首页 > 最新文献

23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)最新文献

英文 中文
Parallel time O(log N) acceptance of deterministic CFLs 确定性节能灯并行时间O(log N)接受度
P. Klein, J. Reif
We give a parallel RAM algorithm for simulating a deterministic auxiliary pushdown machine. If the pushdown machine uses space s(n) ≥ log n and time 2O(s(n)) then our parallel simulation algorithm takes time O(s(n)) and requires 2 processors. Thus any deterministic context free language is accepted in time O(log n) by our parallel RAM algorithm using a polynomial number of processors. (Our algorithm can easily be extended to also accept the LR(k) languages in time O(log n) and 2O(k) Processors. Our simulation algorithm is near optimal for parallel RAMs, since we show that the language accepted in time T(n) by a parallel RAM is accepted by a deterministic auxiliary pushdown machine with space T(n) and time 2O(T(n)2).
给出了一种模拟确定性辅助下推机的并行RAM算法。如果下推机占用空间s(n)≥log n,时间2O(s(n)),那么我们的并行仿真算法耗时O(s(n)),需要2个处理器。因此,我们的并行RAM算法使用多项式数量的处理器在时间O(log n)内接受任何确定性上下文无关语言。(我们的算法可以很容易地扩展到在O(log n)和2O(k)个处理器时间内也接受LR(k)语言。我们的模拟算法对于并行RAM来说是接近最优的,因为我们表明并行RAM在时间T(n)中接受的语言被空间T(n)和时间20 (T(n)2)的确定性辅助下推机接受。
{"title":"Parallel time O(log N) acceptance of deterministic CFLs","authors":"P. Klein, J. Reif","doi":"10.1137/0217027","DOIUrl":"https://doi.org/10.1137/0217027","url":null,"abstract":"We give a parallel RAM algorithm for simulating a deterministic auxiliary pushdown machine. If the pushdown machine uses space s(n) ≥ log n and time 2O(s(n)) then our parallel simulation algorithm takes time O(s(n)) and requires 2 processors. Thus any deterministic context free language is accepted in time O(log n) by our parallel RAM algorithm using a polynomial number of processors. (Our algorithm can easily be extended to also accept the LR(k) languages in time O(log n) and 2O(k) Processors. Our simulation algorithm is near optimal for parallel RAMs, since we show that the language accepted in time T(n) by a parallel RAM is accepted by a deterministic auxiliary pushdown machine with space T(n) and time 2O(T(n)2).","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124485124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
On the complexity of unique solutions 关于唯一解的复杂性
Pub Date : 1982-11-03 DOI: 10.1145/62.322435
C. Papadimitriou
We show that the problem of deciding whether an instance of the traveling salesman problem has a uniquely optimal solution is complete for Δ2P.
我们证明了旅行推销员问题的一个实例对于Δ2P是否有唯一最优解的判定问题是完全的。
{"title":"On the complexity of unique solutions","authors":"C. Papadimitriou","doi":"10.1145/62.322435","DOIUrl":"https://doi.org/10.1145/62.322435","url":null,"abstract":"We show that the problem of deciding whether an instance of the traveling salesman problem has a uniquely optimal solution is complete for Δ2P.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 97
An application of higher reciprocity to computational number theory 高互易性在计算数论中的应用
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.59
L. Adleman, Robert McDonnell
The Higher Reciprocity Laws are considered to be among the deepest and most fundamental results in number theory. Yet, they have until recently played no part in number theoretic algorithms. In this paper we explore the power of the laws in algorithms. The problem we consider is part of a group of well-studied problems about roots in finite fields and rings. Let F denote a finite field, let m denote a direct product of finite fields. Consider the following problems: Problem 1. Is Xn = a solvable in F; Problem 2. If Xn = a is solvable in F find X; Problem 3. Is Xn = a solvable in m; Problem 4. If Xn = a solvable in m find X.
高互易律被认为是数论中最深刻和最基本的结果之一。然而,直到最近,它们还没有在数论算法中发挥作用。在本文中,我们探讨了算法中定律的力量。我们考虑的问题是一组关于有限域和环中的根的问题的一部分。设F表示有限域,m表示有限域的直积。考虑以下问题:问题1。Xn = a在F中可解吗?问题2。如果Xn = a在F中可解,求X;问题3。Xn = a在m中可解吗?问题4。如果Xn = a在m中可解,求出X。
{"title":"An application of higher reciprocity to computational number theory","authors":"L. Adleman, Robert McDonnell","doi":"10.1109/SFCS.1982.59","DOIUrl":"https://doi.org/10.1109/SFCS.1982.59","url":null,"abstract":"The Higher Reciprocity Laws are considered to be among the deepest and most fundamental results in number theory. Yet, they have until recently played no part in number theoretic algorithms. In this paper we explore the power of the laws in algorithms. The problem we consider is part of a group of well-studied problems about roots in finite fields and rings. Let F denote a finite field, let m denote a direct product of finite fields. Consider the following problems: Problem 1. Is Xn = a solvable in F; Problem 2. If Xn = a is solvable in F find X; Problem 3. Is Xn = a solvable in m; Problem 4. If Xn = a solvable in m find X.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114193349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Probabilistic analysis of some bin-packing problems 若干装箱问题的概率分析
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.37
N. Karmarkar
We analyze the average-case behaviour of the Next-Fit algorithm for bin-packing, and obtain closed-form expressions for distributions of interest. Our analysis is based on a novel technique of partitioning the interval (0, 1) suitably and then formulating the problem as a matrix-differential equation. We compare our analytic results with previously known simulation results and show that there is an excellent agreement between the two. We also explain a certain empirically observed anomaly in the behaviour of the algorithm. Finally we establish that asymptotically perfect packing is possible when input items are drawn from a monotonically decreasing density function.
我们分析了Next-Fit装箱算法的平均情况行为,并获得了感兴趣分布的封闭形式表达式。我们的分析是基于一种新的技术,即适当地划分区间(0,1),然后将问题表述为矩阵微分方程。我们将分析结果与先前已知的仿真结果进行了比较,结果表明两者之间有很好的一致性。我们还解释了某些经验观察到的算法行为异常。最后,我们证明了当输入项从单调递减的密度函数中抽取时,渐近完美填充是可能的。
{"title":"Probabilistic analysis of some bin-packing problems","authors":"N. Karmarkar","doi":"10.1109/SFCS.1982.37","DOIUrl":"https://doi.org/10.1109/SFCS.1982.37","url":null,"abstract":"We analyze the average-case behaviour of the Next-Fit algorithm for bin-packing, and obtain closed-form expressions for distributions of interest. Our analysis is based on a novel technique of partitioning the interval (0, 1) suitably and then formulating the problem as a matrix-differential equation. We compare our analytic results with previously known simulation results and show that there is an excellent agreement between the two. We also explain a certain empirically observed anomaly in the behaviour of the algorithm. Finally we establish that asymptotically perfect packing is possible when input items are drawn from a monotonically decreasing density function.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133901014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Optimal allocation of computational resources in VLSI
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.32
Z. Kedem
The purpose of our research whose prel iminary resul ts are reported here is to examine the following question: ~iven chiP ~ A, 1!!! 19 optimalli .!lloc.!~ .il 8IImJ 1/Q, !UD9.!:Y, and wiriy (internal
我们的研究,其初步结果在这里报告是为了检验以下问题:~给定芯片~ A, 1!!19 .最优。[1] [8] [1] [1] [9]:Y,和线形(内部
{"title":"Optimal allocation of computational resources in VLSI","authors":"Z. Kedem","doi":"10.1109/SFCS.1982.32","DOIUrl":"https://doi.org/10.1109/SFCS.1982.32","url":null,"abstract":"The purpose of our research whose prel iminary resul ts are reported here is to examine the following question: ~iven chiP ~ A, 1!!! 19 optimalli .!lloc.!~ .il 8IImJ 1/Q, !UD9.!:Y, and wiriy (internal <XIIIDUD.i.cation) so that sane function of interest can ~ cauputed .!p th;m:~~!Y minimtm !~.!? -P-;;h. suprisingly, the geanetric nature of the model makesit sufficiently \"structured\" so that meaningful study of the consequences of such allocatim for the purpose of designing provably optimal chips is feasibl e. ( I t is interesting to contrast this situation with the one in unstructured models, where simi! ar attempts at fomsal treatment of optimal allocation 00 not seem to be as fruitful.) Our resul ts pennit us to CXJDPletely characterize both the 8llount of resources required and their allocation for certain ccmputations, and to obtain previously proved lower bounds (which generally accomted for sane of the resources, or restricted their util ization in sane way) for certain fmctions as special cases, by invoking explicit constraints.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127755350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Priority queues with variable priority and an O(EV log V) algorithm for finding a maximal weighted matching in general graphs 具有可变优先级的优先级队列和用于在一般图中寻找最大加权匹配的O(EV log V)算法
Z. Galil, S. Micali, H. Gabow
We define two generalized types of a priority queue by allowing some forms of changing the priorities of the elements in the queue. We show that they can be implemented efficiently. Consequently, each operation takes O(log n) time. We use these generalized priority queues to construct an O(EV log V) algorithm for finding a maximal weighted matching in general graphs.
通过允许以某种形式更改队列中元素的优先级,定义了两种通用的优先级队列类型。我们证明了它们可以有效地实施。因此,每个操作需要O(log n)时间。我们利用这些广义优先级队列构造了一个O(EV log V)算法,用于在一般图中寻找最大加权匹配。
{"title":"Priority queues with variable priority and an O(EV log V) algorithm for finding a maximal weighted matching in general graphs","authors":"Z. Galil, S. Micali, H. Gabow","doi":"10.1137/0215009","DOIUrl":"https://doi.org/10.1137/0215009","url":null,"abstract":"We define two generalized types of a priority queue by allowing some forms of changing the priorities of the elements in the queue. We show that they can be implemented efficiently. Consequently, each operation takes O(log n) time. We use these generalized priority queues to construct an O(EV log V) algorithm for finding a maximal weighted matching in general graphs.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128967730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 162
Deciding the inequivalence of context-free grammars with 1-letter terminal alphabet is S2p-complete 确定无上下文语法与1个字母的终端字母的不等价性是完全的
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.65
Thiet-Dung Huynh
This paper deals with the complexity of context-free grammars with 1-1etter terminal alphabet. We study the complexity of the membership problem and the inequivalence problem. We show that the first problem is NP-complete and the second one is Σ2p- complete with respect to log-space reduction. The second result also implies that the inequivalence problem is in PSPACE, solving an open problem stated in [3] by Hunt III, Rosenkrantz and Szymanski.
本文研究了1-1个字母结尾的无上下文语法的复杂性。研究了隶属问题和不等价问题的复杂性。我们证明了第一个问题是np完备的,第二个问题是Σ2p完备的。第二个结果也意味着不等价问题存在于PSPACE中,解决了Hunt III、Rosenkrantz和Szymanski在[3]中提出的一个开放问题。
{"title":"Deciding the inequivalence of context-free grammars with 1-letter terminal alphabet is S2p-complete","authors":"Thiet-Dung Huynh","doi":"10.1109/SFCS.1982.65","DOIUrl":"https://doi.org/10.1109/SFCS.1982.65","url":null,"abstract":"This paper deals with the complexity of context-free grammars with 1-1etter terminal alphabet. We study the complexity of the membership problem and the inequivalence problem. We show that the first problem is NP-complete and the second one is Σ2p- complete with respect to log-space reduction. The second result also implies that the inequivalence problem is in PSPACE, solving an open problem stated in [3] by Hunt III, Rosenkrantz and Szymanski.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115656457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An old linear programming algorithm runs in polynomial time 旧的线性规划算法在多项式时间内运行
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.63
Boris Yamnitsky, L. Levin
The Ellipsoid Algorithm (EA) for linear programming attracted recently great attention. EA was proposed in [N76] and developed in [K79, G81] and other works. It is a modification of Method of Centralized Splitting presented in [L65], which differs from EA in two essential respects. Firstly, [L65] uses simplexes instead of ellipsoids; it is admitted, secondly, that, several (q(n))splittings of the n-dimensional simplex may be needed before the remaining polyhedron can be enclosed into a simplex of a smaller volume. Only a very rough upper bound q(n) ≪ nlog(n)follows from the reasoning of [L65]. This does not imply polynomiality of the computation time, since n, log(n) splittings may make the simplex very complex. We prove below that, q(n)= 1. Let the problem be to find x∈Rn such that Ax ≫ 0, where A is an m × n matrix of rank n. We normalize solutions by a restriction (e - Ax) = 1 where e ≫ 0. On every step the algorithm considers a simplex BAx ≥ 0 containing all solutions, where B is a non-negative n × m matrix with det(BA) ≠ 0. Let us denote this simplex by ΔB, its volume by VB and its center by CB. Initially we take an arbitrary B and e = BT(1,..,1).
求解线性规划的椭球算法近年来受到了广泛的关注。EA在[N76]中被提出,并在[K79, G81]等著作中得到发展。它是对[L65]中提出的Method of Centralized Splitting的修改,与EA有两个本质的区别。首先,[L65]用单纯形代替椭球体;其次,我们承认,在剩余的多面体被封闭成体积较小的单纯形之前,可能需要对n维单纯形进行多次(q(n))次分裂。根据[L65]的推论,只有一个非常粗略的上限值q(n)≪nlog(n)。这并不意味着计算时间的多项式性,因为n, log(n)次分割可能会使单纯形非常复杂。我们在下面证明,q(n)= 1。设问题是求x∈Rn满足Ax < 0,其中A是秩为n的m × n矩阵。我们通过约束(e - Ax) = 1使解归一化,其中e < 0。算法每一步考虑一个包含所有解的单纯形BAx≥0,其中B是一个非负的n × m矩阵,det(BA)≠0。我们用ΔB表示这个单纯形,体积用VB表示,中心用CB表示。最初我们取一个任意的B, e = BT(1,…,1)。
{"title":"An old linear programming algorithm runs in polynomial time","authors":"Boris Yamnitsky, L. Levin","doi":"10.1109/SFCS.1982.63","DOIUrl":"https://doi.org/10.1109/SFCS.1982.63","url":null,"abstract":"The Ellipsoid Algorithm (EA) for linear programming attracted recently great attention. EA was proposed in [N76] and developed in [K79, G81] and other works. It is a modification of Method of Centralized Splitting presented in [L65], which differs from EA in two essential respects. Firstly, [L65] uses simplexes instead of ellipsoids; it is admitted, secondly, that, several (q(n))splittings of the n-dimensional simplex may be needed before the remaining polyhedron can be enclosed into a simplex of a smaller volume. Only a very rough upper bound q(n) ≪ nlog(n)follows from the reasoning of [L65]. This does not imply polynomiality of the computation time, since n, log(n) splittings may make the simplex very complex. We prove below that, q(n)= 1. Let the problem be to find x∈Rn such that Ax ≫ 0, where A is an m × n matrix of rank n. We normalize solutions by a restriction (e - Ax) = 1 where e ≫ 0. On every step the algorithm considers a simplex BAx ≥ 0 containing all solutions, where B is a non-negative n × m matrix with det(BA) ≠ 0. Let us denote this simplex by ΔB, its volume by VB and its center by CB. Initially we take an arbitrary B and e = BT(1,..,1).","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126856330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Protocols for secure computations 安全计算协议
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.88
A. Yao
The author investigates the following problem: Suppose m people wish to compute the value of a function f(x1, x2, x3, ..., xm), which is an integer-valued function of m integer variables xi of bounded range. Assume initially person Pi knows the value of xi and no other x's. Is it possible for them to compute the value of f, by communicating among themselves, without unduly giving away any information about the values of their own variables? The author gives a precise formulation of this general problem and describe three ways of solving it by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert). These results have applications to secret voting, private querying of database, oblivious negotiation, playing mental poker, etc.. He also discusses the complexity question "How many bits need to be exchanged for the computation," and describes methods to prevent participants from cheating. Finally, he studies the question "What cannot be accomplished with one-way functions."
作者研究了以下问题:假设m个人希望计算函数f(x1, x2, x3,…)的值, xm),它是m个有界整数变量xi的整数值函数。假设最初的人知道xi的值而不知道其他x的值。它们是否有可能计算f的值,通过它们之间的通信,而不过多地给出关于它们自己变量值的任何信息?作者给出了这个一般问题的精确表述,并描述了利用单向函数(即容易求值但难于反演的函数)求解该问题的三种方法。这些结果在无记名投票、数据库私下查询、不经意谈判、打心理扑克等方面都有应用。他还讨论了复杂性问题“计算需要交换多少比特”,并描述了防止参与者作弊的方法。最后,他研究了“单向函数不能完成什么”的问题。
{"title":"Protocols for secure computations","authors":"A. Yao","doi":"10.1109/SFCS.1982.88","DOIUrl":"https://doi.org/10.1109/SFCS.1982.88","url":null,"abstract":"The author investigates the following problem: Suppose m people wish to compute the value of a function f(x1, x2, x3, ..., xm), which is an integer-valued function of m integer variables xi of bounded range. Assume initially person Pi knows the value of xi and no other x's. Is it possible for them to compute the value of f, by communicating among themselves, without unduly giving away any information about the values of their own variables? The author gives a precise formulation of this general problem and describe three ways of solving it by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert). These results have applications to secret voting, private querying of database, oblivious negotiation, playing mental poker, etc.. He also discusses the complexity question \"How many bits need to be exchanged for the computation,\" and describes methods to prevent participants from cheating. Finally, he studies the question \"What cannot be accomplished with one-way functions.\"","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123907660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3843
Using clerk in parallel processing 采用书记员并行处理
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.48
Q. Stout
Some models of parallel computation consist of copies of a single finite automaton, connected together in a regular fashion. In such computers clerks can be a useful data structure, enabling one to simulate a more powerful computer for which optimal algorithms are easier to design. Clerks are used here to give optimal algorithms for the 3-dimensional connected is problem on a parallel processing array, and a circle construction problem on a pyramid cellular automaton.
一些并行计算模型由单个有限自动机的副本组成,它们以规则的方式连接在一起。在这样的计算机中,职员可以是一种有用的数据结构,使人们能够模拟更强大的计算机,从而更容易设计最佳算法。本文利用文库给出了并行处理阵列上的三维连通问题和金字塔元胞自动机上的圆构造问题的最优算法。
{"title":"Using clerk in parallel processing","authors":"Q. Stout","doi":"10.1109/SFCS.1982.48","DOIUrl":"https://doi.org/10.1109/SFCS.1982.48","url":null,"abstract":"Some models of parallel computation consist of copies of a single finite automaton, connected together in a regular fashion. In such computers clerks can be a useful data structure, enabling one to simulate a more powerful computer for which optimal algorithms are easier to design. Clerks are used here to give optimal algorithms for the 3-dimensional connected is problem on a parallel processing array, and a circle construction problem on a pyramid cellular automaton.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122417149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1