Strategies

Algorithms

... There has been a lot of heuristic based work on the problem of tracking moving objects in a network [30,36,39]. Parameterized complexity of Tracking Shortest Paths and Tracking Paths was studied in [4,5,8,12,13,17]. Feedback Vertex Set is known to admit a 2-approximation algorithm which is tight under UGC [3,14]. ...

Tracking routes in communication networks
  • Citing Article
  • July 2020

Theoretical Computer Science

... Instead, for directed graphs computing a Nash equilibria is NP-Complete [5]. The existence of strong Nash equilibria in graph k-coloring games, i.e., Nash equilibria resilient to deviations by group of players, has been addressed in [11,18,19]. Feldman et al. [15] provide a nice study on the strong price of anarchy [2] of graph k-coloring games. ...

Coalition Resilient Outcomes in Max k-Cut Games: 45th International Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 27-30, 2019, Proceedings
  • Citing Chapter
  • January 2019

Lecture Notes in Computer Science

... Concerning the SPT, the most prominent swap criteria are those aiming to minimize either the maximum or the average distance from the root, and the corresponding ABSE problems can be addressed in O(m log α(m, n)) time [6] and O(m α(n, n) log 2 n) time [21], respectively. Recently, in [4], the authors proposed two new criteria for swapping in a SPT, which are in a sense related with this paper, namely the minimization of the maximum and the aver-age stretch factor from the root, for which they proposed an efficient O(mn +n 2 log n) and O(mn log α(m, n)) time solution, respectively. ...

Effective Edge-Fault-Tolerant Single-Source Spanners via Best (or Good) Swap Edges
  • Citing Chapter
  • June 2017

Lecture Notes in Computer Science

... But the cost in those games depends on whether the player's eccentricity is smaller or equal than the given bounded distance, so, it is considered differently than in celebrity games. For further variants we refer the interested reader to [43][44][45][46][47][48][49][50][51][52] among others. ...

The max-distance network creation game on general host graphs
  • Citing Article
  • March 2015

Theoretical Computer Science

... A three-level fat tree is an extension of the previous structure where each level contains groups of bipartite graphs. Further enhancements and modifications have been suggested to create redundant links and switches to generate a high variety of paths [22]. Among others, the orthogonal fat tree includes redundant paths at the expense of reducing the scalability [23]. ...

Fault-Tolerant Approximate Shortest-Path Trees

Algorithmica