首页 > 最新文献

23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)最新文献

英文 中文
Why and how to establish a private code on a public network 为什么以及如何在公共网络上建立私有代码
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.100
S. Goldwasser, S. Micali, Po Tong
The Diffie and Hellman model of a Public Key Cryptosystem has received much attention as a way to provide secure network communication. In this paper, we show that the original Diffie and Hellman model does not guarantee security against other users in the system. It is shown how users, which are more powerful adversarys than the traditionally considered passive eavesdroppers, can decrypt other users messages, in implementations of Public Key Cryptosystem using the RSA function, the Rabin function and the Goldwasser&Micali scheme. This weakness depends on the bit security of the encryption function. For the RSA (Rabin) function we show that computing, from the cyphertext, specific bits of the cleartext, is polynomially equivalent to inverting the function (factoring). As for many message spaces, this bit can be easily found out by communicating, the system is insecure. We present a modification of the Diffie and Hellman model of a Public-Key Cryptosystem, and one concrete implementation of the modified model. For this implementation, the difficulty of extracting partial information about clear text messages from their encoding, by eavesdroppers, users or by Chosen Cyphertext Attacks is proved equivalent to the computational difficulty of factoring. Such equivalence proof holds in a very strong probabilistic sense and for any message space. No additional assumptions, such as the existence of a perfect signature scheme, or a trusted authentication center, are made.
公钥密码系统的Diffie和Hellman模型作为一种提供安全网络通信的方法受到了广泛的关注。在本文中,我们证明了原始的Diffie和Hellman模型不能保证对系统中其他用户的安全性。在使用RSA函数、Rabin函数和Goldwasser&Micali方案的公钥密码系统实现中,显示了比传统认为的被动窃听者更强大的对手用户如何解密其他用户的消息。这个弱点取决于加密功能的位安全性。对于RSA (Rabin)函数,我们证明了计算,从密文,明文的特定位,多项式等效于函数的反转(因式分解)。对于很多消息空间来说,这个位很容易通过通信被发现,系统是不安全的。我们提出了对公钥密码系统的Diffie和Hellman模型的一个修改,并给出了修改模型的一个具体实现。对于这种实现,通过窃听者,用户或选择的密文攻击从其编码中提取有关明文消息的部分信息的难度被证明等同于分解的计算难度。这种等价证明在很强的概率意义上和对任何消息空间都成立。没有额外的假设,比如存在一个完美的签名方案,或者一个可信的身份验证中心。
{"title":"Why and how to establish a private code on a public network","authors":"S. Goldwasser, S. Micali, Po Tong","doi":"10.1109/SFCS.1982.100","DOIUrl":"https://doi.org/10.1109/SFCS.1982.100","url":null,"abstract":"The Diffie and Hellman model of a Public Key Cryptosystem has received much attention as a way to provide secure network communication. In this paper, we show that the original Diffie and Hellman model does not guarantee security against other users in the system. It is shown how users, which are more powerful adversarys than the traditionally considered passive eavesdroppers, can decrypt other users messages, in implementations of Public Key Cryptosystem using the RSA function, the Rabin function and the Goldwasser&Micali scheme. This weakness depends on the bit security of the encryption function. For the RSA (Rabin) function we show that computing, from the cyphertext, specific bits of the cleartext, is polynomially equivalent to inverting the function (factoring). As for many message spaces, this bit can be easily found out by communicating, the system is insecure. We present a modification of the Diffie and Hellman model of a Public-Key Cryptosystem, and one concrete implementation of the modified model. For this implementation, the difficulty of extracting partial information about clear text messages from their encoding, by eavesdroppers, users or by Chosen Cyphertext Attacks is proved equivalent to the computational difficulty of factoring. Such equivalence proof holds in a very strong probabilistic sense and for any message space. No additional assumptions, such as the existence of a perfect signature scheme, or a trusted authentication center, are made.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
On decomposition of relational databases 论关系数据库的分解
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.75
Moshe Y. Vardi
A central issue in relational database theory is that of decomposition. It has been agreed that decompositions should be injective, so as not to lose information, and surjective, so they decompose a relation into independent components. Injectiveness and surjectiveness are in general second-order notions. We show here how to express these notions in a first-order manner, assuming that we are dealing only with first-order constraints. As a consequence we get that the reconstruction map, which is the inverse to the decomposition map, is also first-order, but is not necessarily the natural join. This result is derived by applying Beth's Definability Theorem from model theory. For the case that the constraints used are implicational dependencies, we derive the exact syntactic form of the reconstruction map, and show that if the decomposition map is both injective and surjective then the reconstruction map is the natural join.
关系数据库理论中的一个中心问题是分解问题。人们一致认为分解应该是内射的,这样就不会丢失信息;分解应该是满射的,这样就可以把关系分解成独立的组成部分。单射性和满射性一般都是二阶概念。我们在这里展示如何以一阶方式表达这些概念,假设我们只处理一阶约束。因此我们得到重构映射,它是分解映射的逆,也是一阶的,但不一定是自然连接。这一结果是应用模型理论中的贝丝可定义性定理得到的。对于使用的约束是隐含依赖的情况,我们推导了重构映射的精确语法形式,并证明了如果分解映射既是内射又是满射,那么重构映射就是自然连接。
{"title":"On decomposition of relational databases","authors":"Moshe Y. Vardi","doi":"10.1109/SFCS.1982.75","DOIUrl":"https://doi.org/10.1109/SFCS.1982.75","url":null,"abstract":"A central issue in relational database theory is that of decomposition. It has been agreed that decompositions should be injective, so as not to lose information, and surjective, so they decompose a relation into independent components. Injectiveness and surjectiveness are in general second-order notions. We show here how to express these notions in a first-order manner, assuming that we are dealing only with first-order constraints. As a consequence we get that the reconstruction map, which is the inverse to the decomposition map, is also first-order, but is not necessarily the natural join. This result is derived by applying Beth's Definability Theorem from model theory. For the case that the constraints used are implicational dependencies, we derive the exact syntactic form of the reconstruction map, and show that if the decomposition map is both injective and surjective then the reconstruction map is the natural join.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129382963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On the movement of robot arms in 2-dimensional bounded regions 机器人手臂在二维有界区域中的运动
J. Hopcroft, D. Joseph, S. Whitesides
The classical mover's problem is the following: can a rigid object in 3-dimensional space be moved from one given position to another while avoiding obstacles? It is known that a more general version of this problem involving objects with movable joints is PSPACE-complete, even for a simple tree-like structure. In this paper, we investigate a 2-dimensional mover's problem in which the object being moved is a robot arm with an arbitrary number of joints. We reduce the mover's problem for arms constrained to move within bounded regions whose boundaries are made up of straight lines to the mover's problem for a more complex linkage that is not constrained. We prove that the latter problem is PSPACE-hard even in 2-dimensional space and then turn to special cases of the mover's problem for arms. In particular, we give a polynomial time algorithm for moving an arm confined within a circle from one given configuration to another. We also give a polynomial time algorithm for moving the arm from its initial position to a position in which the end of the arm reaches a given point within the circle.
经典的移动问题是:三维空间中的刚性物体能否在避开障碍物的情况下从一个给定位置移动到另一个给定位置?众所周知,涉及具有活动关节的对象的这个问题的更一般的版本是pspace完全的,即使对于简单的树状结构也是如此。本文研究了一个被移动物体为具有任意数目关节的机械臂的二维移动问题。我们将被约束在边界由直线组成的有界区域内运动的臂的移动问题简化为不受约束的更复杂连杆的移动问题。我们证明了后一个问题即使在二维空间中也是PSPACE-hard的,然后讨论了臂的移动问题的特殊情况。特别地,我们给出了一个多项式时间算法来移动一个被限制在一个圆内的手臂从一个给定的构型到另一个。我们还给出了一个多项式时间算法,用于将手臂从其初始位置移动到手臂末端到达圆内给定点的位置。
{"title":"On the movement of robot arms in 2-dimensional bounded regions","authors":"J. Hopcroft, D. Joseph, S. Whitesides","doi":"10.1137/0214025","DOIUrl":"https://doi.org/10.1137/0214025","url":null,"abstract":"The classical mover's problem is the following: can a rigid object in 3-dimensional space be moved from one given position to another while avoiding obstacles? It is known that a more general version of this problem involving objects with movable joints is PSPACE-complete, even for a simple tree-like structure. In this paper, we investigate a 2-dimensional mover's problem in which the object being moved is a robot arm with an arbitrary number of joints. We reduce the mover's problem for arms constrained to move within bounded regions whose boundaries are made up of straight lines to the mover's problem for a more complex linkage that is not constrained. We prove that the latter problem is PSPACE-hard even in 2-dimensional space and then turn to special cases of the mover's problem for arms. In particular, we give a polynomial time algorithm for moving an arm confined within a circle from one given configuration to another. We also give a polynomial time algorithm for moving the arm from its initial position to a position in which the end of the arm reaches a given point within the circle.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122883552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
Generic transformation of data structures 数据结构的通用转换
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.21
C. Ó'Dúnlaing, C. Yap
We consider the notion of a (data) format where each format defines a family of data structures. These formats arose from the theory of databases. Previous works have investigated the notion of generic transformations of data structures between formats. We give a novel grouptheoretic view of genericity which unifies the original approaches of Hull-Yap and Aho-Ullman. Among the results are: A necessary and sufficient condition for the existence of generic embeddings; the fact that digraphs cannot be generically embedded in hypergraphs; the striking fact that there is no hypergraph on more than two vertices with the alternating group as its automorphism group, and combinatorial techniques for counting structures with a prescribed automorphism group.
我们考虑(数据)格式的概念,其中每种格式定义了一系列数据结构。这些格式源于数据库理论。以前的工作已经研究了格式之间数据结构的通用转换的概念。结合Hull-Yap和Aho-Ullman的方法,提出了一种新的群论泛型观点。结果包括:一般嵌入存在的充分必要条件;有向图不能一般嵌入超图的事实;在两个以上顶点上不存在以交替群为自同构群的超图的惊人事实,以及用规定自同构群计数结构的组合技术。
{"title":"Generic transformation of data structures","authors":"C. Ó'Dúnlaing, C. Yap","doi":"10.1109/SFCS.1982.21","DOIUrl":"https://doi.org/10.1109/SFCS.1982.21","url":null,"abstract":"We consider the notion of a (data) format where each format defines a family of data structures. These formats arose from the theory of databases. Previous works have investigated the notion of generic transformations of data structures between formats. We give a novel grouptheoretic view of genericity which unifies the original approaches of Hull-Yap and Aho-Ullman. Among the results are: A necessary and sufficient condition for the existence of generic embeddings; the fact that digraphs cannot be generically embedded in hypergraphs; the striking fact that there is no hypergraph on more than two vertices with the alternating group as its automorphism group, and combinatorial techniques for counting structures with a prescribed automorphism group.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the program size of perfect and universal hash functions 关于程序大小的完美和通用哈希函数
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.80
K. Mehlhorn
We address the question of program size of of perfect and universal hash functions. We prove matching upper and lower bounds (up to constant factors) on program size. Furthermore, we show that minimum or nearly minimum size programs can be found efficiently. In addition, these (near) minimum size programs have time complexity at most O(log* N) where N is the size of the universe in the case of perfect hashing, and time complexity 0(1) in the case of universal hashing. Thus for universal hashing programs of minimal size and minimal time complexity have been found.
我们解决了完美和通用哈希函数的程序大小问题。我们证明了在程序大小上匹配上界和下界(直到常数因子)。此外,我们还证明了可以有效地找到最小或接近最小大小的程序。此外,这些(接近)最小大小的程序的时间复杂度最多为O(log* N)(在完全哈希的情况下,N是宇宙的大小),而在通用哈希的情况下,时间复杂度为0(1)。因此,对于通用哈希程序的最小尺寸和最小的时间复杂度已经被发现。
{"title":"On the program size of perfect and universal hash functions","authors":"K. Mehlhorn","doi":"10.1109/SFCS.1982.80","DOIUrl":"https://doi.org/10.1109/SFCS.1982.80","url":null,"abstract":"We address the question of program size of of perfect and universal hash functions. We prove matching upper and lower bounds (up to constant factors) on program size. Furthermore, we show that minimum or nearly minimum size programs can be found efficiently. In addition, these (near) minimum size programs have time complexity at most O(log* N) where N is the size of the universe in the case of perfect hashing, and time complexity 0(1) in the case of universal hashing. Thus for universal hashing programs of minimal size and minimal time complexity have been found.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 106
A complexity theory for unbounded fan-in parallelism 无界扇形并行的复杂度理论
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.3
A. K. Chandra, L. Stockmeyer, U. Vishkin
A complexity theory for unbounded fan-in parallelism is developed where the complexity measure is the simultaneous measure (number of processors, parallel time). Two models of unbounded fan-in parallelism are (1) parallel random access machines that allow simultaneous reading from or writing to the same common memory location, and (2) circuits containing AND's, OR's and NOT's with no bound placed on the fan-in of gates. It is shown that these models can simulate one another with the number of processors preserved to within a polynomial and parallel time preserved to within a constant factor. Reducibilities that preserve the measure in this sense are defined and several reducibilities and equivalences among problems are given. New upper bounds on the (unbounded fan-in) circuit complexity of symmetric Boolean functions are proved.
提出了一种无界扇形并行的复杂性理论,其中复杂性度量为同时度量(处理器数、并行时间)。无边界扇入并行的两种模型是:(1)并行随机存取机,允许同时从相同的公共存储器位置读取或写入,以及(2)包含and, or和NOT的电路,在门的扇入上没有边界。结果表明,这些模型可以在处理器数量保持在一个多项式内,并行时间保持在一个常数因子内的情况下相互模拟。定义了在这种意义上保持测度的可约性,并给出了若干问题间的可约性和等价性。证明了对称布尔函数(无界扇入)电路复杂度的新上界。
{"title":"A complexity theory for unbounded fan-in parallelism","authors":"A. K. Chandra, L. Stockmeyer, U. Vishkin","doi":"10.1109/SFCS.1982.3","DOIUrl":"https://doi.org/10.1109/SFCS.1982.3","url":null,"abstract":"A complexity theory for unbounded fan-in parallelism is developed where the complexity measure is the simultaneous measure (number of processors, parallel time). Two models of unbounded fan-in parallelism are (1) parallel random access machines that allow simultaneous reading from or writing to the same common memory location, and (2) circuits containing AND's, OR's and NOT's with no bound placed on the fan-in of gates. It is shown that these models can simulate one another with the number of processors preserved to within a polynomial and parallel time preserved to within a constant factor. Reducibilities that preserve the measure in this sense are defined and several reducibilities and equivalences among problems are given. New upper bounds on the (unbounded fan-in) circuit complexity of symmetric Boolean functions are proved.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116843299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A temporal logic to deal with fairness in transition systems 在过渡系统中处理公平性的时间逻辑
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.57
J. Queille, J. Sifakis
In this paper, we propose a notion of fairness for transition systems and a logic for proving properties under the fairness assumption corresponding to this notion. We consider that the concept of fairness which is useful is "fair reachability" of a given set of states P in a system, i.e. reachability of states of P when considering only the computations such that if, during their execution, reaching states of P is possible infinitely often, then states of P are visited infinitely often. This definition of fairness suggests the introduction of a branching time logic FCL, the temporal operators of which express, for a given set of states P, the modalities "it is possible that P" and "it is inevitable that P" by considering fair reachability of P. The main result is that, given a transition system S and a formula f of FCL expressing some property of S under the assumption of fairness, there exists a formula f′ belonging to a branching time logic CL such that : f is valid for S in FCL iff f′ is valid for S in CL. This result shows that proving a property under the assumption of fairness is equivalent to proving some other property without this assumption and that the study of FCL can be made via the "unfair" logic CL, easier to study and for which several results already exist.
在本文中,我们提出了一个过渡系统的公平性概念,并给出了一个证明与此概念对应的公平性假设下的性质的逻辑。我们认为公平性的有用概念是系统中一组给定状态P的“公平可达性”,即当只考虑这样的计算时,如果在它们的执行过程中,达到P的状态是可能无限频繁的,那么P的状态被访问的次数是无限频繁的。公平的定义表明引入分支逻辑FCL,颞运营商表示,对于一个给定的一组国家P的形式“P”可能,“这是不可避免的,P”通过考虑公平可达性的主要结果是,给定一个过渡系统和一个公式f (FCL表达一些财产的公平的前提下,存在一个公式f '属于分支逻辑CL这样:f对CL中的S有效,f '对CL中的S有效。这一结果表明,在公平假设下证明一个性质等同于在没有这个假设的情况下证明其他一些性质,并且可以通过“不公平”逻辑CL来研究FCL,它更容易研究,并且已经有几个结果。
{"title":"A temporal logic to deal with fairness in transition systems","authors":"J. Queille, J. Sifakis","doi":"10.1109/SFCS.1982.57","DOIUrl":"https://doi.org/10.1109/SFCS.1982.57","url":null,"abstract":"In this paper, we propose a notion of fairness for transition systems and a logic for proving properties under the fairness assumption corresponding to this notion. We consider that the concept of fairness which is useful is \"fair reachability\" of a given set of states P in a system, i.e. reachability of states of P when considering only the computations such that if, during their execution, reaching states of P is possible infinitely often, then states of P are visited infinitely often. This definition of fairness suggests the introduction of a branching time logic FCL, the temporal operators of which express, for a given set of states P, the modalities \"it is possible that P\" and \"it is inevitable that P\" by considering fair reachability of P. The main result is that, given a transition system S and a formula f of FCL expressing some property of S under the assumption of fairness, there exists a formula f′ belonging to a branching time logic CL such that : f is valid for S in FCL iff f′ is valid for S in CL. This result shows that proving a property under the assumption of fairness is equivalent to proving some other property without this assumption and that the study of FCL can be made via the \"unfair\" logic CL, easier to study and for which several results already exist.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"21 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116683371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Inferring a sequence generated by a linear congruence 推断由线性同余产生的序列
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.73
Joan B. Plumstead
Suppose it is known that {X0, X1,...,Xn} is produced by a pseudo-random number generator of the form Xi+1 = aXi + b mod m, but a, b, and m are unknown. Can one efficiently predict the remainder of the sequence with knowledge of only a few elements from that sequence? This question is answered in the affirmative and an algorithm is given.
假设已知{X0, X1,…一个人仅仅知道序列中的几个元素,就能有效地预测序列的剩余部分吗?对这个问题给出了肯定的回答,并给出了算法。
{"title":"Inferring a sequence generated by a linear congruence","authors":"Joan B. Plumstead","doi":"10.1109/SFCS.1982.73","DOIUrl":"https://doi.org/10.1109/SFCS.1982.73","url":null,"abstract":"Suppose it is known that {X<sub>0</sub>, X<sub>1</sub>,...,X<sub>n</sub>} is produced by a pseudo-random number generator of the form X<sub>i+1</sub> = aX<sub>i</sub> + b mod m, but a, b, and m are unknown. Can one efficiently predict the remainder of the sequence with knowledge of only a few elements from that sequence? This question is answered in the affirmative and an algorithm is given.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114335439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Three layers are enough 三层就够了
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.47
F. Preparata, W. Lipski
In this paper we show that any channel routing problem of density d involving two-terminal nets can always be solved in the knock-knee mode in a channel of width equal the density d with three conducting layers. An algorithm is described which produces a layout of n nets with the following properties: (i) it has minimal width d; (ii) it can be realized with three layers; (iii) it has at most 3n vias; (iv) any two wires share at most four grid points.
本文证明了在具有三导电层的宽度等于密度d的沟道中,任何涉及两端网的密度d的沟道布线问题都能以碰膝模式得到解决。描述了一种算法,该算法产生n个具有以下属性的网络布局:(i)它具有最小宽度d;(ii)可分三层实现;(三)最多有3n个通孔;(iv)任何两条电线共用最多四个栅格点。
{"title":"Three layers are enough","authors":"F. Preparata, W. Lipski","doi":"10.1109/SFCS.1982.47","DOIUrl":"https://doi.org/10.1109/SFCS.1982.47","url":null,"abstract":"In this paper we show that any channel routing problem of density d involving two-terminal nets can always be solved in the knock-knee mode in a channel of width equal the density d with three conducting layers. An algorithm is described which produces a layout of n nets with the following properties: (i) it has minimal width d; (ii) it can be realized with three layers; (iii) it has at most 3n vias; (iv) any two wires share at most four grid points.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A theorem on polygon cutting with applications 多边形切割的一个定理及其应用
Pub Date : 1982-11-03 DOI: 10.1109/SFCS.1982.58
B. Chazelle
Let P be a simple polygon with N vertices, each being assigned a weight ∈ {0,1}, and let C, the weight of P, be the added weight of all vertices. We prove that it is possible, in O(N) time, to find two vertices a,b in P, such that the segment ab lies entirely inside the polygon P and partitions it into two polygons, each with a weight not exceeding 2C/3. This computation assumes that all the vertices have been sorted along some axis, which can be done in O(Nlog N) time. We use this result to derive a number of efficient divide-and-conquer algorithms for: 1. Triangulating an N-gon in O(Nlog N) time. 2. Decomposing an N-gon into (few) convex pieces in O(Nlog N) time. 3. Given an O(Nlog N) preprocessing, computing the shortest distance between two arbitrary points inside an N-gon (i.e., the internal distance), in O(N) time. 4. Computing the longest internal path in an N-gon in O(N2) time. In all cases, the algorithms achieve significant improvements over previously known methods, either by displaying better performance or by gaining in simplicity. In particular, the best algorithms for Problems 2,3,4, known so far, performed respectively in O(N2), O(N2), and O(N4) time.
设P是一个有N个顶点的简单多边形,每个顶点赋一个权值∈{0,1},设P的权值C为所有顶点相加的权值。我们证明有可能在O(N)时间内,在P中找到两个顶点a,b,使得线段ab完全位于多边形P内,并将其划分为两个多边形,每个多边形的权值不超过2C/3。这个计算假设所有的顶点都沿着某个轴排序,这可以在O(Nlog N)时间内完成。我们利用这个结果推导出一些高效的分治算法:1。在O(Nlog N)时间内对N-gon进行三角测量。2. 在O(Nlog N)时间内将N-gon分解为(几个)个凸块。3.给定一个O(Nlog N)的预处理,在O(N)时间内计算N-gon内任意两个点之间的最短距离(即内部距离)。4. 在O(N2)时间内计算N-gon中最长的内部路径。在所有情况下,这些算法都比以前已知的方法有了显著的改进,要么表现出更好的性能,要么变得更简单。特别是,目前已知的问题2,3,4的最佳算法分别在O(N2), O(N2)和O(N4)时间内执行。
{"title":"A theorem on polygon cutting with applications","authors":"B. Chazelle","doi":"10.1109/SFCS.1982.58","DOIUrl":"https://doi.org/10.1109/SFCS.1982.58","url":null,"abstract":"Let P be a simple polygon with N vertices, each being assigned a weight ∈ {0,1}, and let C, the weight of P, be the added weight of all vertices. We prove that it is possible, in O(N) time, to find two vertices a,b in P, such that the segment ab lies entirely inside the polygon P and partitions it into two polygons, each with a weight not exceeding 2C/3. This computation assumes that all the vertices have been sorted along some axis, which can be done in O(Nlog N) time. We use this result to derive a number of efficient divide-and-conquer algorithms for: 1. Triangulating an N-gon in O(Nlog N) time. 2. Decomposing an N-gon into (few) convex pieces in O(Nlog N) time. 3. Given an O(Nlog N) preprocessing, computing the shortest distance between two arbitrary points inside an N-gon (i.e., the internal distance), in O(N) time. 4. Computing the longest internal path in an N-gon in O(N2) time. In all cases, the algorithms achieve significant improvements over previously known methods, either by displaying better performance or by gaining in simplicity. In particular, the best algorithms for Problems 2,3,4, known so far, performed respectively in O(N2), O(N2), and O(N4) time.","PeriodicalId":127919,"journal":{"name":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1982-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128977132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 289
期刊
23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1