Stefano Leucci’s research while affiliated with University of L'Aquila and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (65)


Temporal queries for dynamic temporal forests
  • Preprint

September 2024

·

1 Read

·

Luciano Gualà

·

Stefano Leucci

·

[...]

·

Alessandro Straziota

In a temporal forest each edge has an associated set of time labels that specify the time instants in which the edges are available. A temporal path from vertex u to vertex v in the forest is a selection of a label for each edge in the unique path from u to v, assuming it exists, such that the labels selected for any two consecutive edges are non-decreasing. We design linear-size data structures that maintain a temporal forest of rooted trees under addition and deletion of both edge labels and singleton vertices, insertion of root-to-node edges, and removal of edges with no labels. Such data structures can answer temporal reachability, earliest arrival, and latest departure queries. All queries and updates are handled in polylogarithmic worst-case time. Our results can be adapted to deal with latencies. More precisely, all the worst-case time bounds are asymptotically unaffected when latencies are uniform. For arbitrary latencies, the update time becomes amortized in the incremental case where only label additions and edge/singleton insertions are allowed as well as in the decremental case in which only label deletions and edge/singleton removals are allowed. To the best of our knowledge, the only previously known data structure supporting temporal reachability queries is due to Brito, Albertini, Casteigts, and Traven\c{c}olo [Social Network Analysis and Mining, 2021], which can handle general temporal graphs, answers queries in logarithmic time in the worst case, but requires an amortized update time that is quadratic in the number of vertices, up to polylogarithmic factors.


Graph Spanners for Group Steiner Distances

July 2024

·

1 Read

A spanner is a sparse subgraph of a given graph G which preserves distances, measured w.r.t.\ some distance metric, up to a multiplicative stretch factor. This paper addresses the problem of constructing graph spanners w.r.t.\ the group Steiner metric, which generalizes the recently introduced beer distance metric. In such a metric we are given a collection of groups of required vertices, and we measure the distance between two vertices as the length of the shortest path between them that traverses at least one required vertex from each group. We discuss the relation between group Steiner spanners and classic spanners and we show that they exhibit strong ties with sourcewise spanners w.r.t.\ the shortest path metric. Nevertheless, group Steiner spanners capture several interesting scenarios that are not encompassed by existing spanners. This happens, e.g., for the singleton case, in which each group consists of a single required vertex, thus modeling the setting in which routes need to traverse certain points of interests (in any order). We provide several constructions of group Steiner spanners for both the all-pairs and single-source case, which exhibit various size-stretch trade-offs. Notably, we provide spanners with almost-optimal trade-offs for the singleton case. Moreover, some of our spanners also yield novel trade-offs for classical sourcewise spanners. Finally, we also investigate the query times that can be achieved when our spanners are turned into group Steiner distance oracles with the same size, stretch, and building time.


On the approximability of graph visibility problems

June 2024

·

19 Reads

Visibility problems have been investigated for a long time under different assumptions as they pose challenging combinatorial problems and are connected to robot navigation problems. The mutual-visibility problem in a graph G of n vertices asks to find the largest set of vertices XV(G)X\subseteq V(G), also called μ\mu-set, such that for any two vertices u,vXu,v\in X, there is a shortest u,v-path P where all internal vertices of P are not in X. This means that u and v are visible w.r.t. X. Variations of this problem are known as total, outer, and dual mutual-visibility problems, depending on the visibility property of vertices inside and/or outside X. The mutual-visibility problem and all its variations are known to be NP\mathsf{NP}-complete on graphs of diameter 4. In this paper, we design a polynomial-time algorithm that finds a μ\mu-set with size Ω(n/D)\Omega\left( \sqrt{n/ \overline{D}} \right), where D\overline D is the average distance between any two vertices of G. Moreover, we show inapproximability results for all visibility problems on graphs of diameter 2 and strengthen the inapproximability ratios for graphs of diameter 3 or larger. More precisely, for graphs of diameter at least 3 and for every constant ε>0\varepsilon > 0, we show that mutual-visibility and dual mutual-visibility problems are not approximable within a factor of n1/3εn^{1/3-\varepsilon}, while outer and total mutual-visibility problems are not approximable within a factor of n1/2εn^{1/2 - \varepsilon}, unless P=NP\mathsf{P}=\mathsf{NP}. Furthermore we study the relationship between the mutual-visibility number and the general position number in which no three distinct vertices u,v,w of X belong to any shortest path of G.


On the Inapproximability of Finding Minimum Monitoring Edge-Geodetic Sets

May 2024

·

4 Reads

Given an undirected connected graph G=(V(G),E(G))G = (V(G), E(G)) on n vertices, the minimum Monitoring Edge-Geodetic Set (MEG-set) problem asks to find a subset MV(G)M \subseteq V(G) of minimum cardinality such that, for every edge eE(G)e \in E(G), there exist x,yMx,y \in M for which all shortest paths between x and y in G traverse e. We show that, for any constant c<12c < \frac{1}{2}, no polynomial-time (clogn)(c \log n)-approximation algorithm for the minimum MEG-set problem exists, unless P=NP\mathsf{P} = \mathsf{NP}.



Finding Diameter-Reducing Shortcuts in Trees

July 2023

·

7 Reads

Lecture Notes in Computer Science

In the k-Diameter-Optimally Augmenting Tree Problem we are given a tree T of n vertices as input. The tree is embedded in an unknown metric space and we have unlimited access to an oracle that, given two distinct vertices u and v of T, can answer queries reporting the cost of the edge (u, v) in constant time. We want to augment T with k shortcuts in order to minimize the diameter of the resulting graph.For k=1, O(nlogn)O(n \log n) time algorithms are known both for paths [Wang, CG 2018] and trees [Bilò, TCS 2022]. In this paper we investigate the case of multiple shortcuts. We show that no algorithm that performs o(n2)o(n^2) queries can provide a better than 10/9-approximate solution for trees for k3k\ge 3. For any constant ε>0\varepsilon > 0, we instead design a linear-time (1+ε)(1+\varepsilon )-approximation algorithm for paths and k=o(logn)k = o(\sqrt{\log n}), thus establishing a dichotomy between paths and trees for k3k\ge 3. We achieve the claimed running time by designing an ad-hoc data structure, which also serves as a key component to provide a linear-time 4-approximation algorithm for trees, and to compute the diameter of graphs with n+k1n \,+\, k\, -\, 1 edges in time O(nklogn)O(n k \log n) even for non-metric graphs. Our data structure and the latter result are of independent interest.KeywordsTree diameter augmentationFast diameter computationApproximation algorithmsTime-efficient algorithms


Fig. 1: The graph G of the lower bound construction. The edges of the tree T are solid and have cost 2; the non-tree edges are dashed and their colors reflect the different types of augmenting edges as defined in the proof of Lemma 1. To reduce clutter, only some of the augmenting edges are shown.
Fig. 6: Left: The tree T in which terminal vertices v are depicted as white circles labelled with their value α v , while Steiner vertex are black squares. The paths P of T corresponding to edges in T (M ) are shaded. Right: the forest obtained after cutting the edges (x i−1 , x i ) of each path P from T . Each tree contains exactly one vertex u in T (M ). Each vertex u in T (M ) is labelled with β u .
Finding Diameter-Reducing Shortcuts in Trees
  • Preprint
  • File available

May 2023

·

76 Reads

In the \emph{k-Diameter-Optimally Augmenting Tree Problem} we are given a tree T of n vertices as input. The tree is embedded in an unknown \emph{metric} space and we have unlimited access to an oracle that, given two distinct vertices u and v of T, can answer queries reporting the cost of the edge (u,v) in constant time. We want to augment T with k shortcuts in order to minimize the diameter of the resulting graph. For k=1, O(nlogn)O(n \log n) time algorithms are known both for paths [Wang, CG 2018] and trees [Bil\`o, TCS 2022]. In this paper we investigate the case of multiple shortcuts. We show that no algorithm that performs o(n2)o(n^2) queries can provide a better than 10/9-approximate solution for trees for k3k\geq 3. For any constant ε>0\varepsilon > 0, we instead design a linear-time (1+ε)(1+\varepsilon)-approximation algorithm for paths and k=o(logn)k = o(\sqrt{\log n}), thus establishing a dichotomy between paths and trees for k3k\geq 3. We achieve the claimed running time by designing an ad-hoc data structure, which also serves as a key component to provide a linear-time 4-approximation algorithm for trees, and to compute the diameter of graphs with n+k1n + k - 1 edges in time O(nklogn)O(n k \log n) even for non-metric graphs. Our data structure and the latter result are of independent interest.

Download

Blackout-Tolerant Temporal Spanners

December 2022

·

6 Reads

·

4 Citations

Lecture Notes in Computer Science

In this paper we introduce the notions of blackout-tolerant temporal α\alpha -spanner of a temporal graph G which is a subgraph of G that preserves the distances between pairs of vertices of interest in G up to a multiplicative factor of α\alpha , even when the graph edges at a single time-instant become unavailable. In particular, we consider the single-source, single-pair, and all-pairs cases and, for each case we look at three quality requirements: exact distances (i.e., α=1\alpha =1), almost-exact distances (i.e., α=1+ε\alpha = 1+\varepsilon for an arbitrarily small constant ε>0\varepsilon >0), and connectivity (i.e., unbounded α\alpha ). For each combination we provide tight bounds, up to polylogarithmic factors, on the size, which is measured as the number of edges, of the corresponding blackout-tolerant α\alpha -spanner for both general temporal graphs and for temporal cliques. Our result show that such spanners are either very sparse (i.e., they have O~(n)\widetilde{O}(n) edges) or they must have size Ω(n2)\varOmega (n^2) in the worst case, where n is the number of vertices of G. To complete the picture, we also investigate the case of multiple blackouts.KeywordsTemporal graphsTemporal spannersFault-tolerance


Resilient Level Ancestor, Bottleneck, and Lowest Common Ancestor Queries in Dynamic Trees

October 2022

·

21 Reads

Algorithmica

We study the problem of designing a resilient data structure maintaining a tree under the Faulty-RAM model [Finocchi and Italiano, STOC’04] in which up to δ\delta δ memory words can be corrupted by an adversary. Our data structure stores a rooted dynamic tree that can be updated via the addition of new leaves, requires linear size, and supports resilient (weighted) level ancestor queries, lowest common ancestor queries, and bottleneck vertex queries in O(δ)O(\delta ) O ( δ ) worst-case time per operation.


New approximation algorithms for the heterogeneous weighted delivery problem

August 2022

·

5 Reads

Theoretical Computer Science

We study the heterogeneous weighted delivery (HWD) problem introduced in [Bärtschi et al., STACS'17] where k heterogeneous mobile agents (e.g., robots, vehicles, etc.), initially positioned on vertices of an n-vertex edge-weighted graph G, have to deliver m messages. Each message is initially placed on a source vertex of G and needs to be delivered to a target vertex of G. Each agent can move along the edges of G and carry at most one message at any time. Each agent has a rate of energy consumption per unit of traveled distance and the goal is that of delivering all messages using the minimum overall amount of energy. This problem has been shown to be NP-hard even when k=1, and is 4ρ-approximable where ρ is the ratio between the maximum and minimum energy consumption of the agents. In this paper, we provide approximation algorithms with approximation ratios independent of the energy consumption rates. First, we design a polynomial-time 8-approximation algorithm for k=O(log⁡n), closing a problem left open in [Bärtschi et al., ATMOS'17]. This algorithm can be turned into an O(k)-approximation algorithm that always runs in polynomial-time, regardless of the values of k. Then, we show that HWD problem is 36-approximable in polynomial-time when each agent has one of two possible consumption rates. Finally, we design a polynomial-time O˜(log3⁡n)-approximation algorithm for the general case.


Citations (39)


... Reachability and connectivity problems on temporal graphs have drawn significant interest in recent years. These have been studied in the context of net-work design [3,8,14] and transport logistics [24] (where maximizing connectivity and reachability at minimum cost is desired), and the study of epidemics [11,18,19,38] and malware spread [36](where it is not). ...

Reference:

Temporal Reachability Dominating Sets: contagion in temporal graphs
Blackout-Tolerant Temporal Spanners
  • Citing Chapter
  • December 2022

Lecture Notes in Computer Science

... A line of work on non-persistent comparison errors studies noisy comparisons under the assumption that every comparison can be queried more than once and the results are all independent. Recently, progress has been made on approximate selection [18], and more notably on minimumselection [22] that is exactly the problem we tackle in this paper, with a different model for noise. In fact, Leucci and Liu [22] just settled the complexity of minimum-selection in the non-persistent comparison error model. ...

Approximate Minimum Selection with Unreliable Comparisons

Algorithmica

... The parameter f that describes the degree of robustness against errors is known as the sensitivity of the oracle. A lot of work has been done in designing fault-tolerant structures for various problems like connectivity [20,32,33], finding shortest paths [2,12,36], and distance sensitivity oracles [5,7,14,24,30,31,34,47]. While the fault-tolerant model has been studied a lot for distances, the landscape of fault-tolerant diameter oracles is far less explored. ...

Multiple-Edge-Fault-Tolerant Approximate Shortest-Path Trees

Algorithmica

... In [12] it is shown that deciding whether the agents can deliver the data is (weakly) NP-complete. Additional research under various conditions and topological assumptions can be found in [4] which studies the game-theoretic task of selecting mobile agents to deliver multiple items on a network and optimizing or approximating the total energy consumption over all selected agents, in [2,5,7] which study data delivery and combine energy and time efficiency, and in [18,19] which are concerned with collaborative exploration in various topologies. ...

New Approximation Algorithms for the Heterogeneous Weighted Delivery Problem
  • Citing Chapter
  • June 2021

Lecture Notes in Computer Science

... To further scale up the counting problem, approximate counting algorithms sample from the target graph to estimate pattern counts. Strategies like path sampling [40,80], random walk [67,89], substructure sampling [29,39], and color coding [14,16] are used to narrow the sample space and provides better error bound. However, large and rare queries are still hard to find in the vast sample space, leading to large approximation error [15]. ...

Faster Motif Counting via Succinct Color Coding and Adaptive Sampling
  • Citing Article
  • May 2021

ACM Transactions on Knowledge Discovery from Data

... Notable examples include load balancing in computational grids [2] and traffic routing in networks [3][4][5][6][7][8]. Additionally, this approach has been applied for modeling traffic flows and route choices in transport networks [9][10][11]; it has also been used to support decision-making for subcontracting production orders [12] among other applications. ...

Network Creation Games with Traceroute-Based Strategies

Algorithms

... There has been a lot of heuristic based work on the problem of tracking moving objects in a network [30,36,39]. Parameterized complexity of Tracking Shortest Paths and Tracking Paths was studied in [4,5,8,12,13,17]. Feedback Vertex Set is known to admit a 2-approximation algorithm which is tight under UGC [3,14]. ...

Tracking routes in communication networks
  • Citing Article
  • July 2020

Theoretical Computer Science

... A cell can either be empty or contain an object. 1 The simplest type of objects are the walls and, as one might expect, stepping into a wall results in a non-movement. 2 We also restrict to instances where each connected component contains at most one worker. 3 More formally, for each worker w, let R w be the set of empty cells that can be reached by w from its starting position and imagining that there are no other workers on the grid. ...

Tracks from hell — When finding a proof may be easier than checking it
  • Citing Article
  • May 2020

Theoretical Computer Science

... For the prefix-bounded model, although Aigner's result on the minimum selection [1] implies that ( 1 1−p ) O(n log n) are sufficient to sort n elements, Borgstrom and Kosaraju [4] showed that checking whether the input elements are sorted already requires Ω ( 1 1−p ) n comparisons. When comparison faults are permanent, or equivalently, when a pair of elements can only be compared once, the underlying sorting problem has also been extensively studied especially because it can be connected to both the minimum feedback arc set problem and the rank aggregation problem [26,18,5,6,20,22,15,12,14,13]. There are also sorting algorithms for memory faults [11,24]. ...

Optimal Dislocation with Persistent Errors in Subquadratic Time

Theory of Computing Systems

... However, these algorithms are beyond the scope of this paper because their primary focus is not on cliques directly. Instead, they aim to count or predict k-graphlets, all graphlets formed by k nodes, efficiently, typically with a limited value of k such that k ≤ 5 due to combinatorial explosion (Ahmed et al., 2015;Wang et al., 2017;Pinar, Seshadhri & Vishal, 2017;Rossi, Zhou & Ahmed, 2018;Bressan, Leucci & Panconesi, 2019). Table 1 The search engines used, their respective links, and the search keywords. ...

Motivo: fast motif counting via succinct color coding and adaptive sampling
  • Citing Article
  • July 2019

Proceedings of the VLDB Endowment