首页 > 最新文献

Proceedings 17th IEEE Annual Conference on Computational Complexity最新文献

英文 中文
Hardness amplification within NP NP内硬度放大
Pub Date : 2002-05-19 DOI: 10.1145/509907.510015
R. O'Donnell
We investigate whether, if NP is slightly hard on average, it is very hard on average.
我们研究如果NP平均上稍微困难,它是否平均上非常困难。
{"title":"Hardness amplification within NP","authors":"R. O'Donnell","doi":"10.1145/509907.510015","DOIUrl":"https://doi.org/10.1145/509907.510015","url":null,"abstract":"We investigate whether, if NP is slightly hard on average, it is very hard on average.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
3-MANIFOLD KNOT GENUS is NP-complete 3-流形结属是np完全的
Pub Date : 2002-05-19 DOI: 10.1145/509907.510016
I. Agol, J. Hass, W. Thurston
Summary form only given, as follows. One of the central questions in topology is determining whether a given curve is knotted or unknotted. An algorithm to decide this question was given by Haken (1961), using the technique of normal surfaces. These surfaces are rigid, discretized surfaces, well suited for algorithmic analysis. Any oriented surface without boundary can be obtained from a sphere by adding "handles". The number of handles is called the genus of the surface, and the smallest genus of a spanning surface for a curve is called the genus of the curve. A curve has genus zero if and only if it is unknotted. Schubert extended Haken's work, giving an algorithm to determine the genus of a curve in any 3-manifold. We examine the problem of deciding whether a polygonal knot in a closed triangulated three-dimensional manifold bounds a surface of genus at most g, 3-MANIFOLD KNOT GENUS. Previous work of Hass, Lagarias and Pippenger had shown that this problem is in PSPACE. No lower bounds on the running time were previously known. We show that this problem is NP-complete.
仅给出摘要形式,如下。拓扑学的核心问题之一是确定给定的曲线是有结还是无结。Haken(1961)使用法向曲面技术给出了一种算法来解决这个问题。这些表面是刚性的、离散的表面,非常适合算法分析。任何没有边界的有向曲面都可以通过在球面上添加“手柄”得到。手柄的数量称为曲面的格,曲线的生成曲面的最小格称为曲线的格。当且仅当曲线解结时,其属为零。舒伯特扩展了哈肯的工作,给出了一种确定任意3流形曲线的属的算法。研究了在封闭三角化三维流形边界上的多边形结是否为最多g个3流形结属曲面的判定问题。Hass、Lagarias和Pippenger之前的研究表明,这个问题存在于PSPACE中。之前不知道运行时间的下限。我们证明了这个问题是np完全的。
{"title":"3-MANIFOLD KNOT GENUS is NP-complete","authors":"I. Agol, J. Hass, W. Thurston","doi":"10.1145/509907.510016","DOIUrl":"https://doi.org/10.1145/509907.510016","url":null,"abstract":"Summary form only given, as follows. One of the central questions in topology is determining whether a given curve is knotted or unknotted. An algorithm to decide this question was given by Haken (1961), using the technique of normal surfaces. These surfaces are rigid, discretized surfaces, well suited for algorithmic analysis. Any oriented surface without boundary can be obtained from a sphere by adding \"handles\". The number of handles is called the genus of the surface, and the smallest genus of a spanning surface for a curve is called the genus of the curve. A curve has genus zero if and only if it is unknotted. Schubert extended Haken's work, giving an algorithm to determine the genus of a curve in any 3-manifold. We examine the problem of deciding whether a polygonal knot in a closed triangulated three-dimensional manifold bounds a surface of genus at most g, 3-MANIFOLD KNOT GENUS. Previous work of Hass, Lagarias and Pippenger had shown that this problem is in PSPACE. No lower bounds on the running time were previously known. We show that this problem is NP-complete.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131938074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Expanders from symmetric codes 对称代码中的扩展符
Pub Date : 2002-05-19 DOI: 10.1145/509907.510004
R. Meshulam, A. Wigderson
A set S in the vector space F/sub p//sup n/ is "good" if it satisfies any of the following (almost) equivalent conditions: (1) S are the rows of a generating matrix for a linear distance code, (2) all (nontrivial) Fourier coefficients of S are bounded away from 1, and (3) the Cayley graph on F/sub p//sup n/ with generators S is a good expander A good set S must have at least cn vectors (with c > 1). We study conditions under which S is the orbit of only a constant number of vectors, under the action of a finite group G on the n coordinates. Such succinctly described sets yield very symmetric codes, and can "amplify" small constant-degree Cayley expanders to exponentially larger ones. For the regular action (the coordinates are named by the elements of the group G), we develop representative theoretic conditions on the group G which guarantee the existence (in fact, abundance) of such few expanding orbits. The condition is a (nearly tight) upper bound on the distribution of dimensions of the irreducible representations of G, and is the main technical contribution of this paper We further show a class of groups for which this condition is implied by the expansion properties of the group G itself! By combining these, we can iterate the amplification process above, and give (near-constant degree) Cayley expanders which are built from Abelian components. For other natural actions, such as of the affine group on a finite field, we give the first explicit construction of such few expanding orbits.
向量空间F/ p//sup n/中的集合S是“好的”,如果它满足下列任何一个(几乎)等价条件:(1) S是一个生成矩阵的行线性距离码,(2)(重要的)傅里叶系数的年代都有界远离1,和(3)凯莱图F /子p / /一口n /发电机是一个很好的扩张器一套好的年代必须至少cn向量(c > 1)。我们学习条件是只有固定数量的向量的轨道,作用下的有限群G n坐标。这种简洁描述的集合产生非常对称的编码,并且可以将小的等度Cayley展开器“放大”到指数级大的扩展器。对于正则作用(坐标由G群的元素命名),我们提出了G群上具有代表性的理论条件,以保证这种少数膨胀轨道的存在(实际上是丰度)。这个条件是G的不可约表示的维数分布上的一个(近紧)上界,是本文的主要技术贡献。我们进一步给出了一类群,其这个条件是由群G本身的展开性质隐含的!通过结合这些,我们可以迭代上面的放大过程,并给出由阿贝尔组件构建的Cayley扩展器(接近恒定度)。对于其他自然作用,如有限域上的仿射群,我们给出了这类少数扩展轨道的第一个明确构造。
{"title":"Expanders from symmetric codes","authors":"R. Meshulam, A. Wigderson","doi":"10.1145/509907.510004","DOIUrl":"https://doi.org/10.1145/509907.510004","url":null,"abstract":"A set S in the vector space F/sub p//sup n/ is \"good\" if it satisfies any of the following (almost) equivalent conditions: (1) S are the rows of a generating matrix for a linear distance code, (2) all (nontrivial) Fourier coefficients of S are bounded away from 1, and (3) the Cayley graph on F/sub p//sup n/ with generators S is a good expander A good set S must have at least cn vectors (with c > 1). We study conditions under which S is the orbit of only a constant number of vectors, under the action of a finite group G on the n coordinates. Such succinctly described sets yield very symmetric codes, and can \"amplify\" small constant-degree Cayley expanders to exponentially larger ones. For the regular action (the coordinates are named by the elements of the group G), we develop representative theoretic conditions on the group G which guarantee the existence (in fact, abundance) of such few expanding orbits. The condition is a (nearly tight) upper bound on the distribution of dimensions of the irreducible representations of G, and is the main technical contribution of this paper We further show a class of groups for which this condition is implied by the expansion properties of the group G itself! By combining these, we can iterate the amplification process above, and give (near-constant degree) Cayley expanders which are built from Abelian components. For other natural actions, such as of the affine group on a finite field, we give the first explicit construction of such few expanding orbits.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116843906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Randomness conductors and constant-degree lossless expanders 随机导体和恒定度无损扩展器
Pub Date : 2002-05-19 DOI: 10.1145/509907.510003
Michael R. Capalbo, Omer Reingold, S. Vadhan, A. Wigderson
The main concrete result of this paper is the first explicit construction of constant degree lossless expanders. In these graphs, the expansion factor is almost as large as possible: (1—ε)D, where D is the degree and ε is an arbitrarily small constant. The best previous explicit constructions gave expansion factor D/2, which is too weak for many applications. The D/2 bound was obtained via the eigenvalue method, and is known that that method cannot give better bounds.The main abstract contribution of this paper is the introduction and initial study of randomness conductors, a notion which generalizes extractors, expanders, condensers and other similar objects. In all these functions, certain guarantee on the input "entropy" is converted to a guarantee on the output "entropy". For historical reasons, specific objects used specific guarantees of different flavors. We show that the flexibility afforded by the conductor definition leads to interesting combinations of these objects, and to better constructions such as those above.The main technical tool in these constructions is a natural generalization to conductors of the zig-zag graph product, previously defined for expanders and extractors.
本文的主要具体成果是首次明确构造了常度无损展开器。在这些图中,膨胀因子几乎是尽可能大的:(1 -ε)D,其中D是度,ε是一个任意小的常数。以前最好的显式结构给出了扩展因子D/2,这对于许多应用来说太弱了。D/2边界是通过特征值法得到的,已知该方法不能给出更好的边界。本文的主要抽象贡献是引入并初步研究了随机导体,这是一个泛化抽取器、膨胀器、冷凝器和其他类似物体的概念。在所有这些函数中,对输入“熵”的一定保证转化为对输出“熵”的保证。由于历史原因,特定的对象使用不同口味的特定保证。我们展示了导体定义所提供的灵活性导致了这些对象的有趣组合,以及诸如上述的更好的结构。这些结构中的主要技术工具是对锯齿形图积导体的自然推广,之前为膨胀器和提取器定义。
{"title":"Randomness conductors and constant-degree lossless expanders","authors":"Michael R. Capalbo, Omer Reingold, S. Vadhan, A. Wigderson","doi":"10.1145/509907.510003","DOIUrl":"https://doi.org/10.1145/509907.510003","url":null,"abstract":"The main concrete result of this paper is the first explicit construction of constant degree lossless expanders. In these graphs, the expansion factor is almost as large as possible: (1—ε)D, where D is the degree and ε is an arbitrarily small constant. The best previous explicit constructions gave expansion factor D/2, which is too weak for many applications. The D/2 bound was obtained via the eigenvalue method, and is known that that method cannot give better bounds.The main abstract contribution of this paper is the introduction and initial study of randomness conductors, a notion which generalizes extractors, expanders, condensers and other similar objects. In all these functions, certain guarantee on the input \"entropy\" is converted to a guarantee on the output \"entropy\". For historical reasons, specific objects used specific guarantees of different flavors. We show that the flexibility afforded by the conductor definition leads to interesting combinations of these objects, and to better constructions such as those above.The main technical tool in these constructions is a natural generalization to conductors of the zig-zag graph product, previously defined for expanders and extractors.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114745514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 249
The complexity of approximating the entropy 近似熵的复杂度
Pub Date : 2002-05-19 DOI: 10.1145/509907.510005
Tugkan Batu, S. Dasgupta, Ravi Kumar, R. Rubinfeld
The Shannon entropy is a measure of the randomness of a distribution, and plays a central role in statistics, information theory, and data compression. Knowing the entropy of a random source can shed light on the compressibility of data produced by such a source. We consider the complexity of approximating the entropy under various different assumptions on the way the input is presented.
香农熵是衡量分布随机性的一种方法,在统计学、信息论和数据压缩中起着核心作用。了解随机源的熵可以阐明由这种源产生的数据的可压缩性。我们考虑了在各种不同的输入方式的假设下近似熵的复杂性。
{"title":"The complexity of approximating the entropy","authors":"Tugkan Batu, S. Dasgupta, Ravi Kumar, R. Rubinfeld","doi":"10.1145/509907.510005","DOIUrl":"https://doi.org/10.1145/509907.510005","url":null,"abstract":"The Shannon entropy is a measure of the randomness of a distribution, and plays a central role in statistics, information theory, and data compression. Knowing the entropy of a random source can shed light on the compressibility of data produced by such a source. We consider the complexity of approximating the entropy under various different assumptions on the way the input is presented.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 181
Hard examples for bounded depth frege 有界深度图像的硬例子
Pub Date : 2002-05-19 DOI: 10.1145/509907.509988
Eli Ben-Sasson
We prove exponential lower bounds on the size of a bounded depth Frege proof of a Tseitin graph-based contradiction, whenever the underlying graph is an expander. This is the first example of a contradiction, naturally formalized as a 3-CNF, that has no short bounded depth Frege proofs. Previously, lower bounds of this type were known only for the pigeonhole principle [18, 17], and for Tseitin contradictions based on complete graphs [19].Our proof is a novel reduction of a Tseitin formula of an expander graph to the pigeonhole principle, in a manner resembling that done by Fu and Urquhart [19] for complete graphs.In the proof we introduce a general method for removing extension variables without significantly increasing the proof size, which may be interesting in its own right.
我们证明了一个基于tseittin图的矛盾的有界深度大小的指数下界,当底层图是一个展开图时。这是矛盾的第一个例子,自然形式化为3-CNF,它没有短有界深度弗雷格证明。以前,这种类型的下界仅为鸽洞原理[18,17]和基于完全图[19]的tseittin矛盾所知。我们的证明是用一种类似于Fu和Urquhart[19]对完全图所做的方式,将展开图的tseittin公式简化为鸽子洞原理。在证明中,我们引入了一种通用的方法,可以在不显著增加证明大小的情况下删除扩展变量,这本身可能很有趣。
{"title":"Hard examples for bounded depth frege","authors":"Eli Ben-Sasson","doi":"10.1145/509907.509988","DOIUrl":"https://doi.org/10.1145/509907.509988","url":null,"abstract":"We prove exponential lower bounds on the size of a bounded depth Frege proof of a Tseitin graph-based contradiction, whenever the underlying graph is an expander. This is the first example of a contradiction, naturally formalized as a 3-CNF, that has no short bounded depth Frege proofs. Previously, lower bounds of this type were known only for the pigeonhole principle [18, 17], and for Tseitin contradictions based on complete graphs [19].Our proof is a novel reduction of a Tseitin formula of an expander graph to the pigeonhole principle, in a manner resembling that done by Fu and Urquhart [19] for complete graphs.In the proof we introduce a general method for removing extension variables without significantly increasing the proof size, which may be interesting in its own right.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
On communication over an entanglement-assisted quantum channel 在纠缠辅助量子信道上的通信
Pub Date : 2002-05-19 DOI: 10.1145/509907.510007
A. Nayak, J. Salzman
Shared entanglement is a resource available to parties communicating over a quantum channel, much akin to public coins in classical communication protocols: the two parties may be given some number of quantum bits jointly prepared in a fixed superposition, prior to communicating with each other. The quantum channel is then said to be "entanglement-assisted." Shared randomness does not help in the transmission of information from one party to another. Moreover, it does not significantly reduce the classical complexity of computing functions vis-a-vis private-coin protocols. On the other hand, prior entanglement leads to startling phenomena such as "quantum teleportation" and "superdense coding." The problem of characterising the power of prior entanglement has baffled many researchers, especially in the setting of bounded-error protocols. It is open whether it leads to more than a factor of two savings (using superdense coding) or more than an additive O(log) savings (when used to create shared randomness). Few lower bounds are known for communication problems in this setting, and are all derived using sophisticated information theoretic techniques. In this paper, we focus on the most basic problem in the setting of communication over an entanglement-assisted quantum channel, that of communicating classical bits from one party to another. We derive optimal bounds on the number of quantum bits required for this task, for any given probability of error.
共享纠缠是通过量子通道进行通信的各方可用的资源,非常类似于经典通信协议中的公共硬币:双方可以在相互通信之前,以固定叠加的方式共同准备一定数量的量子比特。量子通道被称为“纠缠辅助”。共享的随机性无助于信息从一方传递到另一方。此外,与私有货币协议相比,它并没有显著降低计算函数的经典复杂性。另一方面,先验纠缠会导致令人吃惊的现象,如“量子隐形传态”和“超密集编码”。表征先验纠缠的能力的问题一直困扰着许多研究人员,特别是在有界误差协议的设置中。它是否会导致超过两倍的节省(使用超密集编码)或超过附加的O(log)节省(当用于创建共享随机性时)是开放的。在这种情况下,很少有已知的通信问题的下限,并且都是使用复杂的信息理论技术推导出来的。在本文中,我们集中讨论了在纠缠辅助量子信道上设置通信的最基本问题,即从一方到另一方的经典比特通信。对于任何给定的错误概率,我们推导出该任务所需的量子比特数的最佳边界。
{"title":"On communication over an entanglement-assisted quantum channel","authors":"A. Nayak, J. Salzman","doi":"10.1145/509907.510007","DOIUrl":"https://doi.org/10.1145/509907.510007","url":null,"abstract":"Shared entanglement is a resource available to parties communicating over a quantum channel, much akin to public coins in classical communication protocols: the two parties may be given some number of quantum bits jointly prepared in a fixed superposition, prior to communicating with each other. The quantum channel is then said to be \"entanglement-assisted.\" Shared randomness does not help in the transmission of information from one party to another. Moreover, it does not significantly reduce the classical complexity of computing functions vis-a-vis private-coin protocols. On the other hand, prior entanglement leads to startling phenomena such as \"quantum teleportation\" and \"superdense coding.\" The problem of characterising the power of prior entanglement has baffled many researchers, especially in the setting of bounded-error protocols. It is open whether it leads to more than a factor of two savings (using superdense coding) or more than an additive O(log) savings (when used to create shared randomness). Few lower bounds are known for communication problems in this setting, and are all derived using sophisticated information theoretic techniques. In this paper, we focus on the most basic problem in the setting of communication over an entanglement-assisted quantum channel, that of communicating classical bits from one party to another. We derive optimal bounds on the number of quantum bits required for this task, for any given probability of error.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Time-space tradeoffs, multiparty communication complexity, and nearest-neighbor problems 时空权衡、多方通信复杂性和最近邻问题
Pub Date : 2002-05-19 DOI: 10.1145/509907.510006
P. Beame, Erik Vee
The first non-trivial time-space tradeoff lower bounds have been shown for decision problems in P using notions derived from the study of two-party communication complexity. These results are proven directly for branching programs, natural generalizations of decision trees to directed graphs that provide elegant models of both non-uniform time T and space S simultaneously. We develop a new lower bound criterion, based on extending two-party communication complexity ideas to multiparty communication complexity. Applying this criterion to an explicit Boolean function based on a multilinear form over F/sub 2/. for suitable s, we show lower bounds that yield T = /spl Omega/(n log/sup 2/ n) when S /spl les/ n/sup 1-/spl epsi// log |D| for large input domain D. Finally, we develop lower bounds for nearest-neighbor problems involving n data points in a variety of d-dimensional metric spaces.
第一个非平凡的时间-空间权衡下界已经显示了决策问题的P使用的概念,从研究双方通信的复杂性。这些结果直接证明了分支程序,决策树的自然推广到有向图,同时提供了非均匀时间T和空间S的优雅模型。在将双方通信复杂度思想推广到多方通信复杂度的基础上,提出了一个新的下界准则。将此准则应用于基于F/下标2/上的多线性形式的显式布尔函数。对于合适的s,我们给出了当s/ spl les/ n/sup 1-/spl epsi// log |D|时T = /spl Omega/(n log/sup 2/ n)的下界,对于大输入域D,我们给出了在各种D维度量空间中涉及n个数据点的最近邻问题的下界。
{"title":"Time-space tradeoffs, multiparty communication complexity, and nearest-neighbor problems","authors":"P. Beame, Erik Vee","doi":"10.1145/509907.510006","DOIUrl":"https://doi.org/10.1145/509907.510006","url":null,"abstract":"The first non-trivial time-space tradeoff lower bounds have been shown for decision problems in P using notions derived from the study of two-party communication complexity. These results are proven directly for branching programs, natural generalizations of decision trees to directed graphs that provide elegant models of both non-uniform time T and space S simultaneously. We develop a new lower bound criterion, based on extending two-party communication complexity ideas to multiparty communication complexity. Applying this criterion to an explicit Boolean function based on a multilinear form over F/sub 2/. for suitable s, we show lower bounds that yield T = /spl Omega/(n log/sup 2/ n) when S /spl les/ n/sup 1-/spl epsi// log |D| for large input domain D. Finally, we develop lower bounds for nearest-neighbor problems involving n data points in a variety of d-dimensional metric spaces.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125707358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Algorithmic derandomization via complexity theory 基于复杂性理论的算法非随机化
Pub Date : 2002-05-19 DOI: 10.1145/509907.509996
D. Sivakumar
We point out how the methods of Nisan [31, 32], originally developed for derandomizing space-bounded computations, may be applied to obtain polynomial-time and NC derandomizations of several probabilistic algorithms. Our list includes the randomized rounding steps of linear and semi-definite programming relaxations of optimization problems, parallel derandomization of discrepancy-type problems, and the Johnson--Lindenstrauss lemma, to name a few.A fascinating aspect of this style of derandomization is the fact that we often carry out the derandomizations directly from the statements about the correctness of probabilistic algorithms, rather than carefully mimicking their proofs.
我们指出了Nisan[31,32]的方法,最初是为空间有界计算的非随机化而开发的,如何应用于几种概率算法的多项式时间和NC非随机化。我们的列表包括优化问题的线性和半确定规划松弛的随机舍入步骤,差异型问题的并行非随机化,以及Johnson- Lindenstrauss引理,仅举几例。这种非随机化风格的一个令人着迷的方面是,我们经常直接从关于概率算法正确性的陈述中执行非随机化,而不是仔细地模仿它们的证明。
{"title":"Algorithmic derandomization via complexity theory","authors":"D. Sivakumar","doi":"10.1145/509907.509996","DOIUrl":"https://doi.org/10.1145/509907.509996","url":null,"abstract":"We point out how the methods of Nisan [31, 32], originally developed for derandomizing space-bounded computations, may be applied to obtain polynomial-time and NC derandomizations of several probabilistic algorithms. Our list includes the randomized rounding steps of linear and semi-definite programming relaxations of optimization problems, parallel derandomization of discrepancy-type problems, and the Johnson--Lindenstrauss lemma, to name a few.A fascinating aspect of this style of derandomization is the fact that we often carry out the derandomizations directly from the statements about the correctness of probabilistic algorithms, rather than carefully mimicking their proofs.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125757746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Improved cryptographic hash functions with worst-case/average-case connection 改进了最坏情况/平均情况连接的加密哈希函数
Pub Date : 2002-05-19 DOI: 10.1145/509907.509995
Daniele Micciancio
(MATH) We define a new family of collision resistant hash functions whose security is based on the worst case hardness of approximating the covering radius of a lattice within a factor On2log n), where π is a value between 1 and √ over n that depends on the solution of the closest vector problem in certain "almost perfect" lattices. Even for π = √ over n, this improves the smallest (worst-case) inapproximability factor for lattice problems known to imply the existence of one-way functions. (Previously known best factor was O(n3+ε) for the shortest independent vector problem, due to Cai and Nerurkar, based on work of Ajtai.) Using standard transference theorems from the geometry of numbers, our result immediately gives a connection between the worst-case and average-case complexity of the shortest vector problem with connection factor On3}log n), improving the best previously known connection factor O(n4+ε), also due to Ajtai, Cai and Nerurkar.
(MATH)我们定义了一个新的抗碰撞哈希函数族,其安全性基于在因子O(πn2log n)内近似晶格覆盖半径的最坏情况硬度,其中π是1和√ / n之间的值,它取决于某些“几乎完美”晶格中最近向量问题的解。即使π =√ / n,这也改善了晶格问题的最小(最坏情况)不可逼近性因子,已知这意味着单向函数的存在。(之前已知的最短独立向量问题的最佳因子是O(n3+ε),由Cai和Nerurkar基于Ajtai的工作提出。)利用数字几何中的标准传递定理,我们的结果立即给出了具有连接因子O(πn3}log n)的最短向量问题的最坏情况和平均情况复杂性之间的联系,改进了先前已知的最佳连接因子O(n4+ε),也是由于Ajtai, Cai和Nerurkar。
{"title":"Improved cryptographic hash functions with worst-case/average-case connection","authors":"Daniele Micciancio","doi":"10.1145/509907.509995","DOIUrl":"https://doi.org/10.1145/509907.509995","url":null,"abstract":"(MATH) We define a new family of collision resistant hash functions whose security is based on the worst case hardness of approximating the covering radius of a lattice within a factor <i>O</i>(π<i>n</i><sup>2</sup>log <i>n</i>), where π is a value between <i>1</i> and √ over <i>n</i> that depends on the solution of the closest vector problem in certain \"almost perfect\" lattices. Even for π = √ over <i>n</i>, this improves the smallest (worst-case) inapproximability factor for lattice problems known to imply the existence of one-way functions. (Previously known best factor was <i>O</i>(<i>n</i><sup>3+ε</sup>) for the shortest independent vector problem, due to Cai and Nerurkar, based on work of Ajtai.) Using standard transference theorems from the geometry of numbers, our result immediately gives a connection between the worst-case and average-case complexity of the shortest vector problem with connection factor <i>O</i>(π<i>n</i><sup>3</sup>}log <i>n</i>), improving the best previously known connection factor <i>O</i>(<i>n</i><sup>4+ε</sup>), also due to Ajtai, Cai and Nerurkar.","PeriodicalId":193513,"journal":{"name":"Proceedings 17th IEEE Annual Conference on Computational Complexity","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122542404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
Proceedings 17th IEEE Annual Conference on Computational Complexity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1