首页 > 最新文献

Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science最新文献

英文 中文
Competitive k-server algorithms 竞争性k-server算法
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89566
A. Fiat, Y. Rabani, Yiftach Ravid
Deterministic competitive k-server algorithms are given for all k and all metric spaces. This settles the k-server conjecture of M.S. Manasse et al. (1988) up to the competitive ratio. The best previous result for general metric spaces was a three-server randomized competitive algorithm and a nonconstructive proof that a deterministic three-server competitive algorithm exists. The competitive ratio the present authors can prove is exponential in the number of servers. Thus, the question of the minimal competitive ratio for arbitrary metric spaces is still open. The methods set forth here also give competitive algorithms for a natural generalization of the k-server problem, called the k-taxicab problem.<>
给出了所有k和所有度量空间的确定性竞争k-server算法。这就解决了M.S. Manasse等人(1988)关于竞争比率的k-server猜想。一般度量空间的最佳结果是一个三服务器随机竞争算法和一个确定性三服务器竞争算法存在的非建设性证明。本文作者所证明的竞争比在服务器数量上呈指数增长。因此,任意度量空间的最小竞争比问题仍然是开放的。这里提出的方法也为k-服务器问题的自然推广提供了竞争算法,称为k-出租车问题。
{"title":"Competitive k-server algorithms","authors":"A. Fiat, Y. Rabani, Yiftach Ravid","doi":"10.1109/FSCS.1990.89566","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89566","url":null,"abstract":"Deterministic competitive k-server algorithms are given for all k and all metric spaces. This settles the k-server conjecture of M.S. Manasse et al. (1988) up to the competitive ratio. The best previous result for general metric spaces was a three-server randomized competitive algorithm and a nonconstructive proof that a deterministic three-server competitive algorithm exists. The competitive ratio the present authors can prove is exponential in the number of servers. Thus, the question of the minimal competitive ratio for arbitrary metric spaces is still open. The methods set forth here also give competitive algorithms for a natural generalization of the k-server problem, called the k-taxicab problem.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130287998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 165
Security preserving amplification of hardness 安全保护,硬度放大
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89550
Oded Goldreich, R. Impagliazzo, L. Levin, R. Venkatesan, David Zuckerman
The task of transforming a weak one-way function (which may be easily inverted on all but a polynomial fraction of the range) into a strong one-way function (which can be easily inverted only on a negligible function of the range) is considered. The previously known transformation does not preserve the security (i.e. the running time of the inverting algorithm) within any polynomial. Its resulting function, F(x), applies the weak one-way function to many small (of length mod x mod /sup theta /, theta <1) pieces of the input. Consequently, the function can be inverted for reasonable input lengths by exhaustive search. Random walks on constructive expanders are used to transform any regular (e.g. one-to-one) weak one-way function into a strong one, while preserving security. The resulting function, F(x), applies the weak one-way f to strings of length Theta ( mod x mod ). The security-preserving constructions yield efficient pseudorandom generators and signatures based on any regular one-way function.<>
考虑将弱单向函数(除了在值域的多项式分数上可以很容易地反转)转换为强单向函数(只能在值域的可忽略函数上很容易地反转)的任务。先前已知的变换在任何多项式内都不能保证安全性(即逆变算法的运行时间)。其结果函数F(x)将弱单向函数应用于许多长度为mod x的小函数mod /sup θ /, θ >
{"title":"Security preserving amplification of hardness","authors":"Oded Goldreich, R. Impagliazzo, L. Levin, R. Venkatesan, David Zuckerman","doi":"10.1109/FSCS.1990.89550","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89550","url":null,"abstract":"The task of transforming a weak one-way function (which may be easily inverted on all but a polynomial fraction of the range) into a strong one-way function (which can be easily inverted only on a negligible function of the range) is considered. The previously known transformation does not preserve the security (i.e. the running time of the inverting algorithm) within any polynomial. Its resulting function, F(x), applies the weak one-way function to many small (of length mod x mod /sup theta /, theta <1) pieces of the input. Consequently, the function can be inverted for reasonable input lengths by exhaustive search. Random walks on constructive expanders are used to transform any regular (e.g. one-to-one) weak one-way function into a strong one, while preserving security. The resulting function, F(x), applies the weak one-way f to strings of length Theta ( mod x mod ). The security-preserving constructions yield efficient pseudorandom generators and signatures based on any regular one-way function.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Separating distribution-free and mistake-bound learning models over the Boolean domain 在布尔域上分离无分布和错误约束的学习模型
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89540
Avrim Blum
Two of the most commonly used models in computational learning theory are the distribution-free model, in which examples are chosen from a fixed but arbitrary distribution, and the absolute mistake-bound model, in which examples are presented in order by an adversary. Over the Boolean domain
计算学习理论中最常用的两种模型是无分布模型,其中示例从固定但任意的分布中选择,以及绝对错误约束模型,其中示例由对手按顺序呈现。在布尔域上
{"title":"Separating distribution-free and mistake-bound learning models over the Boolean domain","authors":"Avrim Blum","doi":"10.1109/FSCS.1990.89540","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89540","url":null,"abstract":"Two of the most commonly used models in computational learning theory are the distribution-free model, in which examples are chosen from a fixed but arbitrary distribution, and the absolute mistake-bound model, in which examples are presented in order by an adversary. Over the Boolean domain","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122789716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Computing with snakes in directed networks of automata 有向自动机网络中的蛇形计算
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89596
S. Even, A. Litman, P. Winkler
Directed, strongly connected networks of finite-state automata, of bounded in- and outdegree but unknown topology and unbounded size n, are considered. Protocols that are quadratic or linear in n and accomplish the following tasks are provided: waking up and reporting when done, constructing smart spanning trees out from the root and in to the root, conducting breadth-first and depth-first searches, sending a message from the endpoint of a (directed) edge to its startpoint, running a slow clock, and solving the firing squad synchronization problem. The protocols are highly parallel and entail the use of sequences of signals called 'snakes''. All the tasks are accomplished in less time than is possible with any previously known techniques.<>
研究了有限状态自动机的有向强连接网络,该网络的进出度有界,但拓扑未知,大小n无界。提供了在n中为二次或线性的协议,并完成以下任务:在完成时唤醒和报告,构建从根到根的智能生成树,进行广度优先和深度优先搜索,从(有向)边缘的端点向其起点发送消息,运行慢时钟,并解决射击队同步问题。协议是高度并行的,需要使用被称为“蛇”的信号序列。所有的任务都是在更短的时间内完成的,比任何以前已知的技术都可能
{"title":"Computing with snakes in directed networks of automata","authors":"S. Even, A. Litman, P. Winkler","doi":"10.1109/FSCS.1990.89596","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89596","url":null,"abstract":"Directed, strongly connected networks of finite-state automata, of bounded in- and outdegree but unknown topology and unbounded size n, are considered. Protocols that are quadratic or linear in n and accomplish the following tasks are provided: waking up and reporting when done, constructing smart spanning trees out from the root and in to the root, conducting breadth-first and depth-first searches, sending a message from the endpoint of a (directed) edge to its startpoint, running a slow clock, and solving the firing squad synchronization problem. The protocols are highly parallel and entail the use of sequences of signals called 'snakes''. All the tasks are accomplished in less time than is possible with any previously known techniques.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122843384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A dining philosophers algorithm with polynomial response time 具有多项式响应时间的用餐哲学家算法
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89525
B. Awerbuch, M. Saks
Presents an efficient distributed online algorithm for scheduling jobs that are created dynamically, subject to resource constraints that require that certain pairs of jobs not run concurrently. The focus is on the response time of the system to each job, i.e. the length of the time interval that starts when the job is created or assigned to a processor and ends at the instant the execution of the job begins. The goal is to provide guarantees on the response time to each job j in terms of the density of arrivals of jobs that conflict with j. The model is completely asynchronous and includes various resource allocation problems that have been studied extensively, including the dining philosophers problem and its generalizations to arbitrary networks. In these versions of the problem, the resource requirements of each new job j determines an upper bound delta /sub j/ on the number of jobs that can exist concurrently in the system and conflict with j. Given such upper bounds, no scheduling algorithm can guarantee a response time better than delta /sub j/ times the maximum execution or message transmission time. A simple algorithm that guarantees response time that is essentially polynomial in delta /sub j/ is presented. It is based on the notion of a distribution queue and has a compact implementation.<>
提出一种高效的分布式在线算法,用于调度动态创建的作业,这些作业受资源约束,要求某些作业对不能并发运行。重点是系统对每个作业的响应时间,即从作业创建或分配给处理器开始到作业开始执行时结束的时间间隔的长度。目标是根据与j冲突的作业到达的密度,为每个作业j的响应时间提供保证。该模型是完全异步的,包括各种已被广泛研究的资源分配问题,包括用餐哲学家问题及其对任意网络的推广。在这些版本的问题中,每个新作业j的资源需求决定了系统中可以并发存在并与j冲突的作业数量的上限delta /sub j/。给定这个上限,没有调度算法可以保证响应时间优于delta /sub j/乘以最大执行时间或消息传输时间。提出了一个简单的算法,保证响应时间实质上是delta /sub j/的多项式。它基于分发队列的概念,并且具有紧凑的实现。
{"title":"A dining philosophers algorithm with polynomial response time","authors":"B. Awerbuch, M. Saks","doi":"10.1109/FSCS.1990.89525","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89525","url":null,"abstract":"Presents an efficient distributed online algorithm for scheduling jobs that are created dynamically, subject to resource constraints that require that certain pairs of jobs not run concurrently. The focus is on the response time of the system to each job, i.e. the length of the time interval that starts when the job is created or assigned to a processor and ends at the instant the execution of the job begins. The goal is to provide guarantees on the response time to each job j in terms of the density of arrivals of jobs that conflict with j. The model is completely asynchronous and includes various resource allocation problems that have been studied extensively, including the dining philosophers problem and its generalizations to arbitrary networks. In these versions of the problem, the resource requirements of each new job j determines an upper bound delta /sub j/ on the number of jobs that can exist concurrently in the system and conflict with j. Given such upper bounds, no scheduling algorithm can guarantee a response time better than delta /sub j/ times the maximum execution or message transmission time. A simple algorithm that guarantees response time that is essentially polynomial in delta /sub j/ is presented. It is based on the notion of a distribution queue and has a compact implementation.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130022277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
On interpolation by analytic functions with special properties and some weak lower bounds on the size of circuits with symmetric gates 具有特殊性质的解析函数插值及对称门电路尺寸的弱下界
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89584
R. Smolensky
The author investigates the question of whether or not a specific Boolean function in n variables can be interpolated by an analytic function in the same variables whose partial derivatives of all orders span a subspace of low dimension in the space of analytic functions. The upper and lower bounds for this dimension yield some weak circuit lower bounds. For a particular function, an Omega (n/log n)-size lower bound is obtained for its computation by a circuit whose gates are symmetric. For the same function an Omega (n) lower bound is obtained for the circuit with mod/sub k/ gates.<>
本文研究了n变量中的特定布尔函数能否被同一变量中的解析函数内插,该解析函数的所有阶偏导数张成解析函数空间中的低维子空间。这个维数的上界和下界产生一些弱电路下界。对于一个特定的函数,一个(n/log n)大小的下界是通过一个门是对称的电路来计算的。对于相同的函数,对于具有mod/sub k/门的电路,可以得到Omega (n)的下界。
{"title":"On interpolation by analytic functions with special properties and some weak lower bounds on the size of circuits with symmetric gates","authors":"R. Smolensky","doi":"10.1109/FSCS.1990.89584","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89584","url":null,"abstract":"The author investigates the question of whether or not a specific Boolean function in n variables can be interpolated by an analytic function in the same variables whose partial derivatives of all orders span a subspace of low dimension in the space of analytic functions. The upper and lower bounds for this dimension yield some weak circuit lower bounds. For a particular function, an Omega (n/log n)-size lower bound is obtained for its computation by a circuit whose gates are symmetric. For the same function an Omega (n) lower bound is obtained for the circuit with mod/sub k/ gates.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
New results on dynamic planar point location 动态平面点定位的新结果
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89528
Siu-Wing Cheng, Ravi Janardan
A point location scheme is presented for an n-vertex dynamic planar subdivision whose underlying graph is only required to be connected. The scheme uses O(n) space and yields an O(log/sup 2/n) query time and an O(log n) update time. Insertion (respectively, deletion) of an arbitrary k-edge chain inside a region can be performed in O(k log(n+k)) (respectively, O(k log n)) time. The scheme is then extended to speed up the insertion/deletion of a k-edge monotone chain to O(log/sup 2/n log log n+k) time (or O(log n log log n+k) time for an alternative model of input), but at the expense of increasing the other time bounds slightly. All bounds are worst case. Additional results include a generalization to planar subdivisions consisting of algebraic segments of bounded degree and a persistent scheme for planar point location.<>
提出了一种只需要连接底层图的n顶点动态平面细分的点定位方案。该方案使用O(n)空间,产生O(log/sup 2/n)查询时间和O(log n)更新时间。区域内任意k边链的插入(或删除)可以在O(k log(n+k))(分别为O(k log n)))时间内完成。然后将该方案扩展到将k边单调链的插入/删除速度加快到O(log/sup 2/n log log n+k)时间(或者对于另一种输入模型来说是O(log n log log n+k)时间),但代价是稍微增加其他时间界限。所有的边界都是最坏情况。其他结果包括推广到由有界度代数段组成的平面细分和平面点定位的持久格式。
{"title":"New results on dynamic planar point location","authors":"Siu-Wing Cheng, Ravi Janardan","doi":"10.1109/FSCS.1990.89528","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89528","url":null,"abstract":"A point location scheme is presented for an n-vertex dynamic planar subdivision whose underlying graph is only required to be connected. The scheme uses O(n) space and yields an O(log/sup 2/n) query time and an O(log n) update time. Insertion (respectively, deletion) of an arbitrary k-edge chain inside a region can be performed in O(k log(n+k)) (respectively, O(k log n)) time. The scheme is then extended to speed up the insertion/deletion of a k-edge monotone chain to O(log/sup 2/n log log n+k) time (or O(log n log log n+k) time for an alternative model of input), but at the expense of increasing the other time bounds slightly. All bounds are worst case. Additional results include a generalization to planar subdivisions consisting of algebraic segments of bounded degree and a persistent scheme for planar point location.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116006905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Randomized online graph coloring 随机在线图着色
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89567
S. Vishwanathan
It is shown that randomization helps in coloring graphs online, and a simple randomized online algorithm is presented. For 3-colorable graphs the expected number of colors the algorithm uses is O((n log n)/sup 1/2/). The algorithm runs in polynomial time and compares well with the best known polynomial-time offline algorithms. A lower bound is proved for the randomized algorithm.<>
结果表明,随机化有助于图的在线着色,并提出了一种简单的随机化在线算法。对于3色图,算法使用的预期颜色数是O((n log n)/sup 1/2/)。该算法在多项式时间内运行,并与最著名的多项式时间离线算法相比较。证明了随机化算法的下界。
{"title":"Randomized online graph coloring","authors":"S. Vishwanathan","doi":"10.1109/FSCS.1990.89567","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89567","url":null,"abstract":"It is shown that randomization helps in coloring graphs online, and a simple randomized online algorithm is presented. For 3-colorable graphs the expected number of colors the algorithm uses is O((n log n)/sup 1/2/). The algorithm runs in polynomial time and compares well with the best known polynomial-time offline algorithms. A lower bound is proved for the randomized algorithm.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125716092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Tight bounds on the complexity of cascaded decomposition of automata 自动机级联分解复杂度的紧界
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89589
O. Maler, A. Pnueli
Exponential upper and lower bounds on the size of the cascaded (Krohn-Rhodes) decomposition of automata are given. These results are used to obtain elementary algorithms for various translations between automata and temporal logic, where the previously known translations were nonelementary. The relevance of the result is discussed.<>
给出了自动机级联(Krohn-Rhodes)分解大小的指数上界和下界。这些结果用于获得自动机和时间逻辑之间各种转换的基本算法,其中先前已知的转换是非基本的。讨论了结果的相关性。
{"title":"Tight bounds on the complexity of cascaded decomposition of automata","authors":"O. Maler, A. Pnueli","doi":"10.1109/FSCS.1990.89589","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89589","url":null,"abstract":"Exponential upper and lower bounds on the size of the cascaded (Krohn-Rhodes) decomposition of automata are given. These results are used to obtain elementary algorithms for various translations between automata and temporal logic, where the previously known translations were nonelementary. The relevance of the result is discussed.<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Towards a DNA sequencing theory (learning a string) 迈向DNA测序理论(学习琴弦)
Pub Date : 1990-10-22 DOI: 10.1109/FSCS.1990.89531
Ming Li
Mathematical frameworks suitable for massive automated DNA sequencing and for analyzing DNA sequencing algorithms are studied under plausible assumptions. The DNA sequencing problem is modeled as learning a superstring from its randomly drawn substrings. Under certain restrictions, this may be viewed as learning a superstring in L.G. Valiant's (1984) learning model, and in this case the author gives an efficient algorithm for learning a superstring and a quantitative bound on how many samples suffice. A major obstacle to the approach turns out to be a quite well-known open question on how to approximate the shortest common superstring of a set of strings. The author presents the first provably good algorithm that approximates the shortest superstring of length n by a superstring of length O(n log n).<>
在合理的假设下,研究了适用于大规模自动化DNA测序和分析DNA测序算法的数学框架。DNA测序问题被建模为从随机抽取的子字符串中学习一个超字符串。在一定的限制下,这可以看作是L.G. Valiant(1984)学习模型中的学习超弦,在这种情况下,作者给出了学习超弦的有效算法和多少个样本足够的定量界限。这种方法的一个主要障碍是一个众所周知的开放问题,即如何近似一组弦中最短的公共超弦。作者提出了第一个可证明的好算法,用一个长度为O(n log n)的超弦逼近长度为n的最短超弦。
{"title":"Towards a DNA sequencing theory (learning a string)","authors":"Ming Li","doi":"10.1109/FSCS.1990.89531","DOIUrl":"https://doi.org/10.1109/FSCS.1990.89531","url":null,"abstract":"Mathematical frameworks suitable for massive automated DNA sequencing and for analyzing DNA sequencing algorithms are studied under plausible assumptions. The DNA sequencing problem is modeled as learning a superstring from its randomly drawn substrings. Under certain restrictions, this may be viewed as learning a superstring in L.G. Valiant's (1984) learning model, and in this case the author gives an efficient algorithm for learning a superstring and a quantitative bound on how many samples suffice. A major obstacle to the approach turns out to be a quite well-known open question on how to approximate the shortest common superstring of a set of strings. The author presents the first provably good algorithm that approximates the shortest superstring of length n by a superstring of length O(n log n).<<ETX>>","PeriodicalId":271949,"journal":{"name":"Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1990-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121085295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
期刊
Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1