首页 > 最新文献

23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)最新文献

英文 中文
The complexity of compacting hierarchically specified layouts of integrated circuits 集成电路分层指定布局的压缩复杂性
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.92
Thomas Lengauer
In many CAD systems for VLSI design the specification of a layout is internally represented by a set of geometric constraints that take the form of linear inequalities between pairs of layout components. Some of the constraints may be explicitly stated by the circuit designer. Others are internally generated by the CAD system, using the design rules of the fabrication process. Layout compaction is then equivalent to finding a minimum area layout satisfying all constraints. We discuss the complexity of the constraint resolution problem arising in this context. Hereby we allow circuits to be specified hierarchically. The complexity of the constraint resolution is then measured in terms of the length of the hierarchical specification. We show the following results: 1. It is decidable in polynomial (cubic) time whether a given hierarchical layout specification yields a consistent set of geometric constraints. The size of minimum area layouts satisfying the constraints can also be determined in cubic time. 2. For every layout specification that is consistent a hierarchical description L of a minimum area layout can be computed in polynomial time in the length of L. 3. There is a consistent layout specification with the following property: No layout satisfying the constraints is concise, i.e., every hierarchical layout description consistent with the specification has a length which grows exponentially in the length of the specification. 4. We define a subclass of so-called well-formed layout specifications. Each well-formed specification has a concise layout, which can be hierarchically described in linear space. Such a layout can be found in polynomial time. However, it is in general not a minimum area layout. Indeed, there is a consistent well-formed specification all of whose minimum area layouts are inconcise,.i.e., need exponential space to be described.
在许多用于VLSI设计的CAD系统中,布局的规格在内部由一组几何约束表示,这些约束采用布局组件对之间的线性不等式的形式。电路设计者可以明确地说明一些约束条件。其他则由CAD系统内部生成,使用制造过程的设计规则。布局压缩相当于找到满足所有约束的最小面积布局。我们讨论在这种情况下产生的约束解决问题的复杂性。因此,我们允许分层地指定电路。然后根据分层规范的长度来测量约束解析的复杂性。我们展示了以下结果:1。给定的分层布局规范是否产生一组一致的几何约束,在多项式(三次)时间内是可确定的。满足约束条件的最小面积布局的尺寸也可以在三次时间内确定。2. 对于每一个一致的布局规范,最小面积布局的层次描述L可以在长度为L的多项式时间内计算出来。没有满足约束的布局是简洁的,也就是说,每个与规范一致的分层布局描述都有一个长度,该长度在规范的长度中呈指数增长。4. 我们定义了一个所谓的格式良好的布局规范的子类。每个格式良好的规范都有一个简洁的布局,可以在线性空间中分层描述。这样的布局可以在多项式时间内找到。然而,它通常不是最小面积布局。事实上,有一个一致的格式良好的规范,其所有的最小面积布局都是不简洁的,即。,需要指数空间来描述。
{"title":"The complexity of compacting hierarchically specified layouts of integrated circuits","authors":"Thomas Lengauer","doi":"10.1109/SFCS.1982.92","DOIUrl":"https://doi.org/10.1109/SFCS.1982.92","url":null,"abstract":"In many CAD systems for VLSI design the specification of a layout is internally represented by a set of geometric constraints that take the form of linear inequalities between pairs of layout components. Some of the constraints may be explicitly stated by the circuit designer. Others are internally generated by the CAD system, using the design rules of the fabrication process. Layout compaction is then equivalent to finding a minimum area layout satisfying all constraints. We discuss the complexity of the constraint resolution problem arising in this context. Hereby we allow circuits to be specified hierarchically. The complexity of the constraint resolution is then measured in terms of the length of the hierarchical specification. We show the following results: 1. It is decidable in polynomial (cubic) time whether a given hierarchical layout specification yields a consistent set of geometric constraints. The size of minimum area layouts satisfying the constraints can also be determined in cubic time. 2. For every layout specification that is consistent a hierarchical description L of a minimum area layout can be computed in polynomial time in the length of L. 3. There is a consistent layout specification with the following property: No layout satisfying the constraints is concise, i.e., every hierarchical layout description consistent with the specification has a length which grows exponentially in the length of the specification. 4. We define a subclass of so-called well-formed layout specifications. Each well-formed specification has a concise layout, which can be hierarchically described in linear space. Such a layout can be found in polynomial time. However, it is in general not a minimum area layout. Indeed, there is a consistent well-formed specification all of whose minimum area layouts are inconcise,.i.e., need exponential space to be described.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115927956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Storing a sparse table with O(1) worst case access time 存储一个最坏情况下访问时间为0(1)的稀疏表
Pub Date : 1982-11-03 DOI: 10.1145/828.1884
M. Fredman, J. Komlos, E. Szemerédi
We describe a data structure for representing a set of n items from a universe of m items, which uses space n+o(n) and accommodates membership queries in constant time. Both the data structure and the query algorithm are easy to implement.
我们描述了一种数据结构,用于表示来自m个项目的全域的n个项目的集合,它使用空间n+o(n),并在常量时间内容纳成员查询。数据结构和查询算法都易于实现。
{"title":"Storing a sparse table with O(1) worst case access time","authors":"M. Fredman, J. Komlos, E. Szemerédi","doi":"10.1145/828.1884","DOIUrl":"https://doi.org/10.1145/828.1884","url":null,"abstract":"We describe a data structure for representing a set of n items from a universe of m items, which uses space n+o(n) and accommodates membership queries in constant time. Both the data structure and the query algorithm are easy to implement.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116941664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 949
Parallel algorithms for minimum cuts and maximum flows in planar networks 平面网络中最小切割和最大流量的并行算法
Pub Date : 1982-11-03 DOI: 10.1145/31846.31849
Donald B. Johnson, S. M. Venkatesan
Algorithms are given that compute maximum flows in planar directed networks either in O((logn)3) parallel time using O(n4) processors or O((logn)2) parallel time using O(n6) processors. The resource consumption of these algorithms is dominated by the cost of finding the value of a maximum flow. When such a value is given, or when the computation is on an undirected network, the bound is O((logn)2) time using O(n4) processors. No efficient parallel algorithm is known for the maximum flow problem in general networks.
给出了使用O(n4)处理器在O((logn)3)并行时间内或使用O(n6)处理器在O((logn)2)并行时间内计算平面有向网络中最大流量的算法。这些算法的资源消耗主要取决于寻找最大流量值的成本。当给定这样的值时,或者当计算在无向网络上时,使用O(n4)个处理器,边界是O((logn)2)时间。对于一般网络中的最大流问题,目前还没有有效的并行算法。
{"title":"Parallel algorithms for minimum cuts and maximum flows in planar networks","authors":"Donald B. Johnson, S. M. Venkatesan","doi":"10.1145/31846.31849","DOIUrl":"https://doi.org/10.1145/31846.31849","url":null,"abstract":"Algorithms are given that compute maximum flows in planar directed networks either in O((logn)3) parallel time using O(n4) processors or O((logn)2) parallel time using O(n6) processors. The resource consumption of these algorithms is dominated by the cost of finding the value of a maximum flow. When such a value is given, or when the computation is on an undirected network, the bound is O((logn)2) time using O(n4) processors. No efficient parallel algorithm is known for the maximum flow problem in general networks.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124656713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Generalised symmetries of polynomials in algebraic complexity 代数复杂性下多项式的广义对称性
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.70
Carl Sturtivant
Suppose a polynomial P(x), (where x is the column matrix of the indeterminates x1.~.x), has a symmetry analogous to those of the de~ermiRant, whereby taking a certain linear combination of the The purpose of the paper is to define the set of symmetries of a polynomial, explore its structure, and identify the computationally useful members; a method of computing the latter symmetries is presented. It is shown how the set of symmetries determines whether or not Gaussian style elimination or transformation style algorithms can aid computation. To this end a robust notion of the "dimen-sion" of a polynomial is defined, yielding a tech~ nique for proving negative results in complexity. Let ~'¥.. and z be n x 1 column matrices. z is the wrappeg convolution of ~ and ¥.. iff '1j z. = LX. Y.. d • z is the Hademard J i=l ~ ~+J mo n product (or pairwise product) of ~ and ¥.."iff '1j z. = x. • y j • An efficient technique for eval-J J uating a wrapped convolution [1 p.254] relies upon transforming the convolution into a Hademard product by means of the discrete "Fburier transform. The question "can the permanent be transformed analogously in a way that may assist faster computation?" is considered, and answered in part. In order to construct such a scheme whereby P can be evaluated at any point ~, it must be possible for the symmetry (T, t) to depend upon x, in order to introduce zeros into Tx + t. (In practice several successive transformations may be made, introducing successively more zeros whilst preserving those previously present. Such a scheme constitutes a Gaussian elimination style algorithm for evaluating P) • In order for this to be possible, it is necessary that some of the symmetries of P form a continuum: these continuous symmetries include all of the computationally useful symmetries of P. variables before evaluating P only alters the result by a constant factor plus a constant additive term, (where T is an n x n matrix of constants, t is an n X 1 matrix of constants and k,k' are constants) • Then P could be computed at ~ by computing P at Ta + t, multiplying by k and adding k'. If Ta + t has more components equal to zero than a then there may be some computational advantage in this scheme as compared to evaluating …
假设多项式P(x)(其中x是不定式x1.~.x的列矩阵)具有类似于不定式的对称,本文的目的是定义多项式的对称集,探讨其结构,并找出计算上有用的成员;提出了一种计算后一种对称性的方法。它显示了对称性集如何决定高斯式消去或变换式算法是否可以帮助计算。为此,定义了多项式“维数”的鲁棒概念,从而产生了一种证明复杂性负结果的技术。让~”¥. .z是n × 1列矩阵。Z是~和¥的包裹卷积。i ' 1jz . = LX。Y . .d•z是~和¥的哈德矩阵J i=l ~ ~+J mo n积(或成对积)。计算包裹卷积的一种有效技术[1 p.254]依赖于通过离散的“Fburier变换”将卷积变换成hademad积。“能否以一种有助于更快计算的方式类比地转换永久性对象?”这个问题得到了考虑,并得到了部分回答。为了构造这样一个P可以在任意点~求值的方案,对称(T, T)必须可能依赖于x,以便在Tx + T中引入零。(在实践中,可以进行几个连续的变换,在保留先前存在的同时相继引入更多的零。)这样的方案构成了评估P的高斯消除式算法)•为了使这成为可能,有必要使P的一些对称性形成一个连续体:这些连续的对称性包括所有在计算上有用的P变量的对称性,在计算P之前,P只会通过一个常数因子加上一个常数相加项来改变结果,(其中T是一个n x n的常数矩阵,T是一个n x 1的常数矩阵,k,k'是常数)•然后P可以通过在Ta + T处计算P,乘以k,加上k'来计算~。如果Ta + t等于0的分量比a多,那么在这个方案中可能有一些计算优势,与评估…
{"title":"Generalised symmetries of polynomials in algebraic complexity","authors":"Carl Sturtivant","doi":"10.1109/SFCS.1982.70","DOIUrl":"https://doi.org/10.1109/SFCS.1982.70","url":null,"abstract":"Suppose a polynomial P(x), (where x is the column matrix of the indeterminates x1.~.x), has a symmetry analogous to those of the de~ermiRant, whereby taking a certain linear combination of the The purpose of the paper is to define the set of symmetries of a polynomial, explore its structure, and identify the computationally useful members; a method of computing the latter symmetries is presented. It is shown how the set of symmetries determines whether or not Gaussian style elimination or transformation style algorithms can aid computation. To this end a robust notion of the \"dimen-sion\" of a polynomial is defined, yielding a tech~ nique for proving negative results in complexity. Let ~'¥.. and z be n x 1 column matrices. z is the wrappeg convolution of ~ and ¥.. iff '1j z. = LX. Y.. d • z is the Hademard J i=l ~ ~+J mo n product (or pairwise product) of ~ and ¥..\"iff '1j z. = x. • y j • An efficient technique for eval-J J uating a wrapped convolution [1 p.254] relies upon transforming the convolution into a Hademard product by means of the discrete \"Fburier transform. The question \"can the permanent be transformed analogously in a way that may assist faster computation?\" is considered, and answered in part. In order to construct such a scheme whereby P can be evaluated at any point ~, it must be possible for the symmetry (T, t) to depend upon x, in order to introduce zeros into Tx + t. (In practice several successive transformations may be made, introducing successively more zeros whilst preserving those previously present. Such a scheme constitutes a Gaussian elimination style algorithm for evaluating P) • In order for this to be possible, it is necessary that some of the symmetries of P form a continuum: these continuous symmetries include all of the computationally useful symmetries of P. variables before evaluating P only alters the result by a constant factor plus a constant additive term, (where T is an n x n matrix of constants, t is an n X 1 matrix of constants and k,k' are constants) • Then P could be computed at ~ by computing P at Ta + t, multiplying by k and adding k'. If Ta + t has more components equal to zero than a then there may be some computational advantage in this scheme as compared to evaluating …","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132843656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
'Eventual' is earlier than 'immediate' “最终”比“立即”早
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.51
D. Dolev, R. Reischuk, H. Strong
Two different notions of Byzantine Agreement - immediate and eventually - are defined depending on whether the agreement involves an action to be performed synchronously or not. The lower bounds for time complexity depend on what kind of agreement has to be achieved. All previous algorithms to reach Byzantine Agreement ensure immediate agreement. We present two algorithms that in many cases reach the second type of agreement faster than previously known algorithms showing that there actually is a difference between the two notions: Eventual Byzantine Agreement can be reached earlier than Immediate.
根据协议是否涉及要同步执行的操作,定义了两个不同的拜占庭协议概念——立即和最终。时间复杂度的下限取决于必须达成何种协议。所有以前的算法,以达到拜占庭协议确保立即协议。我们提出了两种算法,在许多情况下,它们比以前已知的算法更快地达到第二类协议,这表明这两个概念之间实际上存在差异:最终拜占庭协议可以比即时协议更早达成。
{"title":"'Eventual' is earlier than 'immediate'","authors":"D. Dolev, R. Reischuk, H. Strong","doi":"10.1109/SFCS.1982.51","DOIUrl":"https://doi.org/10.1109/SFCS.1982.51","url":null,"abstract":"Two different notions of Byzantine Agreement - immediate and eventually - are defined depending on whether the agreement involves an action to be performed synchronously or not. The lower bounds for time complexity depend on what kind of agreement has to be achieved. All previous algorithms to reach Byzantine Agreement ensure immediate agreement. We present two algorithms that in many cases reach the second type of agreement faster than previously known algorithms showing that there actually is a difference between the two notions: Eventual Byzantine Agreement can be reached earlier than Immediate.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
The ellipsoid algorithm for linear inequalities in exact arithmetic 求解线性不等式的椭球算法
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.44
S. Ursic
A modification of the ellipsoid algorithm is shown to be capable of testing for satisfiability a system of linear equations and inequalities with integer coefficients of the form Ax = b, x ≥ 0. All the rational arithmetic is performed exactly, without losing polynomiality of the computing time. In case of satisfiability, the approach always provides a rational feasible point. The bulk of the computations consists of a sequence of linear least squares problems, each a rank one modification of the preceding one. The continued fractions jump is used to compute some of the coordinates of a feasible point.
对椭球算法的一种改进,证明了该算法能够检验形式为Ax = b, x≥0的整数系数线性方程组和不等式的可满足性。所有的有理数运算都精确地执行,而不损失计算时间的多项式性。在可满足性的情况下,该方法总是提供一个合理的可行点。大部分计算由一系列线性最小二乘问题组成,每个问题都是前一个问题的第一个修改。用连分式跳跃来计算可行点的一些坐标。
{"title":"The ellipsoid algorithm for linear inequalities in exact arithmetic","authors":"S. Ursic","doi":"10.1109/SFCS.1982.44","DOIUrl":"https://doi.org/10.1109/SFCS.1982.44","url":null,"abstract":"A modification of the ellipsoid algorithm is shown to be capable of testing for satisfiability a system of linear equations and inequalities with integer coefficients of the form Ax = b, x ≥ 0. All the rational arithmetic is performed exactly, without losing polynomiality of the computing time. In case of satisfiability, the approach always provides a rational feasible point. The bulk of the computations consists of a sequence of linear least squares problems, each a rank one modification of the preceding one. The continued fractions jump is used to compute some of the coordinates of a feasible point.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122258515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Substitution of bounded rational cone 有界有理锥的代换
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.90
J. Beauquier, M. Latteux
We study the family S of rational cones obtained by iterated substitutions from rational cones L1, .., Ln. This family is a semi-group and to every non empty word u defined on the alphabet {L1, ..., Ln}, corresponds a rational cone U of S. We give sufficient conditions for S to be free (U = U′ implies u = u′) and to verify the subpattern property (U ⊂ U′ implies u is a subpattern of u′). We study, more particularly, the case where L1, ..., Ln are bounded rational cones.
我们研究了由有理锥L1,…通过迭代替换得到的有理锥族S。Ln。这个族是一个半群,对于字母{L1,…, Ln},对应于S的有理锥U,我们给出S是自由的充分条件(U = U '暗示U = U '),并验证子模式的性质(U≠U '暗示U是U '的子模式)。更具体地说,我们研究L1,…, Ln是有界有理锥。
{"title":"Substitution of bounded rational cone","authors":"J. Beauquier, M. Latteux","doi":"10.1109/SFCS.1982.90","DOIUrl":"https://doi.org/10.1109/SFCS.1982.90","url":null,"abstract":"We study the family S of rational cones obtained by iterated substitutions from rational cones L1, .., Ln. This family is a semi-group and to every non empty word u defined on the alphabet {L1, ..., Ln}, corresponds a rational cone U of S. We give sufficient conditions for S to be free (U = U′ implies u = u′) and to verify the subpattern property (U ⊂ U′ implies u is a subpattern of u′). We study, more particularly, the case where L1, ..., Ln are bounded rational cones.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An O(n3 log n) deterministic and an O (n 3) probabilistic isomorphism test for trivalent graphs 三价图的O(n3 log n)确定性和O(n3)概率同构检验
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.62
Z. Galil, C. Hoffmann, E. Luks, C. Schnorr, M. Weber
The main results of this paper are an O(n3) probabilistic algorithm and an O(n3 log n) deterministic algorithm that test whether two given trivalent graphs are isomorphic. In fact, the algorithms construct the set of all isomorphisms of the two graphs. Variants of these algorithms construct the set of all automorphisms of a trivalent graph. The algorithms make use of some new improved permutation group algorithms that exploit the fact that the groups involved are 2-groups. A remarkable property of the probabilistic algorithm is that it computes Isoe,ei(X,Y), i = 1,...,m, m = O(n) (the set of all isomorhisms φ: X → Y with φ(e)=ei) for the cost of computing the single set Isoe,el(X,Y).
本文的主要结果是一个O(n3)概率算法和一个O(n3 log n)确定性算法,用于检验给定的两个三价图是否同构。实际上,这些算法构造了两个图的所有同构的集合。这些算法的变体构造了一个三价图的所有自同构的集合。该算法利用了一些新的改进的置换群算法,利用了所涉及的群是2群的事实。概率算法的一个显著特性是它计算Isoe,ei(X,Y), i = 1,…,m, m = O(n) (φ(e)=ei的所有同构的集合φ: X→Y),计算单个集合Isoe,el(X,Y)的代价。
{"title":"An O(n3 log n) deterministic and an O (n 3) probabilistic isomorphism test for trivalent graphs","authors":"Z. Galil, C. Hoffmann, E. Luks, C. Schnorr, M. Weber","doi":"10.1109/SFCS.1982.62","DOIUrl":"https://doi.org/10.1109/SFCS.1982.62","url":null,"abstract":"The main results of this paper are an O(n3) probabilistic algorithm and an O(n3 log n) deterministic algorithm that test whether two given trivalent graphs are isomorphic. In fact, the algorithms construct the set of all isomorphisms of the two graphs. Variants of these algorithms construct the set of all automorphisms of a trivalent graph. The algorithms make use of some new improved permutation group algorithms that exploit the fact that the groups involved are 2-groups. A remarkable property of the probabilistic algorithm is that it computes Isoe,ei(X,Y), i = 1,...,m, m = O(n) (the set of all isomorhisms φ: X → Y with φ(e)=ei) for the cost of computing the single set Isoe,el(X,Y).","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
How to generate cryptographically strong sequences of pseudo random bits 如何生成伪随机位的密码学强序列
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.72
M. Blum, S. Micali
Much effort has been devoted in the second half of this century to make precise the notion of Randomness. Let us informally recall one of these definitions due to Kolmogorov []. A sequence of bits A =all a2••.•• at is random if the length of the minimal program outputting A is at least k We remark that the above definition is highly non constructive and rules out the possibility of pseudo random number generators. Also. the length of a program, from a Complexity Theory point of view, is a rather unnatural measure. A more operative definition of Randomness should be pursued in the light of modern Complexity Theory.
在本世纪下半叶,人们投入了大量精力来精确定义随机性的概念。让我们非正式地回忆一下由Kolmogorov[]给出的其中一个定义。位序列A =所有a2••。••如果输出A的最小程序长度至少为k,则at是随机的。我们注意到,上述定义是非建设性的,并且排除了伪随机数生成器的可能性。也。从复杂性理论的角度来看,程序的长度是一种相当不自然的度量。在现代复杂性理论的指导下,我们应该对随机性进行更有效的定义。
{"title":"How to generate cryptographically strong sequences of pseudo random bits","authors":"M. Blum, S. Micali","doi":"10.1109/SFCS.1982.72","DOIUrl":"https://doi.org/10.1109/SFCS.1982.72","url":null,"abstract":"Much effort has been devoted in the second half of this century to make precise the notion of Randomness. Let us informally recall one of these definitions due to Kolmogorov []. A sequence of bits A =all a2••.•• at is random if the length of the minimal program outputting A is at least k We remark that the above definition is highly non constructive and rules out the possibility of pseudo random number generators. Also. the length of a program, from a Complexity Theory point of view, is a rather unnatural measure. A more operative definition of Randomness should be pursued in the light of modern Complexity Theory.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134290692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1524
Three applications of Kolmogorov-complexity 柯尔莫哥洛夫复杂度的三个应用
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.96
Stefan Reisch, G. Schnitger
Kolmogorov-CoMplexity has turned out to be a very useful tool in proving lower bounds [5], [6], [7]. Here we will give further applications of Kolmogorov-Complexity. Firstly we will greatly simplify two well-known lower bound proofs: (a) the n(n logn/loglog n) lower bound for on-line-multiplication, originally proven in [2], [4], (b) the n(n 2 /log n) lower bound for a time-space trade-off in sorting [9]. We will also improve this bound to n(N 2 loglog N/log N). Secondly we will demonstrate how to use Kolmogorov-Complexity in analysing proba-bilistic algorithms: (c) We analyse in an elementary way the routing algorithm for n-dimensional cubes given in [10]. 1. The concept of Kolmogorov-Complexity Let C be the class of one-dimensional Turing-machines with tape-alphabet {O,I,B}. Let U be an universal machine in C. For w 1 ,w 2 E{O,I}* define the Kolmogorov-Complexity [3] by: K(w 1 {W 2 }: =the length of the shortest o/ 1 s t r i ng (" pro gram I' J p, s uc h t hat U with input pBw2 computes wI and stops. K(w): =K(wlempty string). 45 Because one program p can only generate one word w, we have Fact I : Let w 2 E{O,l}* , then i) *{wl E{O,1}*IK(w 1 IW 2) ~n} <2 n + 1 _1 i i) (Especially) there exists a string w E{O,l}n with K(wlw 2) ~n If K(wl the empty string) =n , then w i s called a random string. Two easy consequences of Fact 1 are Fact 2: (Strings with low complexity are improbable). Let w 2 E{O,l}* be fixed and determine wI E{O,l}n by tossinq a fair coin n times, then for all c Fact 3: (Random strings are locally n almost random). Let w =w 1 w 2 w 3 E{O,l} be random. Then, with w'w 2 : =w 1 w 3 ' We need the following notation. For w: =w 1 w 1 w 2 w2"" ,w n w n Ol ·
Kolmogorov-CoMplexity已经被证明是证明下界的一个非常有用的工具[5],[6],[7]。这里我们将给出kolmogorov复杂度的进一步应用。首先,我们将极大地简化两个众所周知的下界证明:(a)在线乘法的n(n logn/ logn)下界,最初在[2],[4]中得到证明,(b)排序中时空权衡的n(n 2 /log n)下界[9]。我们还将把这个界限提高到n(n2 loglog n /log n)。其次,我们将演示如何在分析概率算法中使用Kolmogorov-Complexity: (c)我们以一种基本的方式分析了[10]中给出的n维立方体的路由算法。1. 设C为带字母{O,I,B}的一维图灵机类。设U是c语言中的一个通用机,对于w1, w2 E{O,I}*定义kolmogorov复杂度[3]:K(w1 {w2}: =最短的0 / 1的长度,即I(程序I' J p),当U输入pBw2计算wI并停止时。K(w): =K(空字符串)。45由于一个程序p只能生成一个单词w,我们有了事实1:设w2e {O,l}*, then I) *{wl E{O,1}*IK(w1iw 2) ~n} < 2n + 1 _1 _1 I I)(特别地)存在一个字符串w E{O,l}n与K(wlw 2) ~n,如果K(空字符串wl) =n,则称wi为随机字符串。事实1的两个简单结果是事实2:(低复杂度的字符串是不可能的)。设w2e {O,l}*是固定的,并通过投掷n次均匀硬币来确定wI E{O,l}n,则对于所有c,事实3:(随机字符串局部n几乎是随机的)。设w =w 1 w 2 w 3 E{0, 1}是随机的。然后,用w'w 2: =w 1 w 3 ',我们需要下面的符号。对于w: = w1w1w2w2“”,w1w2w·
{"title":"Three applications of Kolmogorov-complexity","authors":"Stefan Reisch, G. Schnitger","doi":"10.1109/SFCS.1982.96","DOIUrl":"https://doi.org/10.1109/SFCS.1982.96","url":null,"abstract":"Kolmogorov-CoMplexity has turned out to be a very useful tool in proving lower bounds [5], [6], [7]. Here we will give further applications of Kolmogorov-Complexity. Firstly we will greatly simplify two well-known lower bound proofs: (a) the n(n logn/loglog n) lower bound for on-line-multiplication, originally proven in [2], [4], (b) the n(n 2 /log n) lower bound for a time-space trade-off in sorting [9]. We will also improve this bound to n(N 2 loglog N/log N). Secondly we will demonstrate how to use Kolmogorov-Complexity in analysing proba-bilistic algorithms: (c) We analyse in an elementary way the routing algorithm for n-dimensional cubes given in [10]. 1. The concept of Kolmogorov-Complexity Let C be the class of one-dimensional Turing-machines with tape-alphabet {O,I,B}. Let U be an universal machine in C. For w 1 ,w 2 E{O,I}* define the Kolmogorov-Complexity [3] by: K(w 1 {W 2 }: =the length of the shortest o/ 1 s t r i ng (\" pro gram I' J p, s uc h t hat U with input pBw2 computes wI and stops. K(w): =K(wlempty string). 45 Because one program p can only generate one word w, we have Fact I : Let w 2 E{O,l}* , then i) *{wl E{O,1}*IK(w 1 IW 2) ~n} <2 n + 1 _1 i i) (Especially) there exists a string w E{O,l}n with K(wlw 2) ~n If K(wl the empty string) =n , then w i s called a random string. Two easy consequences of Fact 1 are Fact 2: (Strings with low complexity are improbable). Let w 2 E{O,l}* be fixed and determine wI E{O,l}n by tossinq a fair coin n times, then for all c Fact 3: (Random strings are locally n almost random). Let w =w 1 w 2 w 3 E{O,l} be random. Then, with w'w 2 : =w 1 w 3 ' We need the following notation. For w: =w 1 w 1 w 2 w2\"\" ,w n w n Ol ·","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1