首页 > 最新文献

2010 IEEE 51st Annual Symposium on Foundations of Computer Science最新文献

英文 中文
The Complexity of Distributions 分布的复杂性
Pub Date : 2010-10-23 DOI: 10.1137/100814998
Emanuele Viola
Complexity theory typically studies the complexity of computing a function $h(x) : zo^m to zo^n$ of a given input $x$. We advocate the study of the complexity of generating the distribution $h(x)$ for uniform $x$, given random bits. Our main results are: (1) Any function $f : zo^ell to zon$ such that (i) each output bit $f_i$ depends on $o(log n)$ input bits, and (ii) $ell le log_2 binom{n}{alpha n} + n^{0.99}$, has output distribution $f(U)$ at statistical distance $ge 1 - 1/n^{0.49}$ from the uniform distribution over $n$-bit strings of hamming weight $alpha n$. We also prove lower bounds for generating $(X,b(X))$ for boolean $b$, and in the case in which each bit $f_i$ is a small-depth decision tree. These lower bounds seem to be the first of their kind, the proofs use anti-concentration results for the sum of random variables. (2) Lower bounds for generating distributions imply succinct data structures lower bounds. As a corollary of (1), we obtain the first lower bound for the membership problem of representing a set $S subseteq [n]$ of size $alpha n$, in the case where $1/alpha$ is a power of $2$: If queries ``$i in S$?'' are answered by non-adaptively probing $o(log n)$ bits, then the representation uses $ge log_2 binom{n}{alpha n} + Omega(log n)$ bits. (3) Upper bounds complementing the bounds in (1) for various settings of parameters. (4) Uniform randomized $acz$ circuits of $poly(n)$ size and depth $d = O(1)$ with error $e$ can be simulated by uniform randomized $acz$ circuits of $poly(n)$ size and depth $d+1$ with error $e + o(1)$ using $le (log n)^{O( log log n)}$ random bits. Previous derandomizations [Ajtai and Wigderson '85, Nisan '91] increase the depth by a constant factor, or else have poor seed length.
复杂性理论通常研究计算给定输入$x$的函数$h(x) : zo^m to zo^n$的复杂性。我们提倡研究对于给定随机比特的均匀$x$生成分布$h(x)$的复杂性。我们的主要结果是:(1)任何函数$f : zo^ell to zon$这样(i)每个输出位$f_i$依赖于$o(log n)$输入位,以及(ii) $ell le log_2 binom{n}{alpha n} + n^{0.99}$,在统计距离$ge 1 - 1/n^{0.49}$上的输出分布$f(U)$与汉明权值$alpha n$的$n$位串的均匀分布。我们还证明了布尔$b$生成$(X,b(X))$的下界,其中每个位$f_i$是一个小深度决策树。这些下界似乎是同类中的第一个,证明使用了随机变量和的反集中结果。(2)生成分布的下界意味着简洁的数据结构下界。作为(1)的推论,我们得到了表示大小为$alpha n$的集合$S subseteq [n]$的隶属性问题的第一个下界,在$1/alpha$是$2$的幂次的情况下:如果查询“$i in S$ ?”由非自适应探测$o(log n)$位回答,则表示使用$ge log_2 binom{n}{alpha n} + Omega(log n)$位。(3)各参数设置的上界与(1)的上界互补。(4)均匀随机化$acz$电路的$poly(n)$大小和深度$d = O(1)$有误差$e$可以通过均匀随机化$acz$电路的$poly(n)$大小和深度$d+1$有误差$e + o(1)$使用$le (log n)^{O( log log n)}$随机位来模拟。以前的非随机化[Ajtai和Wigderson '85, Nisan '91]以常数因子增加深度,否则种子长度就很差。
{"title":"The Complexity of Distributions","authors":"Emanuele Viola","doi":"10.1137/100814998","DOIUrl":"https://doi.org/10.1137/100814998","url":null,"abstract":"Complexity theory typically studies the complexity of computing a function $h(x) : zo^m to zo^n$ of a given input $x$. We advocate the study of the complexity of generating the distribution $h(x)$ for uniform $x$, given random bits. Our main results are: (1) Any function $f : zo^ell to zon$ such that (i) each output bit $f_i$ depends on $o(log n)$ input bits, and (ii) $ell le log_2 binom{n}{alpha n} + n^{0.99}$, has output distribution $f(U)$ at statistical distance $ge 1 - 1/n^{0.49}$ from the uniform distribution over $n$-bit strings of hamming weight $alpha n$. We also prove lower bounds for generating $(X,b(X))$ for boolean $b$, and in the case in which each bit $f_i$ is a small-depth decision tree. These lower bounds seem to be the first of their kind, the proofs use anti-concentration results for the sum of random variables. (2) Lower bounds for generating distributions imply succinct data structures lower bounds. As a corollary of (1), we obtain the first lower bound for the membership problem of representing a set $S subseteq [n]$ of size $alpha n$, in the case where $1/alpha$ is a power of $2$: If queries ``$i in S$?'' are answered by non-adaptively probing $o(log n)$ bits, then the representation uses $ge log_2 binom{n}{alpha n} + Omega(log n)$ bits. (3) Upper bounds complementing the bounds in (1) for various settings of parameters. (4) Uniform randomized $acz$ circuits of $poly(n)$ size and depth $d = O(1)$ with error $e$ can be simulated by uniform randomized $acz$ circuits of $poly(n)$ size and depth $d+1$ with error $e + o(1)$ using $le (log n)^{O( log log n)}$ random bits. Previous derandomizations [Ajtai and Wigderson '85, Nisan '91] increase the depth by a constant factor, or else have poor seed length.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117007385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Agnostically Learning under Permutation Invariant Distributions 排列不变分布下的不可知论学习
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.17
K. Wimmer
We generalize algorithms from computational learning theory that are successful under the uniform distribution on the Boolean hypercube ${0,1}^n$ to algorithms successful on permutation invariant distributions. A permutation invariant distribution is a distribution where the probability mass remains constant upon permutations in the instances. While the tools in our generalization mimic those used for the Boolean hypercube, the fact that permutation invariant distributions are not product distributions presents a significant obstacle. Under the uniform distribution, half spaces can be agnostically learned in polynomial time for constant $eps$. The main tools used are a theorem of Peres~cite{Peres04} bounding the {it noise sensitivity} of a half space, a result of~cite{KOS04} that this theorem implies Fourier concentration, and a modification of the Low-Degree algorithm of Linial, Man sour, Nisan~cite{LMN:93} made by Kalai et. al.~cite{KKMS08}. These results are extended to arbitrary product distributions in~cite{BOWi08}. We prove analogous results for permutation invariant distributions, more generally, we work in the domain of the symmetric group. We define noise sensitivity in this setting, and show that noise sensitivity has a nice combinatorial interpretation in terms of Young tableaux. The main technical innovations involve techniques from the representation theory of the symmetric group, especially the combinatorics of Young tableaux. We show that low noise sensitivity implies concentration on “simple'' components of the Fourier spectrum, and that this fact will allow us to agnostically learn half spaces under permutation invariant distributions to constant accuracy in roughly the same time as in the uniform distribution over the Boolean hypercube case.
我们将计算学习理论中在布尔超立方${0,1}^n$均匀分布下成功的算法推广到在置换不变分布下成功的算法。排列不变分布是指实例中发生排列后概率质量保持不变的分布。虽然我们泛化中的工具模拟了用于布尔超立方体的工具,但排列不变分布不是乘积分布这一事实构成了一个重大障碍。在均匀分布下,对于常数$eps$,半空间可以在多项式时间内进行不可知论学习。使用的主要工具是Peres的一个定理cite{Peres04}限定了半空间的{it噪声灵敏度},cite{KOS04}的结果表明该定理意味着傅里叶浓度,以及Kalai等人cite{KKMS08}对Linial, Man sour, Nisan cite{LMN:93}的Low-Degree算法的修改。这些结果推广到cite{BOWi08}中的任意乘积分布。我们证明了置换不变分布的类似结果,更一般地说,我们是在对称群的定义域上工作的。在这种情况下,我们定义了噪声敏感性,并表明噪声敏感性在杨氏场景中有一个很好的组合解释。主要的技术创新涉及对称群的表示理论,特别是杨格表的组合学。我们表明,低噪声灵敏度意味着集中在傅立叶谱的“简单”分量上,这一事实将使我们能够在排列不变分布下以恒定精度不可知论地学习半空间,其时间与布尔超立方体情况下的均匀分布大致相同。
{"title":"Agnostically Learning under Permutation Invariant Distributions","authors":"K. Wimmer","doi":"10.1109/FOCS.2010.17","DOIUrl":"https://doi.org/10.1109/FOCS.2010.17","url":null,"abstract":"We generalize algorithms from computational learning theory that are successful under the uniform distribution on the Boolean hypercube ${0,1}^n$ to algorithms successful on permutation invariant distributions. A permutation invariant distribution is a distribution where the probability mass remains constant upon permutations in the instances. While the tools in our generalization mimic those used for the Boolean hypercube, the fact that permutation invariant distributions are not product distributions presents a significant obstacle. Under the uniform distribution, half spaces can be agnostically learned in polynomial time for constant $eps$. The main tools used are a theorem of Peres~cite{Peres04} bounding the {it noise sensitivity} of a half space, a result of~cite{KOS04} that this theorem implies Fourier concentration, and a modification of the Low-Degree algorithm of Linial, Man sour, Nisan~cite{LMN:93} made by Kalai et. al.~cite{KKMS08}. These results are extended to arbitrary product distributions in~cite{BOWi08}. We prove analogous results for permutation invariant distributions, more generally, we work in the domain of the symmetric group. We define noise sensitivity in this setting, and show that noise sensitivity has a nice combinatorial interpretation in terms of Young tableaux. The main technical innovations involve techniques from the representation theory of the symmetric group, especially the combinatorics of Young tableaux. We show that low noise sensitivity implies concentration on “simple'' components of the Fourier spectrum, and that this fact will allow us to agnostically learn half spaces under permutation invariant distributions to constant accuracy in roughly the same time as in the uniform distribution over the Boolean hypercube case.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114879144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Black-Box Randomized Reductions in Algorithmic Mechanism Design 算法机制设计中的黑盒随机约简
Pub Date : 2010-10-23 DOI: 10.1137/110843654
S. Dughmi, T. Roughgarden
We give the first black-box reduction from arbitrary approximation algorithms to truthful approximation mechanisms for a non-trivial class of multi-parameter problems. Specifically, we prove that every packing problem that admits an FPTAS also admits a truthful-in-expectation randomized mechanism that is an FPTAS. Our reduction makes novel use of smoothed analysis, by employing small perturbations as a tool in algorithmic mechanism design. We develop a “duality'' between linear perturbations of the objective function of an optimization problem and of its feasible set, and use the “primal'' and “dual'' viewpoints to prove the running time bound and the truthfulness guarantee, respectively, for our mechanism.
针对一类非平凡的多参数问题,首次给出了从任意近似算法到真实近似机制的黑盒约简。具体来说,我们证明了每个包含FPTAS的包装问题也包含一个期望真实随机机制,即FPTAS。我们的简化使平滑分析的新颖使用,通过采用小扰动作为算法机制设计的工具。我们建立了优化问题目标函数的线性扰动与其可行集的“对偶性”,并分别用“原始”和“对偶”的观点证明了我们的机制的运行时间界限和真实性保证。
{"title":"Black-Box Randomized Reductions in Algorithmic Mechanism Design","authors":"S. Dughmi, T. Roughgarden","doi":"10.1137/110843654","DOIUrl":"https://doi.org/10.1137/110843654","url":null,"abstract":"We give the first black-box reduction from arbitrary approximation algorithms to truthful approximation mechanisms for a non-trivial class of multi-parameter problems. Specifically, we prove that every packing problem that admits an FPTAS also admits a truthful-in-expectation randomized mechanism that is an FPTAS. Our reduction makes novel use of smoothed analysis, by employing small perturbations as a tool in algorithmic mechanism design. We develop a “duality'' between linear perturbations of the objective function of an optimization problem and of its feasible set, and use the “primal'' and “dual'' viewpoints to prove the running time bound and the truthfulness guarantee, respectively, for our mechanism.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124514371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Fighting Perebor: New and Improved Algorithms for Formula and QBF Satisfiability 对抗缺陷:公式和QBF可满足性的新改进算法
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.25
R. Santhanam
We investigate the possibility of finding satisfying assignments to Boolean formulae and testing validity of quantified Boolean formulae (QBF) asymptotically faster than a brute force search. Our first main result is a simple deterministic algorithm running in time $2^{n - Omega(n)}$ for satisfiability of formulae of linear size in $n$, where $n$ is the number of variables in the formula. This algorithm extends to exactly counting the number of satisfying assignments, within the same time bound. Our second main result is a deterministic algorithm running in time $2^{n - Omega(n/log(n))}$ for solving QBFs in which the number of occurrences of any variable is bounded by a constant. For instances which are ``structured'', in a certain precise sense, the algorithm can be modified to run in time $2^{n - Omega(n)}$. To the best of our knowledge, no non-trivial algorithms were known for these problems before. As a byproduct of the technique used to establish our first main result, we show that every function computable by linear-size formulae can be represented by decision trees of size $2^{n - Omega(n)}$. As a consequence, we get strong super linear {it average-case} formula size lower bounds for the Parity function.
我们研究了找到布尔公式的满意赋值和检验量化布尔公式(QBF)的渐近有效性的可能性,比暴力搜索更快。我们的第一个主要结果是一个简单的确定性算法运行在时间$2^{n - Omega(n)}$中,用于$n$中线性大小公式的可满足性,其中$n$是公式中的变量数。该算法扩展到在相同的时间范围内精确计算满意分配的数量。我们的第二个主要结果是一个及时运行的确定性算法$2^{n - Omega(n/log(n))}$,用于求解QBFs,其中任何变量的出现次数都以常数为界。对于“结构化”的实例,在一定的精确意义上,算法可以修改以及时运行$2^{n - Omega(n)}$。据我们所知,之前还没有针对这些问题的非平凡算法。作为用于建立我们第一个主要结果的技术的副产品,我们证明了每个可由线性大小公式计算的函数都可以由大小为$2^{n - Omega(n)}$的决策树表示。因此,我们得到了奇偶{it性函数的强超线性平均情况}公式大小下界。
{"title":"Fighting Perebor: New and Improved Algorithms for Formula and QBF Satisfiability","authors":"R. Santhanam","doi":"10.1109/FOCS.2010.25","DOIUrl":"https://doi.org/10.1109/FOCS.2010.25","url":null,"abstract":"We investigate the possibility of finding satisfying assignments to Boolean formulae and testing validity of quantified Boolean formulae (QBF) asymptotically faster than a brute force search. Our first main result is a simple deterministic algorithm running in time $2^{n - Omega(n)}$ for satisfiability of formulae of linear size in $n$, where $n$ is the number of variables in the formula. This algorithm extends to exactly counting the number of satisfying assignments, within the same time bound. Our second main result is a deterministic algorithm running in time $2^{n - Omega(n/log(n))}$ for solving QBFs in which the number of occurrences of any variable is bounded by a constant. For instances which are ``structured'', in a certain precise sense, the algorithm can be modified to run in time $2^{n - Omega(n)}$. To the best of our knowledge, no non-trivial algorithms were known for these problems before. As a byproduct of the technique used to establish our first main result, we show that every function computable by linear-size formulae can be represented by decision trees of size $2^{n - Omega(n)}$. As a consequence, we get strong super linear {it average-case} formula size lower bounds for the Parity function.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126343448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage 克服桶中的洞:对持续内存泄漏具有弹性的公钥加密
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.55
Zvika Brakerski, Y. Kalai, Jonathan Katz, V. Vaikuntanathan
In recent years, there has been a major effort to design cryptographic schemes that remain secure even when arbitrary information about the secret key is leaked (e.g., via side-channel attacks). We explore the possibility of achieving security under emph{continual} leakage from the emph{entire} secret key by designing schemes in which the secret key is updated over time. In this model, we construct public-key encryption schemes, digital signatures, and identity-based encryption schemes that remain secure even if an attacker can leak a constant fraction of the secret memory (including the secret key) in each time period between key updates. We also consider attackers who may probe the secret memory during the updates themselves. We stress that we allow unrestricted leakage, without the assumption that ``only computation leaks information''. Prior to this work, constructions of public-key encryption schemes secure under continual leakage were not known even under this assumption.
近年来,人们一直在努力设计加密方案,即使在有关密钥的任意信息泄露(例如,通过侧信道攻击)时也能保持安全。我们通过设计秘钥随时间更新的方案,探索在emph{整个}秘钥emph{持续}泄漏的情况下实现安全的可能性。在这个模型中,我们构建了公开密钥加密方案、数字签名和基于身份的加密方案,即使攻击者可以在密钥更新之间的每个时间段内泄漏一定比例的秘密内存(包括秘密密钥),这些方案仍然保持安全。我们还考虑了可能在更新期间自己探测秘密内存的攻击者。我们强调,我们允许无限制的泄漏,而不是假设“只有计算泄露信息”。在此工作之前,即使在这种假设下,也不知道在连续泄漏下安全的公钥加密方案的结构。
{"title":"Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage","authors":"Zvika Brakerski, Y. Kalai, Jonathan Katz, V. Vaikuntanathan","doi":"10.1109/FOCS.2010.55","DOIUrl":"https://doi.org/10.1109/FOCS.2010.55","url":null,"abstract":"In recent years, there has been a major effort to design cryptographic schemes that remain secure even when arbitrary information about the secret key is leaked (e.g., via side-channel attacks). We explore the possibility of achieving security under emph{continual} leakage from the emph{entire} secret key by designing schemes in which the secret key is updated over time. In this model, we construct public-key encryption schemes, digital signatures, and identity-based encryption schemes that remain secure even if an attacker can leak a constant fraction of the secret memory (including the secret key) in each time period between key updates. We also consider attackers who may probe the secret memory during the updates themselves. We stress that we allow unrestricted leakage, without the assumption that ``only computation leaks information''. Prior to this work, constructions of public-key encryption schemes secure under continual leakage were not known even under this assumption.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131036183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 219
Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions 基于Raecke分解的边不相交路径问题逼近算法
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.33
M. Andrews
We study the Edge-Disjoint Paths with Congestion (EDPwC) problem in undirected networks in which we must integrally route a set of demands without causing large congestion on an edge. We present a $(polylog(n), poly(loglog n))$-approximation, which means that if there exists a solution that routes $X$ demands integrally on edge-disjoint paths (i.e. with congestion $1$), then the approximation algorithm can route $X/polylog(n)$ demands with congestion $poly(loglog n)$. The best previous result for this problem was a $(n^{1/beta}, beta)$-approximation for $beta
研究了无向网络中的边不相交路径与拥塞(EDPwC)问题,在无向网络中,我们必须在不引起大拥塞的情况下完整地路由一组需求。我们提出了一个$(polylog(n), poly(loglog n))$-近似,这意味着如果存在一个解可以在边不相交的路径上完整地路由$X$需求(即具有拥塞$1$),那么该近似算法可以路由$X/polylog(n)$需求与拥塞$poly(loglog n)$。这个问题之前最好的结果是$(n^{1/beta}, beta)$-近似
{"title":"Approximation Algorithms for the Edge-Disjoint Paths Problem via Raecke Decompositions","authors":"M. Andrews","doi":"10.1109/FOCS.2010.33","DOIUrl":"https://doi.org/10.1109/FOCS.2010.33","url":null,"abstract":"We study the Edge-Disjoint Paths with Congestion (EDPwC) problem in undirected networks in which we must integrally route a set of demands without causing large congestion on an edge. We present a $(polylog(n), poly(loglog n))$-approximation, which means that if there exists a solution that routes $X$ demands integrally on edge-disjoint paths (i.e. with congestion $1$), then the approximation algorithm can route $X/polylog(n)$ demands with congestion $poly(loglog n)$. The best previous result for this problem was a $(n^{1/beta}, beta)$-approximation for $beta","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128720073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis 隐私保护数据分析的乘权机制
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.85
Moritz Hardt, G. Rothblum
We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual participants, and releases privacy-preserving answers to queries as they arrive. Our primary contribution is a new differentially private multiplicative weights mechanism for answering a large number of interactive counting (or linear) queries that arrive online and may be adaptively chosen. This is the first mechanism with worst-case accuracy guarantees that can answer large numbers of interactive queries and is {em efficient} (in terms of the runtime's dependence on the data universe size). The error is asymptotically emph{optimal} in its dependence on the number of participants, and depends only logarithmically on the number of queries being answered. The running time is nearly {em linear} in the size of the data universe. As a further contribution, when we relax the utility requirement and require accuracy only for databases drawn from a rich class of databases, we obtain exponential improvements in running time. Even in this relaxed setting we continue to guarantee privacy for {em any} input database. Only the utility requirement is relaxed. Specifically, we show that when the input database is drawn from a {em smooth} distribution — a distribution that does not place too much weight on any single data item — accuracy remains as above, and the running time becomes {em poly-logarithmic} in the data universe size. The main technical contributions are the application of multiplicative weights techniques to the differential privacy setting, a new privacy analysis for the interactive setting, and a technique for reducing data dimensionality for databases drawn from smooth distributions.
我们考虑在互动设置统计数据分析。在这种设置中,受信任的管理员维护有关单个参与者的敏感信息的数据库,并在查询到达时发布保留隐私的答案。我们的主要贡献是一种新的差分私有乘权机制,用于回答大量在线的交互式计数(或线性)查询,这些查询可以自适应地选择。这是第一种具有最坏情况准确性保证的机制,它可以回答大量交互式查询,并且{em效率}很高(就运行时对数据范围大小的依赖而言)。误差是渐近emph{最优}的,因为它依赖于参与者的数量,并且只依赖于被回答的查询的数量。运行时间在数据空间的大小上几乎是{em线性}的。作为进一步的贡献,当我们放宽实用性要求,只要求从丰富的数据库类中提取的数据库的准确性时,我们在运行时间上获得了指数级的改进。即使在这种宽松的环境中,我们也继续保证{em任何}输入数据库的隐私。只有效用要求放宽了。具体地说,我们展示了当输入数据库从{em平滑}分布中提取时(这种分布不会对任何单个数据项施加过多的权重),精度保持如上所述,并且运行时间在数据范围大小中变为多{em对数}。主要的技术贡献是将乘法权值技术应用于差分隐私设置,一种新的交互式隐私分析,以及一种从平滑分布中提取的数据库的数据降维技术。
{"title":"A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis","authors":"Moritz Hardt, G. Rothblum","doi":"10.1109/FOCS.2010.85","DOIUrl":"https://doi.org/10.1109/FOCS.2010.85","url":null,"abstract":"We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual participants, and releases privacy-preserving answers to queries as they arrive. Our primary contribution is a new differentially private multiplicative weights mechanism for answering a large number of interactive counting (or linear) queries that arrive online and may be adaptively chosen. This is the first mechanism with worst-case accuracy guarantees that can answer large numbers of interactive queries and is {em efficient} (in terms of the runtime's dependence on the data universe size). The error is asymptotically emph{optimal} in its dependence on the number of participants, and depends only logarithmically on the number of queries being answered. The running time is nearly {em linear} in the size of the data universe. As a further contribution, when we relax the utility requirement and require accuracy only for databases drawn from a rich class of databases, we obtain exponential improvements in running time. Even in this relaxed setting we continue to guarantee privacy for {em any} input database. Only the utility requirement is relaxed. Specifically, we show that when the input database is drawn from a {em smooth} distribution — a distribution that does not place too much weight on any single data item — accuracy remains as above, and the running time becomes {em poly-logarithmic} in the data universe size. The main technical contributions are the application of multiplicative weights techniques to the differential privacy setting, a new privacy analysis for the interactive setting, and a technique for reducing data dimensionality for databases drawn from smooth distributions.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 411
On the Queue Number of Planar Graphs 关于平面图的队列数
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.42
G. Battista, Fabrizio Frati, J. Pach
We prove that planar graphs have poly-logarithmic queue number, thus improving upon the previous polynomial upper bound. Consequently, planar graphs admit 3D straight-line crossing-free grid drawings in small volume.
我们证明了平面图具有多对数队列数,从而改进了先前的多项式上界。因此,平面图允许在小体积内绘制三维直线无交叉网格。
{"title":"On the Queue Number of Planar Graphs","authors":"G. Battista, Fabrizio Frati, J. Pach","doi":"10.1109/FOCS.2010.42","DOIUrl":"https://doi.org/10.1109/FOCS.2010.42","url":null,"abstract":"We prove that planar graphs have poly-logarithmic queue number, thus improving upon the previous polynomial upper bound. Consequently, planar graphs admit 3D straight-line crossing-free grid drawings in small volume.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124267378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
All-Pairs Shortest Paths in O(n²) Time with High Probability O(n²)时间内高概率的全对最短路径
Pub Date : 2010-10-23 DOI: 10.1145/2508028.2505988
Y. Peres, D. Sotnikov, B. Sudakov, Uri Zwick
We present an all-pairs shortest path algorithm whose running time on a complete directed graph on $n$ vertices whose edge weights are chosen independently and uniformly at random from $[0,1]$ is~$O(n^2)$, in expectation and with high probability. This resolves a long standing open problem. The algorithm is a variant of the dynamic all-pairs shortest paths algorithm of Demetrescu and Italiano. The analysis relies on a proof that the number of emph{locally shortest paths} in such randomly weighted graphs is $O(n^2)$, in expectation and with high probability. We also present a dynamic version of the algorithm that recomputes all shortest paths after a random edge update in $O(log^{2}n)$ expected time.
本文提出了一种全对最短路径算法,该算法在$n$个顶点上的完全有向图上的运行时间为$O(n^2)$,且这些顶点的边权在$[0,1]$上独立且均匀随机地选择。这解决了一个长期悬而未决的问题。该算法是Demetrescu和Italiano的动态全对最短路径算法的一种变体。该分析依赖于这样一个证明:在这种随机加权图中,emph{局部最短路径}的数量是$O(n^2)$,在期望范围内,并且具有高概率。我们还提出了该算法的动态版本,该算法在$O(log^{2}n)$预期时间内随机更新边缘后重新计算所有最短路径。
{"title":"All-Pairs Shortest Paths in O(n²) Time with High Probability","authors":"Y. Peres, D. Sotnikov, B. Sudakov, Uri Zwick","doi":"10.1145/2508028.2505988","DOIUrl":"https://doi.org/10.1145/2508028.2505988","url":null,"abstract":"We present an all-pairs shortest path algorithm whose running time on a complete directed graph on $n$ vertices whose edge weights are chosen independently and uniformly at random from $[0,1]$ is~$O(n^2)$, in expectation and with high probability. This resolves a long standing open problem. The algorithm is a variant of the dynamic all-pairs shortest paths algorithm of Demetrescu and Italiano. The analysis relies on a proof that the number of emph{locally shortest paths} in such randomly weighted graphs is $O(n^2)$, in expectation and with high probability. We also present a dynamic version of the algorithm that recomputes all shortest paths after a random edge update in $O(log^{2}n)$ expected time.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123083873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Logspace Versions of the Theorems of Bodlaender and Courcelle Bodlaender定理和Courcelle定理的对数空间版本
Pub Date : 2010-10-23 DOI: 10.1109/FOCS.2010.21
Michael Elberfeld, A. Jakoby, Till Tantau
Bodlaender's Theorem states that for every k there is a linear-time algorithm that decides whether an input graph has tree width k and, if so, computes a width-k tree composition. Courcelle's Theorem builds on Bodlaender's Theorem and states that for every monadic second-order formula φ and for every k there is a linear-time algorithm that decides whether a given logical structure A of tree width at most k satisfies φ. We prove that both theorems still hold when "linear time" is replaced by "logarithmic space." The transfer of the powerful theoretical framework of monadic second-order logic and bounded tree width to logarithmic space allows us to settle a number of both old and recent open problems in the log space world.
Bodlaender定理指出,对于每一个k,都有一个线性时间算法来决定输入图是否具有树宽度k,如果是,则计算宽度为k的树组成。Courcelle定理建立在Bodlaender定理的基础上,指出对于每一个一元二阶公式φ和每一个k,都有一个线性时间算法来决定给定的树宽度不超过k的逻辑结构a是否满足φ。我们证明当“线性时间”被“对数空间”取代时,这两个定理仍然成立。将一元二阶逻辑和有界树宽度的强大理论框架转移到对数空间,使我们能够解决对数空间世界中许多既老又新的开放问题。
{"title":"Logspace Versions of the Theorems of Bodlaender and Courcelle","authors":"Michael Elberfeld, A. Jakoby, Till Tantau","doi":"10.1109/FOCS.2010.21","DOIUrl":"https://doi.org/10.1109/FOCS.2010.21","url":null,"abstract":"Bodlaender's Theorem states that for every k there is a linear-time algorithm that decides whether an input graph has tree width k and, if so, computes a width-k tree composition. Courcelle's Theorem builds on Bodlaender's Theorem and states that for every monadic second-order formula φ and for every k there is a linear-time algorithm that decides whether a given logical structure A of tree width at most k satisfies φ. We prove that both theorems still hold when \"linear time\" is replaced by \"logarithmic space.\" The transfer of the powerful theoretical framework of monadic second-order logic and bounded tree width to logarithmic space allows us to settle a number of both old and recent open problems in the log space world.","PeriodicalId":228365,"journal":{"name":"2010 IEEE 51st Annual Symposium on Foundations of Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129760191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
期刊
2010 IEEE 51st Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1