首页 > 最新文献

Proceedings of the eleventh annual ACM symposium on Theory of computing最新文献

英文 中文
On the expressive power of Dynamic Logic (Preliminary Report) 论动态逻辑的表达能力(初步报告)
Pub Date : 1979-04-30 DOI: 10.1145/800135.804410
A. Meyer, Karl Winklmann
We show that “looping” of while-programs can be expressed in Regular First-Order Dynamic Logic, disproving a conjecture made in [Harel-Pratt 1978]. In addition we show that the expressive power of quantifier-free Dynamic Logic increases when nondeterminism is introduced in the programs that are part of formulae of Dynamic Logic. Allowing assignments of random values to variables increases the expressive power even further.
我们证明while程序的“循环”可以用正则一阶动态逻辑表示,反驳了[Harel-Pratt 1978]中的一个猜想。此外,我们还证明了在作为动态逻辑公式一部分的程序中引入不确定性时,无量词动态逻辑的表达能力增强。允许将随机值赋值给变量进一步增强了表达能力。
{"title":"On the expressive power of Dynamic Logic (Preliminary Report)","authors":"A. Meyer, Karl Winklmann","doi":"10.1145/800135.804410","DOIUrl":"https://doi.org/10.1145/800135.804410","url":null,"abstract":"We show that “looping” of while-programs can be expressed in Regular First-Order Dynamic Logic, disproving a conjecture made in [Harel-Pratt 1978]. In addition we show that the expressive power of quantifier-free Dynamic Logic increases when nondeterminism is introduced in the programs that are part of formulae of Dynamic Logic. Allowing assignments of random values to variables increases the expressive power even further.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129307800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Minimum covers in the relational database model (Extended Abstract) 关系数据库模型的最小覆盖范围(扩展摘要)
Pub Date : 1979-04-30 DOI: 10.1145/800135.804425
D. Maier
Numerous algorithms concerning relational databases use a cover for a set of functional dependencies as all or part of their input. Examples are Bernstein and Beeri's synthesis algorithm [BB] and the tableau modification algorithm of Aho, Beeri, and Ullman [ABU]. The performance of these algorithms may depend both on the number of functional dependencies in the cover and the total size of the cover. Starting with a smaller cover will make such algorithms run faster. After Bernstein [Be75], many researchers believe the problem of finding a minimum cover is NP-complete. We show that minimum covers can be found in polynomial time, using the notion of direct determination. The proof details the structure of minimum covers, refining the structure Bernstein and Beeri show for non-redundant covers [BB]. The kernel algorithm of Lewis, Sekino, and Ting [LST] is improved using these results.
许多涉及关系数据库的算法都使用一组功能依赖项作为其全部或部分输入。例如Bernstein和Beeri的合成算法[BB]和Aho, Beeri和Ullman的表格修改算法[ABU]。这些算法的性能可能取决于覆盖中功能依赖项的数量和覆盖的总大小。从较小的覆盖范围开始将使这种算法运行得更快。在Bernstein [Be75]之后,许多研究者认为寻找最小覆盖的问题是np完全的。我们证明了最小覆盖可以在多项式时间内找到,使用直接确定的概念。证明详细说明了最小覆盖层的结构,改进了Bernstein和Beeri给出的非冗余覆盖层的结构[BB]。利用这些结果改进了Lewis, Sekino, and Ting [LST]的核算法。
{"title":"Minimum covers in the relational database model (Extended Abstract)","authors":"D. Maier","doi":"10.1145/800135.804425","DOIUrl":"https://doi.org/10.1145/800135.804425","url":null,"abstract":"Numerous algorithms concerning relational databases use a cover for a set of functional dependencies as all or part of their input. Examples are Bernstein and Beeri's synthesis algorithm [BB] and the tableau modification algorithm of Aho, Beeri, and Ullman [ABU]. The performance of these algorithms may depend both on the number of functional dependencies in the cover and the total size of the cover. Starting with a smaller cover will make such algorithms run faster. After Bernstein [Be75], many researchers believe the problem of finding a minimum cover is NP-complete. We show that minimum covers can be found in polynomial time, using the notion of direct determination. The proof details the structure of minimum covers, refining the structure Bernstein and Beeri show for non-redundant covers [BB]. The kernel algorithm of Lewis, Sekino, and Ting [LST] is improved using these results.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124442486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Decomposing a polygon into its convex parts 将多边形分解为其凸部分
Pub Date : 1979-04-30 DOI: 10.1145/800135.804396
B. Chazelle, D. Dobkin
A common operation in geometric computing is the decomposition of complex structures into more basic structures. Since it is easier to apply most algorithms to triangles or arbitrary convex polygons, there is considerable interest in finding fast algorithms for such decompositions. We consider the problem of decomposing a simple (non-convex) polygon into the union of a minimal number of convex polygons. Although the structure of the problem led to the conjecture that it was NP-complete, we have been able to reach polynomial time bounded algorithms for exact solution as well as low degree polynomial time bounded algorithm/or approximation methods.
几何计算中的一个常见操作是将复杂结构分解为更基本的结构。由于大多数算法更容易应用于三角形或任意凸多边形,因此寻找此类分解的快速算法非常有兴趣。我们考虑将一个简单(非凸)多边形分解为最小数量凸多边形的并的问题。虽然问题的结构导致了它是np完全的猜想,但我们已经能够达到多项式时间有界算法的精确解,以及低次多项式时间有界算法或近似方法。
{"title":"Decomposing a polygon into its convex parts","authors":"B. Chazelle, D. Dobkin","doi":"10.1145/800135.804396","DOIUrl":"https://doi.org/10.1145/800135.804396","url":null,"abstract":"A common operation in geometric computing is the decomposition of complex structures into more basic structures. Since it is easier to apply most algorithms to triangles or arbitrary convex polygons, there is considerable interest in finding fast algorithms for such decompositions. We consider the problem of decomposing a simple (non-convex) polygon into the union of a minimal number of convex polygons. Although the structure of the problem led to the conjecture that it was NP-complete, we have been able to reach polynomial time bounded algorithms for exact solution as well as low degree polynomial time bounded algorithm/or approximation methods.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121259538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
On the cryptocomplexity of knapsack systems 关于背包系统的密码复杂度
Pub Date : 1979-04-30 DOI: 10.1145/800135.804405
A. Shamir
A recent trend in cryptographic systems is to base their encryption/decryption functions on NP-complete problems, and in particular on the knapsack problem. To analyze the security of these systems, we need a complexity theory which is less worst-case oriented and which takes into account the extra conditions imposed on the problems to make them cryptographically useful. In this paper we consider the two classes of one-to-one and onto knapsack systems, analyze the complexity of recognizing them and of solving their instances, introduce a new complexity measure (median complexity), and show that this complexity is inversely proportional to the density of the knapsack system. The tradeoff result is based on a fast probabilistic knapsack solving algorithm which is applicable only to one-to-one systems, and it indicates that knapsack-based cryptographic systems in which one can both encrypt and sign messages are relatively insecure. We end the paper with new results about the security of some specific knapsack systems.
在密码系统中,最近的一个趋势是将加密/解密函数建立在np完全问题,特别是背包问题的基础上。为了分析这些系统的安全性,我们需要一种复杂性理论,它不是面向最坏情况的,并且考虑到附加在问题上的额外条件,使它们在密码学上有用。本文考虑了1 - 1和2 - 1两类背包系统,分析了识别它们和求解它们实例的复杂度,引入了一个新的复杂度度量(中值复杂度),并证明了该复杂度与背包系统的密度成反比。权衡结果基于一种仅适用于一对一系统的快速概率背包求解算法,表明既可以对消息进行加密又可以对消息进行签名的基于背包的密码系统相对不安全。最后给出了一些关于特定背包系统安全性的新结果。
{"title":"On the cryptocomplexity of knapsack systems","authors":"A. Shamir","doi":"10.1145/800135.804405","DOIUrl":"https://doi.org/10.1145/800135.804405","url":null,"abstract":"A recent trend in cryptographic systems is to base their encryption/decryption functions on NP-complete problems, and in particular on the knapsack problem. To analyze the security of these systems, we need a complexity theory which is less worst-case oriented and which takes into account the extra conditions imposed on the problems to make them cryptographically useful. In this paper we consider the two classes of one-to-one and onto knapsack systems, analyze the complexity of recognizing them and of solving their instances, introduce a new complexity measure (median complexity), and show that this complexity is inversely proportional to the density of the knapsack system. The tradeoff result is based on a fast probabilistic knapsack solving algorithm which is applicable only to one-to-one systems, and it indicates that knapsack-based cryptographic systems in which one can both encrypt and sign messages are relatively insecure. We end the paper with new results about the security of some specific knapsack systems.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133506176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
The pebbling problem is complete in polynomial space 该问题在多项式空间中是完备的
Pub Date : 1979-04-30 DOI: 10.1145/800135.804418
J. Gilbert, Thomas Lengauer, R. Tarjan
We examine a pebbling problem which has been used to study the storage requirements of various models of computation. Sethi has shown this problem to be NP-hard and Lingas has shown a generalization to be P-space complete. We prove the original problem P-space complete by employing a modification of Lingas's proof. The pebbling problem is one of the few examples of a P-space complete problem not exhibiting any obvious quantifier alternation.
我们研究了一个用于研究各种计算模型的存储需求的卵石问题。Sethi证明了这个问题是np困难的,Lingas证明了一个泛化是p空间完全的。我们利用Lingas证明的一个修正证明了原问题p空间的完备性。鹅卵石问题是p空间完全问题中为数不多的不表现出任何明显量词交替的例子之一。
{"title":"The pebbling problem is complete in polynomial space","authors":"J. Gilbert, Thomas Lengauer, R. Tarjan","doi":"10.1145/800135.804418","DOIUrl":"https://doi.org/10.1145/800135.804418","url":null,"abstract":"We examine a pebbling problem which has been used to study the storage requirements of various models of computation. Sethi has shown this problem to be NP-hard and Lingas has shown a generalization to be P-space complete. We prove the original problem P-space complete by employing a modification of Lingas's proof. The pebbling problem is one of the few examples of a P-space complete problem not exhibiting any obvious quantifier alternation.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132475808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
On a multidimensional search problem (Preliminary Version) 一个多维搜索问题(初版)
Pub Date : 1979-04-30 DOI: 10.1145/800135.804399
S. Kosaraju
The problem of searching for a given k-vector among a sorted list of n k-vectors is considered. The binary search is known to be optimal when k is 1. Here an almost optimal algorithm is presented for the 2-dimensional case. Interesting upper and lower bounds are derived for the general problem.
考虑在n个k向量的排序列表中搜索给定k向量的问题。众所周知,当k = 1时,二分查找是最优的。本文提出了一种二维情况下的几乎最优算法。为一般问题导出了有趣的上界和下界。
{"title":"On a multidimensional search problem (Preliminary Version)","authors":"S. Kosaraju","doi":"10.1145/800135.804399","DOIUrl":"https://doi.org/10.1145/800135.804399","url":null,"abstract":"The problem of searching for a given k-vector among a sorted list of n k-vectors is considered. The binary search is known to be optimal when k is 1. Here an almost optimal algorithm is presented for the 2-dimensional case. Interesting upper and lower bounds are derived for the general problem.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131816978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The complexity of finding periods 寻找周期的复杂性
Pub Date : 1979-04-30 DOI: 10.1145/800135.804400
R. Sedgewick, T. G. Szymanski
Given a function f over a finite domain D and an arbitrary starting point x, the sequence x,f(x),f(f(x)),... is ultimately periodic. Such sequences typically are used for constructing random number generators. The cycle problem is to determine the first repeated element fn(x) in the sequence. Previous algorithms for this problem have required 3n operations. In this paper we present an algorithm which only requires n(1+O(1/(@@@@)M)) steps, if M memory cells are available to store values of the function. By increasing M, this running time can be made arbitrarily close to the information-theoretic lower bound on the running time of any algorithm for the cycle problem. Our treatment is novel in that we explicitly consider the performance of the algorithm as a function of the amount of memory available as well as the relative cost of evaluating f and comparing sequence elements for equality.
给定有限定义域D上的函数f和任意起始点x,序列x,f(x),f(f(x)),…最终是周期性的。这样的序列通常用于构造随机数生成器。循环问题是确定序列中第一个重复元素fn(x)。以前解决这个问题的算法需要3n次运算。在本文中,我们提出了一种算法,它只需要n(1+O(1/(@@@@)M))步,如果有M个存储单元可用来存储函数的值。通过增加M,可以使该运行时间任意接近于任何循环问题算法运行时间的信息论下界。我们的处理是新颖的,因为我们明确地将算法的性能视为可用内存数量的函数,以及评估f和比较序列元素是否相等的相对成本。
{"title":"The complexity of finding periods","authors":"R. Sedgewick, T. G. Szymanski","doi":"10.1145/800135.804400","DOIUrl":"https://doi.org/10.1145/800135.804400","url":null,"abstract":"Given a function f over a finite domain D and an arbitrary starting point x, the sequence x,f(x),f(f(x)),... is ultimately periodic. Such sequences typically are used for constructing random number generators. The cycle problem is to determine the first repeated element fn(x) in the sequence. Previous algorithms for this problem have required 3n operations. In this paper we present an algorithm which only requires n(1+O(1/(@@@@)M)) steps, if M memory cells are available to store values of the function. By increasing M, this running time can be made arbitrarily close to the information-theoretic lower bound on the running time of any algorithm for the cycle problem. Our treatment is novel in that we explicitly consider the performance of the algorithm as a function of the amount of memory available as well as the relative cost of evaluating f and comparing sequence elements for equality.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Implicit data structures (Preliminary Draft) 隐式数据结构(初稿)
Pub Date : 1979-04-30 DOI: 10.1145/800135.804404
J. Munro, Hendra Suwanda
We consider representations of data structures in which the relative ordering of the values stored is implicit in the pattern in which the elements are retained, rather than explicit in pointers. Several implicit schemes for storing data are introduced to permit efficient implementation of the instructions insert, delete and find. &thgr;(@@@@N) basic operations are shown to be necessary and sufficient, in the worst case, to perform these instructions provided that the data elements are kept in some fixed partial order. We demonstrate, however, that further improvements can be made if an arrangement other than a fixed partial order is used. A structure, based on a fixed partial order, is introduced to facilitate multiple key searches. This structure, together with the retrieval scheme based upon it, is shown to be within a constant factor of the optimal one based on a partial order.
我们考虑数据结构的表示形式,其中存储的值的相对顺序在保留元素的模式中是隐式的,而不是在指针中显式的。介绍了几种存储数据的隐式方案,以允许插入、删除和查找指令的有效实现。&thgr;(@@@@N)在最坏的情况下,只要数据元素保持某种固定的部分顺序,基本操作对于执行这些指令是必要和充分的。然而,我们证明,如果使用固定部分顺序以外的安排,则可以进一步改进。引入了一种基于固定偏序的结构,以方便多键搜索。结果表明,该结构与基于该结构的检索方案在基于偏序的最优方案的常数因子范围内。
{"title":"Implicit data structures (Preliminary Draft)","authors":"J. Munro, Hendra Suwanda","doi":"10.1145/800135.804404","DOIUrl":"https://doi.org/10.1145/800135.804404","url":null,"abstract":"We consider representations of data structures in which the relative ordering of the values stored is implicit in the pattern in which the elements are retained, rather than explicit in pointers. Several implicit schemes for storing data are introduced to permit efficient implementation of the instructions insert, delete and find. &thgr;(@@@@N) basic operations are shown to be necessary and sufficient, in the worst case, to perform these instructions provided that the data elements are kept in some fixed partial order. We demonstrate, however, that further improvements can be made if an arrangement other than a fixed partial order is used. A structure, based on a fixed partial order, is introduced to facilitate multiple key searches. This structure, together with the retrieval scheme based upon it, is shown to be within a constant factor of the optimal one based on a partial order.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A near optimal data structure for a type of range query problem 一种近似最优的数据结构,用于一类范围查询问题
Pub Date : 1979-04-30 DOI: 10.1145/800135.804398
M. Fredman
Let G denote the set of elements of a commutative group whose addition operations is denoted by +, let N be a positive integer, and let A(1) ,..., A(N) denote an array with values in G. We will be concerned with designing data structures for representing the array A, which facilitate efficient implementation of the following two on-line tasks: (1) Update(j,x); replace A(j) by A(j) +x. (j and x are inputs, 1≤j≤N and x&egr;G) (2) Retrieve(j); returns the value of A(1) +...+ A(j). (j is an input, 1≤j≤N) As a motivating example, let G be the group of integers with + denoting the usual addition operation. Imagine a standardized examination given to large numbers of individuals over an indefinite period of time. Assume that each examinee will attain an integer score in the interval [1,N]. If an individual gets j points, this fact is recorded by executing Update(j,1). so that A(j) represents the number of individuals to date having scored j points. In order to compute the percentile currently associated with a particular score k, we need the cumulative sum provided by executing Retrieve(k).
设G表示加法运算记为+的可交换群的元素集合,设N为正整数,设a(1),…, A(N)表示值为g的数组。我们将关注设计用于表示数组A的数据结构,这有助于有效实现以下两个在线任务:(1)Update(j,x);将A(j)替换为A(j) +x。(j和x为输入,1≤j≤N, x&egr;G)(2)检索(j);返回A(1) +…+ (j)。(j为输入,1≤j≤N)作为一个激励的例子,设G为整数群,其中+表示通常的加法运算。想象一下,在一段不确定的时间内,对大量个人进行标准化考试。假设每位考生在[1,N]区间内的得分为整数。如果一个人获得了j个点,则通过执行Update(j,1)来记录这一事实。因此,A(j)表示到目前为止获得j分的个体数量。为了计算当前与特定分数k相关联的百分位数,我们需要执行Retrieve(k)提供的累积和。
{"title":"A near optimal data structure for a type of range query problem","authors":"M. Fredman","doi":"10.1145/800135.804398","DOIUrl":"https://doi.org/10.1145/800135.804398","url":null,"abstract":"Let G denote the set of elements of a commutative group whose addition operations is denoted by +, let N be a positive integer, and let A(1) ,..., A(N) denote an array with values in G. We will be concerned with designing data structures for representing the array A, which facilitate efficient implementation of the following two on-line tasks: (1) Update(j,x); replace A(j) by A(j) +x. (j and x are inputs, 1≤j≤N and x&egr;G) (2) Retrieve(j); returns the value of A(1) +...+ A(j). (j is an input, 1≤j≤N) As a motivating example, let G be the group of integers with + denoting the usual addition operation. Imagine a standardized examination given to large numbers of individuals over an indefinite period of time. Assume that each examinee will attain an integer score in the interval [1,N]. If an individual gets j points, this fact is recorded by executing Update(j,1). so that A(j) represents the number of individuals to date having scored j points. In order to compute the percentile currently associated with a particular score k, we need the cumulative sum provided by executing Retrieve(k).","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network flow and generalized path compression 网络流与广义路径压缩
Pub Date : 1979-04-30 DOI: 10.1145/800135.804394
Z. Galil, A. Naamad
An O(EVlog2V) algorithm for finding the maximal flow in networks is described. It is asymptotically better than the other known algorithms if E = O(V2-ε) for some ε>0. The analysis of the running time exploits the discovery of a phenomenon similar to (but more general than) path compression, although the union find algorithm is not used. The time bound is shown to be tight in terms of V and E by exhibiting a family of networks that require Ω(EVlog2V) time.++
描述了一种求网络中最大流量的0 (EVlog2V)算法。对于某些ε>0,当E = 0 (V2-ε)时,该算法渐近优于其他已知算法。对运行时间的分析利用了一种类似于(但比路径压缩更通用的)现象的发现,尽管没有使用联合查找算法。通过展示一系列需要Ω(EVlog2V)时间的网络,时间限制在V和E方面显示得很紧
{"title":"Network flow and generalized path compression","authors":"Z. Galil, A. Naamad","doi":"10.1145/800135.804394","DOIUrl":"https://doi.org/10.1145/800135.804394","url":null,"abstract":"An O(EVlog2V) algorithm for finding the maximal flow in networks is described. It is asymptotically better than the other known algorithms if E = O(V2-ε) for some ε>0. The analysis of the running time exploits the discovery of a phenomenon similar to (but more general than) path compression, although the union find algorithm is not used. The time bound is shown to be tight in terms of V and E by exhibiting a family of networks that require Ω(EVlog2V) time.++","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128875313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
Proceedings of the eleventh annual ACM symposium on Theory of computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1