首页 > 最新文献

Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing最新文献

英文 中文
Deciding parity games in quasipolynomial time 在拟多项式时间内决定奇偶对策
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055409
Cristian S. Calude, Sanjay Jain, B. Khoussainov, Wei Li, F. Stephan
It is shown that the parity game can be solved in quasipolynomial time. The parameterised parity game - with n nodes and m distinct values (aka colours or priorities) - is proven to be in the class of fixed parameter tractable (FPT) problems when parameterised over m. Both results improve known bounds, from runtime nO(√n) to O(nlog(m)+6) and from an XP-algorithm with runtime O(nΘ(m)) for fixed parameter m to an FPT-algorithm with runtime O(n5)+g(m), for some function g depending on m only. As an application it is proven that coloured Muller games with n nodes and m colours can be decided in time O((mm · n)5); it is also shown that this bound cannot be improved to O((2m · n)c), for any c, unless FPT = W[1].
证明了奇偶对策可以在拟多项式时间内求解。参数化的parity博弈-具有n个节点和m个不同的值(又名颜色或优先级)-被证明在参数化m时属于固定参数可处理(FPT)问题的类别。两个结果都改进了已知的界限,从运行时间nO(√n)到O(nlog(m)+6),以及从运行时间O(nΘ(m))的xp算法到运行时间O(n5)+g(m)的FPT算法,对于某些函数g仅依赖于m。作为一个应用,证明了n个节点m种颜色的有色穆勒对策可以在O((mm·n)5)时间内确定;还证明了该界不能改进为O((2m·n)c),对于任何c,除非FPT = W[1]。
{"title":"Deciding parity games in quasipolynomial time","authors":"Cristian S. Calude, Sanjay Jain, B. Khoussainov, Wei Li, F. Stephan","doi":"10.1145/3055399.3055409","DOIUrl":"https://doi.org/10.1145/3055399.3055409","url":null,"abstract":"It is shown that the parity game can be solved in quasipolynomial time. The parameterised parity game - with n nodes and m distinct values (aka colours or priorities) - is proven to be in the class of fixed parameter tractable (FPT) problems when parameterised over m. Both results improve known bounds, from runtime nO(√n) to O(nlog(m)+6) and from an XP-algorithm with runtime O(nΘ(m)) for fixed parameter m to an FPT-algorithm with runtime O(n5)+g(m), for some function g depending on m only. As an application it is proven that coloured Muller games with n nodes and m colours can be decided in time O((mm · n)5); it is also shown that this bound cannot be improved to O((2m · n)c), for any c, unless FPT = W[1].","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84001999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 215
Explicit, almost optimal, epsilon-balanced codes 显式的,几乎最优的,平衡的代码
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055408
A. Ta-Shma
The question of finding an epsilon-biased set with close to optimal support size, or, equivalently, finding an explicit binary code with distance 1-ϵ/2 and rate close to the Gilbert-Varshamov bound, attracted a lot of attention in recent decades. In this paper we solve the problem almost optimally and show an explicit ϵ-biased set over k bits with support size O(k/ϵ2+o(1)). This improves upon all previous explicit constructions which were in the order of k2/ϵ2, k/ϵ3 or k5/4/ϵ5/2. The result is close to the Gilbert-Varshamov bound which is O(k/ϵ2) and the lower bound which is Ω(k/ϵ2 log1/ϵ). The main technical tool we use is bias amplification with the s-wide replacement product. The sum of two independent samples from an ϵ-biased set is ϵ2 biased. Rozenman and Wigderson showed how to amplify the bias more economically by choosing two samples with an expander. Based on that they suggested a recursive construction that achieves sample size O(k/ϵ4). We show that amplification with a long random walk over the s-wide replacement product reduces the bias almost optimally.
近几十年来,找到一个接近最优支持大小的ε偏集的问题,或者等价地,找到一个距离为1- ε /2且速率接近吉尔伯特-瓦尔沙莫夫界的显式二进制码的问题,吸引了很多关注。在本文中,我们几乎最优地解决了这个问题,并给出了一个显式的ϵ-biased集合,其支持大小为O(k/ϵ2+ O(1))。这改进了以前所有显式结构,其顺序为k2/ϵ2, k/ϵ3或k5/4/ϵ5/2。结果接近吉尔伯特-瓦尔沙莫夫界,即O(k/ϵ2)和下界Ω(k/ϵ2 log1/ λ)。我们使用的主要技术工具是带有s宽替换产品的偏置放大。来自ϵ-biased集合的两个独立样本的和是ϵ2有偏的。罗森曼和威格森展示了如何用膨胀器选择两个样本,从而更经济地放大偏差。在此基础上,他们提出了一个递归结构,达到样本大小O(k/ϵ4)。我们表明,在s-wide替换产品上进行长时间随机漫步的放大几乎可以最佳地减少偏差。
{"title":"Explicit, almost optimal, epsilon-balanced codes","authors":"A. Ta-Shma","doi":"10.1145/3055399.3055408","DOIUrl":"https://doi.org/10.1145/3055399.3055408","url":null,"abstract":"The question of finding an epsilon-biased set with close to optimal support size, or, equivalently, finding an explicit binary code with distance 1-ϵ/2 and rate close to the Gilbert-Varshamov bound, attracted a lot of attention in recent decades. In this paper we solve the problem almost optimally and show an explicit ϵ-biased set over k bits with support size O(k/ϵ2+o(1)). This improves upon all previous explicit constructions which were in the order of k2/ϵ2, k/ϵ3 or k5/4/ϵ5/2. The result is close to the Gilbert-Varshamov bound which is O(k/ϵ2) and the lower bound which is Ω(k/ϵ2 log1/ϵ). The main technical tool we use is bias amplification with the s-wide replacement product. The sum of two independent samples from an ϵ-biased set is ϵ2 biased. Rozenman and Wigderson showed how to amplify the bias more economically by choosing two samples with an expander. Based on that they suggested a recursive construction that achieves sample size O(k/ϵ4). We show that amplification with a long random walk over the s-wide replacement product reduces the bias almost optimally.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89165291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Fast convergence of learning in games (invited talk) 游戏中的快速收敛学习(特邀演讲)
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3084098
Vasilis Syrgkanis
A plethora of recent work has analyzed properties of outcomes in games when each player employs a no-regret learning algorithm. Many algorithms achieve regret against the best fixed action in hindisght that decays at a rate of O(1/'T), when the game is played for T iterations. The latter rate is optimal in adversarial settings. However, in a game a player's opponents are minimizing their own regret, rather than maximizing the player's regret. (Daskalakis et al. 2014) and (Rakhlin and Sridharan 2013) showed that in two player zero-sum games O(1/T) rates are achievable. In (Syrgkanis et al. 2015), we show that O(1/T3/4) rates are achievable in general multi-player games and also analyze convergence of the dynamics to approximately optimal social welfare, where we show a convergence rate of O(1/T). The latter result was subsequently generalized to a broader class of learning algorithms by (Foster et al. 2016). This is based on joint work with Alekh Agarwal, Haipeng Luo and Robert E. Schapire.
最近有大量研究分析了当每个玩家都使用无悔学习算法时游戏结果的属性。当游戏进行T次迭代时,许多算法在以0 (1/'T)的速率衰减的最佳固定动作中实现遗憾。后一种比率在对抗环境中是最佳的。然而,在游戏中,玩家的对手会最小化他们自己的遗憾,而不是最大化玩家的遗憾。(Daskalakis et al. 2014)和(Rakhlin and Sridharan 2013)表明,在两个玩家的零和博弈中,0 (1/T)比率是可以实现的。在(sygkanis et al. 2015)中,我们表明在一般的多人游戏中可以实现0 (1/T3/4)的速率,并且还分析了动态趋同的近似最优社会福利,其中我们显示了O(1/T)的趋同速率。后一种结果随后被推广到更广泛的学习算法类别(Foster et al. 2016)。这是基于与Alekh Agarwal, Haipeng Luo和Robert E. Schapire的合作。
{"title":"Fast convergence of learning in games (invited talk)","authors":"Vasilis Syrgkanis","doi":"10.1145/3055399.3084098","DOIUrl":"https://doi.org/10.1145/3055399.3084098","url":null,"abstract":"A plethora of recent work has analyzed properties of outcomes in games when each player employs a no-regret learning algorithm. Many algorithms achieve regret against the best fixed action in hindisght that decays at a rate of O(1/'T), when the game is played for T iterations. The latter rate is optimal in adversarial settings. However, in a game a player's opponents are minimizing their own regret, rather than maximizing the player's regret. (Daskalakis et al. 2014) and (Rakhlin and Sridharan 2013) showed that in two player zero-sum games O(1/T) rates are achievable. In (Syrgkanis et al. 2015), we show that O(1/T3/4) rates are achievable in general multi-player games and also analyze convergence of the dynamics to approximately optimal social welfare, where we show a convergence rate of O(1/T). The latter result was subsequently generalized to a broader class of learning algorithms by (Foster et al. 2016). This is based on joint work with Alekh Agarwal, Haipeng Luo and Robert E. Schapire.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75107012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A weighted linear matroid parity algorithm 加权线性拟阵奇偶校验算法
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055436
S. Iwata, Yusuke Kobayashi
The matroid parity (or matroid matching) problem, introduced as a common generalization of matching and matroid intersection problems, is so general that it requires an exponential number of oracle calls. Lovász (1980) showed that this problem admits a min-max formula and a polynomial algorithm for linearly represented matroids. Since then efficient algorithms have been developed for the linear matroid parity problem. In this paper, we present a combinatorial, deterministic, strongly polynomial algorithm for the weighted linear matroid parity problem. The algorithm builds on a polynomial matrix formulation using Pfaffian and adopts a primal-dual approach with the aid of the augmenting path algorithm of Gabow and Stallmann (1986) for the unweighted problem.
矩阵奇偶性(或矩阵匹配)问题,作为匹配和矩阵相交问题的一般概括而引入,它是如此普遍以至于需要指数级的oracle调用。Lovász(1980)表明,对于线性表示的拟阵,该问题允许使用最小-最大公式和多项式算法。此后,人们开发了求解线性拟阵宇称问题的有效算法。本文给出了加权线性拟阵宇称问题的一种组合的、确定性的强多项式算法。该算法基于Pfaffian的多项式矩阵公式,并借助于Gabow和Stallmann(1986)的增径路径算法,采用原始-对偶方法求解非加权问题。
{"title":"A weighted linear matroid parity algorithm","authors":"S. Iwata, Yusuke Kobayashi","doi":"10.1145/3055399.3055436","DOIUrl":"https://doi.org/10.1145/3055399.3055436","url":null,"abstract":"The matroid parity (or matroid matching) problem, introduced as a common generalization of matching and matroid intersection problems, is so general that it requires an exponential number of oracle calls. Lovász (1980) showed that this problem admits a min-max formula and a polynomial algorithm for linearly represented matroids. Since then efficient algorithms have been developed for the linear matroid parity problem. In this paper, we present a combinatorial, deterministic, strongly polynomial algorithm for the weighted linear matroid parity problem. The algorithm builds on a polynomial matrix formulation using Pfaffian and adopts a primal-dual approach with the aid of the augmenting path algorithm of Gabow and Stallmann (1986) for the unweighted problem.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76313854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Non-interactive delegation and batch NP verification from standard computational assumptions 基于标准计算假设的非交互式委托和批NP验证
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055497
Zvika Brakerski, Justin Holmgren, Y. Kalai
We present an adaptive and non-interactive protocol for verifying arbitrary efficient computations in fixed polynomial time. Our protocol is computationally sound and can be based on any computational PIR scheme, which in turn can be based on standard polynomial-time cryptographic assumptions (e.g. the worst case hardness of polynomial-factor approximation of short-vector lattice problems). In our protocol, the verifier sets up a public key ahead of time, and this key can be used by any prover to prove arbitrary statements by simpling sending a proof to the verifier. Verification is done using a secret verification key, and soundness relies on this key not being known to the prover. Our protocol further allows to prove statements about computations of arbitrary RAM machines. Previous works either relied on knowledge assumptions, or could only offer non-adaptive two-message protocols (where the first message could not be re-used), and required either obfuscation-based assumptions or super-polynomial hardness assumptions. We show that our techniques can also be applied to construct a new type of (non-adaptive) 2-message argument for batch NP-statements. Specifically, we can simultaneously prove (with computational soundness) the membership of multiple instances in a given NP language, with communication complexity proportional to the length of a single witness.
我们提出了一种自适应的非交互协议,用于在固定多项式时间内验证任意有效的计算。我们的协议在计算上是合理的,可以基于任何计算PIR方案,这反过来又可以基于标准的多项式时间密码假设(例如,短向量晶格问题的多项式因子近似的最坏情况的硬度)。在我们的协议中,验证者提前设置了公钥,任何证明者都可以通过简单地向验证者发送证明来使用该公钥来证明任意语句。验证是使用秘密验证密钥完成的,可靠性依赖于该密钥不为证明者所知。我们的协议进一步允许证明关于任意RAM机器计算的陈述。以前的工作要么依赖于知识假设,要么只能提供非自适应的双消息协议(其中第一条消息不能重用),并且需要基于混淆的假设或超多项式硬度假设。我们展示了我们的技术也可以应用于为批处理np语句构造一种新的(非自适应的)2消息参数。具体来说,我们可以同时证明给定NP语言中多个实例的隶属性(具有计算可靠性),通信复杂度与单个见证的长度成正比。
{"title":"Non-interactive delegation and batch NP verification from standard computational assumptions","authors":"Zvika Brakerski, Justin Holmgren, Y. Kalai","doi":"10.1145/3055399.3055497","DOIUrl":"https://doi.org/10.1145/3055399.3055497","url":null,"abstract":"We present an adaptive and non-interactive protocol for verifying arbitrary efficient computations in fixed polynomial time. Our protocol is computationally sound and can be based on any computational PIR scheme, which in turn can be based on standard polynomial-time cryptographic assumptions (e.g. the worst case hardness of polynomial-factor approximation of short-vector lattice problems). In our protocol, the verifier sets up a public key ahead of time, and this key can be used by any prover to prove arbitrary statements by simpling sending a proof to the verifier. Verification is done using a secret verification key, and soundness relies on this key not being known to the prover. Our protocol further allows to prove statements about computations of arbitrary RAM machines. Previous works either relied on knowledge assumptions, or could only offer non-adaptive two-message protocols (where the first message could not be re-used), and required either obfuscation-based assumptions or super-polynomial hardness assumptions. We show that our techniques can also be applied to construct a new type of (non-adaptive) 2-message argument for batch NP-statements. Specifically, we can simultaneously prove (with computational soundness) the membership of multiple instances in a given NP language, with communication complexity proportional to the length of a single witness.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88705749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Efficient massively parallel methods for dynamic programming 高效的大规模并行动态规划方法
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055460
Sungjin Im, Benjamin Moseley, Xiaorui Sun
Modern science and engineering is driven by massively large data sets and its advance heavily relies on massively parallel computing platforms such as Spark, MapReduce, and Hadoop. Theoretical models have been proposed to understand the power and limitations of such platforms. Recent study of developed theoretical models has led to the discovery of new algorithms that are fast and efficient in both theory and practice, thereby beginning to unlock their underlying power. Given recent promising results, the area has turned its focus on discovering widely applicable algorithmic techniques for solving problems efficiently. In this paper we make progress towards this goal by giving a principled framework for simulating sequential dynamic programs in the distributed setting. In particular, we identify two key properties, monotonicity and decomposability, which allow us to derive efficient distributed algorithms for problems possessing the properties. We showcase our framework by considering several core dynamic programming applications, Longest Increasing Subsequence, Optimal Binary Search Tree, and Weighted Interval Selection. For these problems, we derive algorithms yielding solutions that are arbitrarily close to the optimum, using O(1) rounds and Õ(n/m) memory on each machine where n is the input size and m is the number of machines available.
现代科学和工程是由海量数据集驱动的,它的进步很大程度上依赖于大规模并行计算平台,如Spark、MapReduce和Hadoop。已经提出了理论模型来理解这些平台的力量和局限性。最近对已开发的理论模型的研究导致了在理论和实践中都快速有效的新算法的发现,从而开始释放其潜在的力量。鉴于最近有希望的结果,该领域已将重点转向发现广泛适用的算法技术,以有效地解决问题。在本文中,我们通过给出一个有原则的框架来模拟分布式环境下的顺序动态程序,从而在这一目标上取得了进展。特别是,我们确定了两个关键性质,单调性和可分解性,这使我们能够为具有这些性质的问题推导出有效的分布式算法。我们通过考虑几个核心动态规划应用,最长递增子序列,最优二叉搜索树和加权区间选择来展示我们的框架。对于这些问题,我们推导出算法,生成任意接近最优的解决方案,在每台机器上使用O(1)轮和Õ(n/m)内存,其中n是输入大小,m是可用机器的数量。
{"title":"Efficient massively parallel methods for dynamic programming","authors":"Sungjin Im, Benjamin Moseley, Xiaorui Sun","doi":"10.1145/3055399.3055460","DOIUrl":"https://doi.org/10.1145/3055399.3055460","url":null,"abstract":"Modern science and engineering is driven by massively large data sets and its advance heavily relies on massively parallel computing platforms such as Spark, MapReduce, and Hadoop. Theoretical models have been proposed to understand the power and limitations of such platforms. Recent study of developed theoretical models has led to the discovery of new algorithms that are fast and efficient in both theory and practice, thereby beginning to unlock their underlying power. Given recent promising results, the area has turned its focus on discovering widely applicable algorithmic techniques for solving problems efficiently. In this paper we make progress towards this goal by giving a principled framework for simulating sequential dynamic programs in the distributed setting. In particular, we identify two key properties, monotonicity and decomposability, which allow us to derive efficient distributed algorithms for problems possessing the properties. We showcase our framework by considering several core dynamic programming applications, Longest Increasing Subsequence, Optimal Binary Search Tree, and Weighted Interval Selection. For these problems, we derive algorithms yielding solutions that are arbitrarily close to the optimum, using O(1) rounds and Õ(n/m) memory on each machine where n is the input size and m is the number of machines available.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78284331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
An efficient reduction from two-source to non-malleable extractors: achieving near-logarithmic min-entropy 从双源到不可延展性提取器的有效减少:实现近对数最小熵
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055423
Avraham Ben-Aroya, Dean Doron, A. Ta-Shma
The breakthrough result of Chattopadhyay and Zuckerman (2016) gives a reduction from the construction of explicit two-source extractors to the construction of explicit non-malleable extractors. However, even assuming the existence of optimal explicit non-malleable extractors only gives a two-source extractor (or a Ramsey graph) for poly(logn) entropy, rather than the optimal O(logn). In this paper we modify the construction to solve the above barrier. Using the currently best explicit non-malleable extractors we get an explicit bipartite Ramsey graphs for sets of size 2k, for k=O(logn loglogn). Any further improvement in the construction of non-malleable extractors would immediately yield a corresponding two-source extractor. Intuitively, Chattopadhyay and Zuckerman use an extractor as a sampler, and we observe that one could use a weaker object - a somewhere-random condenser with a small entropy gap and a very short seed. We also show how to explicitly construct this weaker object using the error reduction technique of Raz, Reingold and Vadhan (1999), and the constant-degree dispersers of Zuckerman (2006) that also work against extremely small tests.
Chattopadhyay和Zuckerman(2016)的突破性成果将显式双源提取器的构建简化为显式非延展性提取器的构建。然而,即使假设存在最优显式非可塑提取器,也只能给出多(logn)熵的双源提取器(或拉姆齐图),而不是最优的O(logn)。本文对结构进行了改进,以解决上述障碍。使用目前最好的显式非延展性提取器,我们得到了一个显式二部拉姆齐图,对于大小为2k的集合,k=O(logn loglogn)。在非延展性萃取剂结构上的任何进一步改进都将立即产生相应的双源萃取剂。直观地说,Chattopadhyay和Zuckerman使用一个提取器作为采样器,我们观察到可以使用一个更弱的对象——一个熵隙小、种子很短的随机冷凝器。我们还展示了如何使用Raz, Reingold和Vadhan(1999)的误差减少技术以及Zuckerman(2006)的恒定度分散器(也适用于极小的测试)显式地构建这个较弱的对象。
{"title":"An efficient reduction from two-source to non-malleable extractors: achieving near-logarithmic min-entropy","authors":"Avraham Ben-Aroya, Dean Doron, A. Ta-Shma","doi":"10.1145/3055399.3055423","DOIUrl":"https://doi.org/10.1145/3055399.3055423","url":null,"abstract":"The breakthrough result of Chattopadhyay and Zuckerman (2016) gives a reduction from the construction of explicit two-source extractors to the construction of explicit non-malleable extractors. However, even assuming the existence of optimal explicit non-malleable extractors only gives a two-source extractor (or a Ramsey graph) for poly(logn) entropy, rather than the optimal O(logn). In this paper we modify the construction to solve the above barrier. Using the currently best explicit non-malleable extractors we get an explicit bipartite Ramsey graphs for sets of size 2k, for k=O(logn loglogn). Any further improvement in the construction of non-malleable extractors would immediately yield a corresponding two-source extractor. Intuitively, Chattopadhyay and Zuckerman use an extractor as a sampler, and we observe that one could use a weaker object - a somewhere-random condenser with a small entropy gap and a very short seed. We also show how to explicitly construct this weaker object using the error reduction technique of Raz, Reingold and Vadhan (1999), and the constant-degree dispersers of Zuckerman (2006) that also work against extremely small tests.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81323431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Optimizing tree pattern queries: why cutting is not enough (invited talk) 优化树型查询:为什么砍树是不够的(特邀演讲)
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3079076
W. Martens
Tree pattern queries are a natural language for querying graph- and tree-structured data. A central question for understanding their optimization problem was whether they can be minimized by cutting away redundant parts. This question has been studied since the early 2000's and was recently resolved.
树模式查询是一种用于查询图和树结构数据的自然语言。理解它们的优化问题的一个核心问题是,它们是否可以通过切除冗余部分来最小化。这个问题从21世纪初就开始研究了,最近得到了解决。
{"title":"Optimizing tree pattern queries: why cutting is not enough (invited talk)","authors":"W. Martens","doi":"10.1145/3055399.3079076","DOIUrl":"https://doi.org/10.1145/3055399.3079076","url":null,"abstract":"Tree pattern queries are a natural language for querying graph- and tree-structured data. A central question for understanding their optimization problem was whether they can be minimized by cutting away redundant parts. This question has been studied since the early 2000's and was recently resolved.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81349668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent trends in decentralized cryptocurrencies (invited talk) 去中心化加密货币的最新趋势(特邀演讲)
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3079074
Aviv Zohar
Following Bitcoin's introduction, decentralized cryptocurrencies began to emerge as a new application domain for computer science. Bitcoin's protocol has been researched and improved upon along many fronts: from its underlying incentives, through to its cryptographic primitives and its security. Many research questions and challenges still remain as cryptocurrencies and other financial systems that rely on similar principles gain wider adoption.
随着比特币的引入,分散的加密货币开始成为计算机科学的一个新的应用领域。比特币的协议已经在许多方面得到了研究和改进:从其潜在的激励,到其加密原语和安全性。随着依赖类似原理的加密货币和其他金融系统得到更广泛的采用,许多研究问题和挑战仍然存在。
{"title":"Recent trends in decentralized cryptocurrencies (invited talk)","authors":"Aviv Zohar","doi":"10.1145/3055399.3079074","DOIUrl":"https://doi.org/10.1145/3055399.3079074","url":null,"abstract":"Following Bitcoin's introduction, decentralized cryptocurrencies began to emerge as a new application domain for computer science. Bitcoin's protocol has been researched and improved upon along many fronts: from its underlying incentives, through to its cryptographic primitives and its security. Many research questions and challenges still remain as cryptocurrencies and other financial systems that rely on similar principles gain wider adoption.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79102923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online service with delay 有延迟的网上服务
Pub Date : 2017-06-19 DOI: 10.1145/3055399.3055475
Y. Azar, Arun Ganesh, Rong Ge, Debmalya Panigrahi
In this paper, we introduce the online service with delay problem. In this problem, there are n points in a metric space that issue service requests over time, and a server that serves these requests. The goal is to minimize the sum of distance traveled by the server and the total delay (or a penalty function thereof) in serving the requests. This problem models the fundamental tradeoff between batching requests to improve locality and reducing delay to improve response time, that has many applications in operations management, operating systems, logistics, supply chain management, and scheduling. Our main result is to show a poly-logarithmic competitive ratio for the online service with delay problem. This result is obtained by an algorithm that we call the preemptive service algorithm. The salient feature of this algorithm is a process called preemptive service, which uses a novel combination of (recursive) time forwarding and spatial exploration on a metric space. We also generalize our results to k > 1 servers, and obtain stronger results for special metrics such as uniform and star metrics that correspond to (weighted) paging problems.
本文介绍了具有延迟问题的在线业务。在这个问题中,度量空间中有n个点随时间发出服务请求,以及为这些请求提供服务的服务器。目标是最小化服务器在处理请求时所经过的距离和总延迟(或延迟的惩罚函数)的总和。这个问题模拟了批处理请求以改进局部性和减少延迟以改进响应时间之间的基本权衡,这在操作管理、操作系统、物流、供应链管理和调度中有许多应用程序。我们的主要结果是展示了具有延迟问题的在线服务的多对数竞争比。这个结果是通过一种算法得到的,我们称之为抢占式服务算法。该算法的显著特点是一个称为抢占式服务的过程,该过程在度量空间上使用了(递归)时间转发和空间探索的新颖组合。我们还将我们的结果推广到k bbb101服务器,并获得了与(加权)分页问题相对应的统一和星形指标等特殊指标的更强的结果。
{"title":"Online service with delay","authors":"Y. Azar, Arun Ganesh, Rong Ge, Debmalya Panigrahi","doi":"10.1145/3055399.3055475","DOIUrl":"https://doi.org/10.1145/3055399.3055475","url":null,"abstract":"In this paper, we introduce the online service with delay problem. In this problem, there are n points in a metric space that issue service requests over time, and a server that serves these requests. The goal is to minimize the sum of distance traveled by the server and the total delay (or a penalty function thereof) in serving the requests. This problem models the fundamental tradeoff between batching requests to improve locality and reducing delay to improve response time, that has many applications in operations management, operating systems, logistics, supply chain management, and scheduling. Our main result is to show a poly-logarithmic competitive ratio for the online service with delay problem. This result is obtained by an algorithm that we call the preemptive service algorithm. The salient feature of this algorithm is a process called preemptive service, which uses a novel combination of (recursive) time forwarding and spatial exploration on a metric space. We also generalize our results to k > 1 servers, and obtain stronger results for special metrics such as uniform and star metrics that correspond to (weighted) paging problems.","PeriodicalId":20615,"journal":{"name":"Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72839880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
期刊
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1