首页 > 最新文献

Journal of the ACM (JACM)最新文献

英文 中文
Non-Malleable Codes Non-Malleable代码
Pub Date : 2018-04-26 DOI: 10.1145/3178432
Stefan Dziembowski, Krzysztof Pietrzak, D. Wichs
We introduce the notion of “non-malleable codes” which relaxes the notion of error correction and error detection. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely unrelated value. In contrast to error correction and error detection, non-malleability can be achieved for very rich classes of modifications. We construct an efficient code that is non-malleable with respect to modifications that affect each bit of the codeword arbitrarily (i.e., leave it untouched, flip it, or set it to either 0 or 1), but independently of the value of the other bits of the codeword. Using the probabilistic method, we also show a very strong and general statement: there exists a non-malleable code for every “small enough” family F of functions via which codewords can be modified. Although this probabilistic method argument does not directly yield efficient constructions, it gives us efficient non-malleable codes in the random-oracle model for very general classes of tampering functions—e.g., functions where every bit in the tampered codeword can depend arbitrarily on any 99% of the bits in the original codeword. As an application of non-malleable codes, we show that they provide an elegant algorithmic solution to the task of protecting functionalities implemented in hardware (e.g., signature cards) against “tampering attacks.” In such attacks, the secret state of a physical system is tampered, in the hopes that future interaction with the modified system will reveal some secret information. This problem was previously studied in the work of Gennaro et al. in 2004 under the name “algorithmic tamper proof security” (ATP). We show that non-malleable codes can be used to achieve important improvements over the prior work. In particular, we show that any functionality can be made secure against a large class of tampering attacks, simply by encoding the secret state with a non-malleable code while it is stored in memory.
我们引入了“非延展性码”的概念,放宽了错误校正和错误检测的概念。非正式地说,如果修改后的码字中包含的消息是原始消息或完全不相关的值,则代码是不可延展性的。与错误纠正和错误检测相反,对于非常丰富的修改类,可以实现非延展性。我们构造了一个有效的代码,它对于任意影响码字的每个位的修改(即保持不变,翻转它,或将其设置为0或1)是不可延展性的,但独立于码字的其他位的值。使用概率方法,我们还展示了一个非常强大和一般的声明:对于每个“足够小”的函数族F,存在一个不可延展性的代码,通过它可以修改码字。尽管这种概率方法参数不能直接产生有效的结构,但它在随机-oracle模型中为非常一般的篡改函数类提供了有效的非延展性代码。,其中被篡改码字中的每一位都可以任意依赖于原始码字中任意99%的位。作为不可延展性代码的应用,我们展示了它们为保护硬件(例如签名卡)中实现的功能免受“篡改攻击”的任务提供了一种优雅的算法解决方案。在这种攻击中,物理系统的秘密状态被篡改,希望将来与修改后的系统的交互将揭示一些秘密信息。这个问题早在2004年Gennaro等人的工作中就以“算法防篡改安全”(ATP)的名义进行了研究。我们表明,非延展性代码可以用来实现比以前的工作重要的改进。特别是,我们展示了任何功能都可以通过在存储在内存中的时候使用不可延展性代码对秘密状态进行编码来防止大量篡改攻击。
{"title":"Non-Malleable Codes","authors":"Stefan Dziembowski, Krzysztof Pietrzak, D. Wichs","doi":"10.1145/3178432","DOIUrl":"https://doi.org/10.1145/3178432","url":null,"abstract":"We introduce the notion of “non-malleable codes” which relaxes the notion of error correction and error detection. Informally, a code is non-malleable if the message contained in a modified codeword is either the original message, or a completely unrelated value. In contrast to error correction and error detection, non-malleability can be achieved for very rich classes of modifications. We construct an efficient code that is non-malleable with respect to modifications that affect each bit of the codeword arbitrarily (i.e., leave it untouched, flip it, or set it to either 0 or 1), but independently of the value of the other bits of the codeword. Using the probabilistic method, we also show a very strong and general statement: there exists a non-malleable code for every “small enough” family F of functions via which codewords can be modified. Although this probabilistic method argument does not directly yield efficient constructions, it gives us efficient non-malleable codes in the random-oracle model for very general classes of tampering functions—e.g., functions where every bit in the tampered codeword can depend arbitrarily on any 99% of the bits in the original codeword. As an application of non-malleable codes, we show that they provide an elegant algorithmic solution to the task of protecting functionalities implemented in hardware (e.g., signature cards) against “tampering attacks.” In such attacks, the secret state of a physical system is tampered, in the hopes that future interaction with the modified system will reveal some secret information. This problem was previously studied in the work of Gennaro et al. in 2004 under the name “algorithmic tamper proof security” (ATP). We show that non-malleable codes can be used to achieve important improvements over the prior work. In particular, we show that any functionality can be made secure against a large class of tampering attacks, simply by encoding the secret state with a non-malleable code while it is stored in memory.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"67 5","pages":"1 - 32"},"PeriodicalIF":0.0,"publicationDate":"2018-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91477331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Distributed (Δ +1)-Coloring in Sublogarithmic Rounds 分布(Δ +1)-次对数轮的着色
Pub Date : 2018-04-12 DOI: 10.1145/3178120
David G. Harris, Johannes Schneider, Hsin-Hao Su
We give a new randomized distributed algorithm for (Δ +1)-coloring in the LOCAL model, running in O(√ log Δ)+ 2O(√log log n) rounds in a graph of maximum degree Δ. This implies that the (Δ +1)-coloring problem is easier than the maximal independent set problem and the maximal matching problem, due to their lower bounds of Ω(min(√/log n log log n, /log Δ log log Δ)) by Kuhn, Moscibroda, and Wattenhofer [PODC’04]. Our algorithm also extends to list-coloring where the palette of each node contains Δ +1 colors. We extend the set of distributed symmetry-breaking techniques by performing a decomposition of graphs into dense and sparse parts.
在LOCAL模型中,我们给出了一种新的(Δ +1)-着色的随机分布算法,该算法在最大次为Δ的图上运行O(√log Δ)+ 2O(√log log n)轮。这意味着(Δ +1)着色问题比最大独立集问题和最大匹配问题更容易,因为Kuhn、Moscibroda和Wattenhofer [PODC ' 04]给出了它们的下界Ω(min(√/log n log log n, /log Δ log log Δ))。我们的算法还扩展到列表着色,其中每个节点的调色板包含Δ +1种颜色。我们通过将图分解为密集部分和稀疏部分来扩展分布式对称打破技术集。
{"title":"Distributed (Δ +1)-Coloring in Sublogarithmic Rounds","authors":"David G. Harris, Johannes Schneider, Hsin-Hao Su","doi":"10.1145/3178120","DOIUrl":"https://doi.org/10.1145/3178120","url":null,"abstract":"We give a new randomized distributed algorithm for (Δ +1)-coloring in the LOCAL model, running in O(√ log Δ)+ 2O(√log log n) rounds in a graph of maximum degree Δ. This implies that the (Δ +1)-coloring problem is easier than the maximal independent set problem and the maximal matching problem, due to their lower bounds of Ω(min(√/log n log log n, /log Δ log log Δ)) by Kuhn, Moscibroda, and Wattenhofer [PODC’04]. Our algorithm also extends to list-coloring where the palette of each node contains Δ +1 colors. We extend the set of distributed symmetry-breaking techniques by performing a decomposition of graphs into dense and sparse parts.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"17 1","pages":"1 - 21"},"PeriodicalIF":0.0,"publicationDate":"2018-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90836009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Rumor Spreading and Conductance 谣言的传播与行为
Pub Date : 2018-04-12 DOI: 10.1145/3173043
Flavio Chierichetti, George Giakkoupis, Silvio Lattanzi, A. Panconesi
In this article, we study the completion time of the PUSH-PULL variant of rumor spreading, also known as randomized broadcast. We show that if a network has n nodes and conductance φ then, with high probability, PUSH-PULL will deliver the message to all nodes in the graph within O(log n/φ) many communication rounds. This bound is best possible. We also give an alternative proof that the completion time of PUSH-PULL is bounded by a polynomial in log n/φ, based on graph sparsification. Although the resulting asymptotic bound is not optimal, this proof shows an interesting and, at the outset, unexpected connection between rumor spreading and graph sparsification. Finally, we show that if the degrees of the two endpoints of each edge in the network differ by at most a constant factor, then both PUSH and PULL alone attain the optimal completion time of O(log n/φ), with high probability.
在本文中,我们研究了推拉式谣言传播的完成时间,也称为随机广播。我们证明了如果一个网络有n个节点,电导φ,那么推拉很有可能在O(log n/φ)多次通信回合内将消息传递给图中的所有节点。这个边界是最好的。在图稀疏化的基础上,给出了推拉完成时间被log n/φ多项式限定的另一种证明。虽然所得的渐近界不是最优的,但这个证明在谣言传播和图稀疏化之间显示了一个有趣的、意想不到的联系。最后,我们证明了如果网络中每条边的两个端点的度数相差不超过一个常数因子,那么单独PUSH和PULL都有高概率达到最优完成时间O(log n/φ)。
{"title":"Rumor Spreading and Conductance","authors":"Flavio Chierichetti, George Giakkoupis, Silvio Lattanzi, A. Panconesi","doi":"10.1145/3173043","DOIUrl":"https://doi.org/10.1145/3173043","url":null,"abstract":"In this article, we study the completion time of the PUSH-PULL variant of rumor spreading, also known as randomized broadcast. We show that if a network has n nodes and conductance φ then, with high probability, PUSH-PULL will deliver the message to all nodes in the graph within O(log n/φ) many communication rounds. This bound is best possible. We also give an alternative proof that the completion time of PUSH-PULL is bounded by a polynomial in log n/φ, based on graph sparsification. Although the resulting asymptotic bound is not optimal, this proof shows an interesting and, at the outset, unexpected connection between rumor spreading and graph sparsification. Finally, we show that if the degrees of the two endpoints of each edge in the network differ by at most a constant factor, then both PUSH and PULL alone attain the optimal completion time of O(log n/φ), with high probability.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"1 1","pages":"1 - 21"},"PeriodicalIF":0.0,"publicationDate":"2018-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89805951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Invited Article Foreword 特邀文章前言
Pub Date : 2018-03-15 DOI: 10.1145/3186892
É. Tardos
The Invited Article section of this issue consists of the article “Worst-Case Optimal Join Algorithms” by Hung Q. Ngo, Ely Porat, Christopher Ré, and Atri Rudra, which won the best paper award at the 35th Annual ACM SIGMOD/PODS International Conference on Management of Data (PODS’12). We would like to thank the PODS’12 Program Committee for their help in selecting this invited work, and we also thank editor Phokion Kolaitis for handling the paper.
本期特邀文章部分由Hung Q. Ngo, Ely Porat, Christopher r和Atri Rudra的文章“最坏情况下最优连接算法”组成,该文章在第35届ACM SIGMOD/PODS国际数据管理会议(PODS ' 12)上获得最佳论文奖。我们要感谢PODS ' 12 Program Committee在选择这篇受邀作品时的帮助,我们也要感谢编辑Phokion Kolaitis对论文的处理。
{"title":"Invited Article Foreword","authors":"É. Tardos","doi":"10.1145/3186892","DOIUrl":"https://doi.org/10.1145/3186892","url":null,"abstract":"The Invited Article section of this issue consists of the article “Worst-Case Optimal Join Algorithms” by Hung Q. Ngo, Ely Porat, Christopher Ré, and Atri Rudra, which won the best paper award at the 35th Annual ACM SIGMOD/PODS International Conference on Management of Data (PODS’12). We would like to thank the PODS’12 Program Committee for their help in selecting this invited work, and we also thank editor Phokion Kolaitis for handling the paper.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"5 1","pages":"1 - 1"},"PeriodicalIF":0.0,"publicationDate":"2018-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78479905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coin Flipping of Any Constant Bias Implies One-Way Functions 任意常数偏置的抛硬币隐含单向函数
Pub Date : 2018-03-13 DOI: 10.1145/2979676
Itay Berman, Iftach Haitner, Aris Tentes
We show that the existence of a coin-flipping protocol safe against any nontrivial constant bias (e.g., .499) implies the existence of one-way functions. This improves upon a result of Haitner and Omri (FOCS’11), who proved this implication for protocols with bias √ 2−1/2 − o(1) ≈ .207. Unlike the result of Haitner and Omri, our result also holds for weak coin-flipping protocols.
我们证明了对任何非平凡常数偏差(例如,.499)安全的抛硬币协议的存在意味着单向函数的存在。这改进了Haitner和Omri (FOCS ' 11)的结果,他们证明了偏差为√2−1/2−o(1)≈.207的协议的这一意义。与Haitner和Omri的结果不同,我们的结果也适用于弱抛硬币协议。
{"title":"Coin Flipping of Any Constant Bias Implies One-Way Functions","authors":"Itay Berman, Iftach Haitner, Aris Tentes","doi":"10.1145/2979676","DOIUrl":"https://doi.org/10.1145/2979676","url":null,"abstract":"We show that the existence of a coin-flipping protocol safe against any nontrivial constant bias (e.g., .499) implies the existence of one-way functions. This improves upon a result of Haitner and Omri (FOCS’11), who proved this implication for protocols with bias √ 2−1/2 − o(1) ≈ .207. Unlike the result of Haitner and Omri, our result also holds for weak coin-flipping protocols.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"46 1","pages":"1 - 95"},"PeriodicalIF":0.0,"publicationDate":"2018-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84108569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Theory of NP-completeness and Ill-conditioning for Approximate Real Computations 近似实际计算的np完备性和病态条件理论
Pub Date : 2018-03-09 DOI: 10.1145/3321479
G. Malajovich, M. Shub
We develop a complexity theory for approximate real computations. We first produce a theory for exact computations but with condition numbers. The input size depends on a condition number, which is not assumed known by the machine. The theory admits deterministic and nondeterministic polynomial time recognizable problems. We prove that P is not NP in this theory if and only if P is not NP in the BSS theory over the reals. Then we develop a theory with weak and strong approximate computations. This theory is intended to model actual numerical computations that are usually performed in floating point arithmetic. It admits classes P and NP and also an NP-complete problem. We relate the P vs. NP question in this new theory to the classical P vs. NP problem.
我们发展了一个近似实际计算的复杂性理论。我们首先提出了一个精确计算的理论,但有条件数。输入的大小取决于一个条件数,而这个条件数是机器不知道的。该理论承认确定性和非确定性多项式时间可识别问题。当且仅当P在实数上的BSS理论中不是NP时,我们证明了P在这个理论中不是NP。然后,我们发展了一个具有弱近似计算和强近似计算的理论。该理论旨在模拟通常在浮点运算中执行的实际数值计算。它承认P类和NP类,也是一个NP完全问题。我们将这个新理论中的P与NP问题与经典的P与NP问题联系起来。
{"title":"A Theory of NP-completeness and Ill-conditioning for Approximate Real Computations","authors":"G. Malajovich, M. Shub","doi":"10.1145/3321479","DOIUrl":"https://doi.org/10.1145/3321479","url":null,"abstract":"We develop a complexity theory for approximate real computations. We first produce a theory for exact computations but with condition numbers. The input size depends on a condition number, which is not assumed known by the machine. The theory admits deterministic and nondeterministic polynomial time recognizable problems. We prove that P is not NP in this theory if and only if P is not NP in the BSS theory over the reals. Then we develop a theory with weak and strong approximate computations. This theory is intended to model actual numerical computations that are usually performed in floating point arithmetic. It admits classes P and NP and also an NP-complete problem. We relate the P vs. NP question in this new theory to the classical P vs. NP problem.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"19 1","pages":"1 - 38"},"PeriodicalIF":0.0,"publicationDate":"2018-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77975052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Invited Article Foreword 特邀文章前言
Pub Date : 2018-03-01 DOI: 10.1145/3186890
É. Tardos
The Invited Article section of this issue consists of the article “Analysing Snapshot Isolation” by Andrea Cerone and Alexey Gotsman, which won the best paper award at the 35th Annual ACM Symposium on Principles of Distributed Computing (PODC’16). We would like to thank the PODC’16 Program Committee for their help in selecting this invited work, and we also thank editor Rachid Guerraoui for handling the paper.
本期的特邀文章部分由Andrea Cerone和Alexey Gotsman的文章“分析快照隔离”组成,该文章在第35届ACM分布式计算原理研讨会(PODC ' 16)上获得了最佳论文奖。我们要感谢PODC ' 16项目委员会在选择这一受邀作品方面的帮助,我们也要感谢编辑Rachid Guerraoui对论文的处理。
{"title":"Invited Article Foreword","authors":"É. Tardos","doi":"10.1145/3186890","DOIUrl":"https://doi.org/10.1145/3186890","url":null,"abstract":"The Invited Article section of this issue consists of the article “Analysing Snapshot Isolation” by Andrea Cerone and Alexey Gotsman, which won the best paper award at the 35th Annual ACM Symposium on Principles of Distributed Computing (PODC’16). We would like to thank the PODC’16 Program Committee for their help in selecting this invited work, and we also thank editor Rachid Guerraoui for handling the paper.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"71 1","pages":"1 - 1"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79364151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Freezing Threshold for k-Colourings of a Random Graph 随机图k-着色的冻结阈值
Pub Date : 2018-02-16 DOI: 10.1145/3034781
Michael Molloy
We determine the exact value of the freezing threshold, rfk, for k-colourings of a random graph when k≥ 14. We prove that for random graphs with density above rfk, almost every colouring is such that a linear number of vertices are frozen, meaning that their colour cannot be changed by a sequence of alterations whereby we change the colours of o(n) vertices at a time, always obtaining another proper colouring. When the density is below rfk, then almost every colouring is such that every vertex can be changed by a sequence of alterations where we change O(log n) vertices at a time. Frozen vertices are a key part of the clustering phenomena discovered using methods from statistical physics. The value of the freezing threshold was previously determined by the nonrigorous cavity method.
当k≥14时,我们确定随机图的k个着色的冻结阈值rfk的确切值。我们证明了对于密度大于rfk的随机图,几乎每一种颜色都是线性数量的顶点被冻结的,这意味着它们的颜色不能通过一系列的改变来改变,即我们一次改变o(n)个顶点的颜色,总是获得另一种适当的颜色。当密度低于rfk时,几乎所有的着色都是这样的,每个顶点都可以通过一系列的改变来改变,我们一次改变O(log n)个顶点。冻结顶点是使用统计物理方法发现的聚类现象的关键部分。冻结阈值以前是用非严格空腔法确定的。
{"title":"The Freezing Threshold for k-Colourings of a Random Graph","authors":"Michael Molloy","doi":"10.1145/3034781","DOIUrl":"https://doi.org/10.1145/3034781","url":null,"abstract":"We determine the exact value of the freezing threshold, rfk, for k-colourings of a random graph when k≥ 14. We prove that for random graphs with density above rfk, almost every colouring is such that a linear number of vertices are frozen, meaning that their colour cannot be changed by a sequence of alterations whereby we change the colours of o(n) vertices at a time, always obtaining another proper colouring. When the density is below rfk, then almost every colouring is such that every vertex can be changed by a sequence of alterations where we change O(log n) vertices at a time. Frozen vertices are a key part of the clustering phenomena discovered using methods from statistical physics. The value of the freezing threshold was previously determined by the nonrigorous cavity method.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"34 1","pages":"1 - 62"},"PeriodicalIF":0.0,"publicationDate":"2018-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80773200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Fair Enough 很好
Pub Date : 2018-02-06 DOI: 10.1145/3140756
David Kurokawa, A. Procaccia, Junxing Wang
We consider the problem of fairly allocating indivisible goods, focusing on a recently introduced notion of fairness called maximin share guarantee: each player’s value for his allocation should be at least as high as what he can guarantee by dividing the items into as many bundles as there are players and receiving his least desirable bundle. Assuming additive valuation functions, we show that such allocations may not exist, but allocations guaranteeing each player 2/3 of the above value always exist. These theoretical results have direct practical implications.
我们考虑公平分配不可分割物品的问题,重点关注最近引入的一个公平概念,即最大化份额保证:每个玩家的分配价值应该至少与他通过将物品分成尽可能多的捆绑包并获得他最不希望的捆绑包所能保证的价值一样高。假设附加估值函数,我们证明这样的分配可能不存在,但保证每个参与者上述价值的2/3的分配总是存在的。这些理论结果具有直接的实际意义。
{"title":"Fair Enough","authors":"David Kurokawa, A. Procaccia, Junxing Wang","doi":"10.1145/3140756","DOIUrl":"https://doi.org/10.1145/3140756","url":null,"abstract":"We consider the problem of fairly allocating indivisible goods, focusing on a recently introduced notion of fairness called maximin share guarantee: each player’s value for his allocation should be at least as high as what he can guarantee by dividing the items into as many bundles as there are players and receiving his least desirable bundle. Assuming additive valuation functions, we show that such allocations may not exist, but allocations guaranteeing each player 2/3 of the above value always exist. These theoretical results have direct practical implications.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"19 1","pages":"1 - 27"},"PeriodicalIF":0.0,"publicationDate":"2018-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90879583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Analysing Snapshot Isolation 快照隔离分析
Pub Date : 2018-01-31 DOI: 10.1145/3152396
A. Cerone, Alexey Gotsman
Snapshot isolation (SI) is a widely used consistency model for transaction processing, implemented by most major databases and some of transactional memory systems. Unfortunately, its classical definition is given in a low-level operational way, by an idealised concurrency-control algorithm, and this complicates reasoning about the behaviour of applications running under SI. We give an alternative specification to SI that characterises it in terms of transactional dependency graphs of Adya et al., generalising serialisation graphs. Unlike previous work, our characterisation does not require adding additional information to dependency graphs about start and commit points of transactions. We then exploit our specification to obtain two kinds of static analyses. The first one checks when a set of transactions running under SI can be chopped into smaller pieces without introducing new behaviours, to improve performance. The other analysis checks whether a set of transactions running under a weakening of SI behaves the same as when running under SI.
快照隔离(Snapshot isolation, SI)是一种广泛用于事务处理的一致性模型,由大多数主要数据库和一些事务性内存系统实现。不幸的是,它的经典定义是通过理想化的并发控制算法以一种低级操作方式给出的,这使得在SI下运行的应用程序的行为推理变得复杂。我们给出了SI的另一种规范,该规范根据Adya等人的事务依赖图来描述SI,概括序列化图。与以前的工作不同,我们的特征描述不需要在事务的开始点和提交点的依赖图中添加额外的信息。然后我们利用我们的规范来获得两种类型的静态分析。第一个检查在SI下运行的一组事务何时可以在不引入新行为的情况下被分割成更小的部分,以提高性能。另一个分析检查在弱化SI下运行的一组事务的行为是否与在SI下运行时相同。
{"title":"Analysing Snapshot Isolation","authors":"A. Cerone, Alexey Gotsman","doi":"10.1145/3152396","DOIUrl":"https://doi.org/10.1145/3152396","url":null,"abstract":"Snapshot isolation (SI) is a widely used consistency model for transaction processing, implemented by most major databases and some of transactional memory systems. Unfortunately, its classical definition is given in a low-level operational way, by an idealised concurrency-control algorithm, and this complicates reasoning about the behaviour of applications running under SI. We give an alternative specification to SI that characterises it in terms of transactional dependency graphs of Adya et al., generalising serialisation graphs. Unlike previous work, our characterisation does not require adding additional information to dependency graphs about start and commit points of transactions. We then exploit our specification to obtain two kinds of static analyses. The first one checks when a set of transactions running under SI can be chopped into smaller pieces without introducing new behaviours, to improve performance. The other analysis checks whether a set of transactions running under a weakening of SI behaves the same as when running under SI.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"10 1","pages":"1 - 41"},"PeriodicalIF":0.0,"publicationDate":"2018-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72778914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Journal of the ACM (JACM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1