Zobrazit minimální záznam

Unique key Horn functions

dc.contributor.authorBerczi, Kristof
dc.contributor.authorBoros, Endre
dc.contributor.authorČepek, Ondřej
dc.contributor.authorKučera, Petr
dc.contributor.authorMakino, Kazuhisa
dc.date.accessioned2023-12-01T07:40:33Z
dc.date.available2023-12-01T07:40:33Z
dc.date.issued2022
dc.identifier.urihttps://hdl.handle.net/20.500.14178/2086
dc.description.abstractGiven a relational database, a key is a set of attributes such that a value assignment to this set uniquely determines the values of all other attributes. The database uniquely defines a pure Horn function h, representing the functional dependencies. If the knowledge of the attribute values in set A determines the value for attribute v, then A -> v is an implicate of h. If K is a key of the database, then K -> v is an implicate of h for all attributes v. Keys of small sizes play a crucial role in various problems. We present structural and complexity results on the set of minimal keys of pure Horn functions. We characterize Sperner hypergraphs for which there is a unique pure Horn function with the given hypergraph as the set of minimal keys. Furthermore, we show that recognizing such hypergraphs is co-NP-complete already when every hyperedge has size two. On the positive side, we identify several classes of graphs for which the recognition problem can be decided in polynomial time. We also present an algorithm that generates the minimal keys of a pure Horn function with polynomial delay, improving on earlier results. By establishing a connection between keys and target sets, our approach can be used to generate all minimal target sets with polynomial delay when the thresholds are bounded by a constant. As a byproduct, our proof shows that the MINIMUM KEY problem is at least as hard as the MINIMUM TARGET SET SELECTION problem with bounded thresholds. (C) 2022 The Author(s). Published by Elsevier B.V.en
dc.language.isoen
dc.relation.urlhttps://doi.org/10.1016/j.tcs.2022.04.022
dc.rightsCreative Commons Uveďte původ-Neužívejte dílo komerčně-Nezpracovávejte 4.0 Internationalcs
dc.rightsCreative Commons Attribution-NonCommercial-NoDerivativeWorks 4.0 Internationalen
dc.titleUnique key Horn functionsen
dcterms.accessRightsopenAccess
dcterms.licensehttps://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
dc.date.updated2023-12-01T07:40:33Z
dc.subject.keywordMinimal keyen
dc.subject.keywordPure Horn functionen
dc.subject.keywordSperner hypergraphen
dc.subject.keywordTarget set selectionen
dc.relation.fundingReferenceinfo:eu-repo/grantAgreement/GA0/GA/GA19-19463S
dc.date.embargoStartDate2023-12-01
dc.type.obd73
dc.type.versioninfo:eu-repo/semantics/publishedVersion
dc.identifier.doi10.1016/j.tcs.2022.04.022
dc.identifier.utWos000850360300014
dc.identifier.eidScopus2-s2.0-85129694970
dc.identifier.obd619813
dc.identifier.rivRIV/00216208:11320/22:10452154
dc.subject.rivPrimary10000::10200::10201
dcterms.isPartOf.nameTheoretical Computer Science
dcterms.isPartOf.issn0304-3975
dcterms.isPartOf.journalYear2022
dcterms.isPartOf.journalVolume922
dcterms.isPartOf.journalIssueJune
uk.faculty.primaryId116
uk.faculty.primaryNameMatematicko-fyzikální fakultacs
uk.faculty.primaryNameFaculty of Mathematics and Physicsen
uk.department.primaryId1295
uk.department.primaryNameKatedra teoretické informatiky a matematické logikycs
uk.department.primaryNameDepartment of Theoretical Computer Science and Mathematical Logicen
dc.description.pageRange170-178
dc.type.obdHierarchyCsČLÁNEK V ČASOPISU::článek v časopisu::původní článekcs
dc.type.obdHierarchyEnJOURNAL ARTICLE::journal article::original articleen
dc.type.obdHierarchyCode73::152::206en
uk.displayTitleUnique key Horn functionsen


Soubory tohoto záznamu

Thumbnail

Tento záznam se objevuje v následujících kolekcích

Zobrazit minimální záznam