首页 > 最新文献

[1993] The 2nd Israel Symposium on Theory and Computing Systems最新文献

英文 中文
Competitive algorithms for the weighted server problem 加权服务器问题的竞争算法
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253459
A. Fiat, Moty Ricklin
The authors deal with a generalization of the k-server problem, in which the servers are unequal. In the weighted server model each of the servers is assigned a positive weight. The cost associated with moving a server equals the product of the distance traversed and the server weight. A weighted k-server algorithm is called competitive if the competitive ratio depends only upon the number of servers. (i.e., the competitive ratio is independent of the weights associated with the servers and the number of points in the metric space). For the uniform metric space, they give super exponential competitive algorithms for any set of weights. If the servers have one of two possible weights, they give deterministic exponential competitive algorithms and randomized polynomial competitive algorithms. They use the MIN operator for both algorithms. One can model the problem of storage management for RAM and E/sup 2/PROM type memories as a weighted server problem with two weights on the uniform metric space.<>
作者处理了k-服务器问题的推广,其中服务器是不相等的。在加权服务器模型中,每个服务器被分配一个正的权重。与移动服务器相关的成本等于所经过的距离和服务器权重的乘积。如果竞争比率仅取决于服务器的数量,则加权k-server算法称为竞争算法。(即,竞争比率独立于与服务器相关的权重和度量空间中的点数)。对于一致度量空间,他们给出了任意一组权值的超指数竞争算法。如果服务器具有两种可能的权重之一,则给出确定性指数竞争算法和随机多项式竞争算法。它们对两种算法都使用MIN运算符。我们可以将RAM和E/sup 2/PROM类型存储器的存储管理问题建模为在统一度量空间上具有两个权重的加权服务器问题。
{"title":"Competitive algorithms for the weighted server problem","authors":"A. Fiat, Moty Ricklin","doi":"10.1109/ISTCS.1993.253459","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253459","url":null,"abstract":"The authors deal with a generalization of the k-server problem, in which the servers are unequal. In the weighted server model each of the servers is assigned a positive weight. The cost associated with moving a server equals the product of the distance traversed and the server weight. A weighted k-server algorithm is called competitive if the competitive ratio depends only upon the number of servers. (i.e., the competitive ratio is independent of the weights associated with the servers and the number of points in the metric space). For the uniform metric space, they give super exponential competitive algorithms for any set of weights. If the servers have one of two possible weights, they give deterministic exponential competitive algorithms and randomized polynomial competitive algorithms. They use the MIN operator for both algorithms. One can model the problem of storage management for RAM and E/sup 2/PROM type memories as a weighted server problem with two weights on the uniform metric space.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123421993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Optimal speedup of Las Vegas algorithms 拉斯维加斯算法的最佳加速
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253477
M. Luby, A. Sinclair, David Zuckerman
Let A be a Las Vegas algorithm, i.e., A is a randomized algorithm that always produces the correct answer when its stops but whose running time is a random variable. The authors consider the problem of minimizing the expected time required to obtain an answer from A using strategies which simulate A as follows: run A for a fixed amount of time t/sub 1/, then run A independent for a fixed amount of time t/sub 2/, etc. The simulation stops if A completes its execution during any of the runs. Let S=(t/sub 1/, t/sub 2/,. . .) be a strategy, and let l/sub A/=inf/sub S/T(A,S), where T(A,S) is the expected value of the running time of the simulation of A under strategy S. The authors describe a simple universal strategy S/sup univ/, with the property that, for any algorithm A, T(A,S/sup univ/)=O(l/sub A/log(l/sub A/)). Furthermore, they show that this is the best performance that can be achieved, up to a constant factor, by any universal strategy.<>
设A是一个拉斯维加斯算法,即A是一个随机算法,当它停止时总是产生正确的答案,但其运行时间是一个随机变量。作者考虑最小化从A获得答案所需的期望时间的问题,使用模拟A的策略如下:在固定时间t/下标1/上运行A,然后在固定时间t/下标2/上独立运行A,等等。如果A在任何运行期间完成其执行,则模拟停止。设S=(t/下标1/,t/下标2/,…)为策略,设l/下标a /=inf/下标S/ t (a,S),其中t (a,S)为策略S下a仿真运行时间的期望值。作者描述了一种简单的通用策略S/sup univ/,其性质是,对于任意算法a, t (a,S/sup univ/)=O(l/下标a /log(l/下标a /))。此外,他们还表明,这是任何通用策略所能达到的最佳性能。
{"title":"Optimal speedup of Las Vegas algorithms","authors":"M. Luby, A. Sinclair, David Zuckerman","doi":"10.1109/ISTCS.1993.253477","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253477","url":null,"abstract":"Let A be a Las Vegas algorithm, i.e., A is a randomized algorithm that always produces the correct answer when its stops but whose running time is a random variable. The authors consider the problem of minimizing the expected time required to obtain an answer from A using strategies which simulate A as follows: run A for a fixed amount of time t/sub 1/, then run A independent for a fixed amount of time t/sub 2/, etc. The simulation stops if A completes its execution during any of the runs. Let S=(t/sub 1/, t/sub 2/,. . .) be a strategy, and let l/sub A/=inf/sub S/T(A,S), where T(A,S) is the expected value of the running time of the simulation of A under strategy S. The authors describe a simple universal strategy S/sup univ/, with the property that, for any algorithm A, T(A,S/sup univ/)=O(l/sub A/log(l/sub A/)). Furthermore, they show that this is the best performance that can be achieved, up to a constant factor, by any universal strategy.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 566
A well-characterized approximation problem 一个很好表征的近似问题
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253463
J. Håstad, S. Phillips, S. Safra
The authors consider the following NP optimization problem: given a set of polynomials P/sub i/(x), i=1. . .s of degree at most 2 over GF(p) in n variables, find a root common to as many as possible of the polynomials P/sub i/(x). They prove that in the case when the polynomials do not contain any squares as monomials, it is always possible to approximate this problem within a factor of /sup p2///sub p-1/ in polynomial time. This follows from the stronger statement that one can, in polynomial time, find an assignment that satisfies at least /sup p-1///sub p2/ of the nontrivial equations. More interestingly, they prove that approximating the maximal number of polynomials with a common root to within a factor of p- in is NP-hard. They also prove that for any constant delta <1, it is NP-hard to approximate the solution of quadratic equations over the rational numbers, or over the reals, within n/sup delta /.<>
本文研究了一个NP优化问题:给定一组多项式P/下标i/(x),在n个变量中,i=1. .s次不超过2 / GF(P),求多项式P/下标i/(x)尽可能多的公根。他们证明了在多项式不包含任何平方作为单项式的情况下,总是可以在多项式时间内/sup p2///sub p-1/的因子内近似这个问题。这是从一个更强的命题推导出来的,即在多项式时间内,可以找到一个赋值,它至少满足非平凡方程的/sup p-1/// /sub p2/。更有趣的是,他们证明了在p- in的因子范围内逼近多项式的最大数目是np困难的。他们也证明了对于任意常数>
{"title":"A well-characterized approximation problem","authors":"J. Håstad, S. Phillips, S. Safra","doi":"10.1109/ISTCS.1993.253463","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253463","url":null,"abstract":"The authors consider the following NP optimization problem: given a set of polynomials P/sub i/(x), i=1. . .s of degree at most 2 over GF(p) in n variables, find a root common to as many as possible of the polynomials P/sub i/(x). They prove that in the case when the polynomials do not contain any squares as monomials, it is always possible to approximate this problem within a factor of /sup p2///sub p-1/ in polynomial time. This follows from the stronger statement that one can, in polynomial time, find an assignment that satisfies at least /sup p-1///sub p2/ of the nontrivial equations. More interestingly, they prove that approximating the maximal number of polynomials with a common root to within a factor of p- in is NP-hard. They also prove that for any constant delta <1, it is NP-hard to approximate the solution of quadratic equations over the rational numbers, or over the reals, within n/sup delta /.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Efficient on-line call control algorithms 高效的在线呼叫控制算法
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253460
J. Garay, I. Gopal, S. Kutten, Y. Mansour, M. Yung
The authors study the problem of on-line call control, i.e., the problem of accepting or rejecting an incoming call without knowledge of future calls. The problem is part of the more general problem of bandwidth allocation and management. Intuition suggests that knowledge of future call arrivals can be crucial to the performance of the system. They present on-line call control algorithms that, in some circumstances, are competitive, i.e., perform (up to a constant factor) as well as their off-line, clairvoyant counterparts. They also prove the optimality of some algorithms. The model is that of a line of nodes, and they investigate a variety of cases concerning the value of the calls. The value is gained only if the call terminates successfully, otherwise-if the call is rejected, or prematurely terminated-no value is gained. The performance of the algorithm is then measured by the cumulative value achieved, when given a sequence of calls. The variety of call value criteria captures the most natural cost assignments to network services.<>
作者研究了在线呼叫控制问题,即在不知道未来呼叫的情况下接受或拒绝传入呼叫的问题。这个问题是更普遍的带宽分配和管理问题的一部分。直觉告诉我们,对未来来电的了解对系统的性能至关重要。他们提出在线呼叫控制算法,在某些情况下,是竞争性的,即,执行(高达一个常数因子)以及他们的离线,千里眼对应物。他们还证明了一些算法的最优性。该模型是一组节点的模型,他们研究了与调用值有关的各种情况。只有在调用成功终止时才获得该值,否则(如果调用被拒绝或过早终止)不会获得任何值。当给定一系列调用时,算法的性能通过获得的累积值来衡量。呼叫价值标准的多样性捕获了网络服务最自然的成本分配。
{"title":"Efficient on-line call control algorithms","authors":"J. Garay, I. Gopal, S. Kutten, Y. Mansour, M. Yung","doi":"10.1109/ISTCS.1993.253460","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253460","url":null,"abstract":"The authors study the problem of on-line call control, i.e., the problem of accepting or rejecting an incoming call without knowledge of future calls. The problem is part of the more general problem of bandwidth allocation and management. Intuition suggests that knowledge of future call arrivals can be crucial to the performance of the system. They present on-line call control algorithms that, in some circumstances, are competitive, i.e., perform (up to a constant factor) as well as their off-line, clairvoyant counterparts. They also prove the optimality of some algorithms. The model is that of a line of nodes, and they investigate a variety of cases concerning the value of the calls. The value is gained only if the call terminates successfully, otherwise-if the call is rejected, or prematurely terminated-no value is gained. The performance of the algorithm is then measured by the cumulative value achieved, when given a sequence of calls. The variety of call value criteria captures the most natural cost assignments to network services.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Zero-one permanent is not=P-complete, a simpler proof 0 - 1永久不= p完全,一个更简单的证明
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253457
A. Ben-Dor, S. Halevi
Valiant (1979) proved that computing the permanent of a 01-matrix is not=P-complete. The authors present another proof for the same result. The proof uses 'black box' methodology, which facilitates its presentation. They also prove that deciding whether the permanent is divisible by a small prime is not=P-hard. They conclude by proving that a polynomially bounded function can not be not=P-complete under 'reasonable' complexity assumptions.<>
Valiant(1979)证明了计算01矩阵的永久性是不完全的。作者对同样的结果提出了另一个证明。该证明使用了“黑箱”方法,这有利于其呈现。他们也证明了判定恒数是否能被一个小素数整除不是= p难的。他们的结论是,在“合理的”复杂性假设下,多项式有界函数不可能是非p完全的。
{"title":"Zero-one permanent is not=P-complete, a simpler proof","authors":"A. Ben-Dor, S. Halevi","doi":"10.1109/ISTCS.1993.253457","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253457","url":null,"abstract":"Valiant (1979) proved that computing the permanent of a 01-matrix is not=P-complete. The authors present another proof for the same result. The proof uses 'black box' methodology, which facilitates its presentation. They also prove that deciding whether the permanent is divisible by a small prime is not=P-hard. They conclude by proving that a polynomially bounded function can not be not=P-complete under 'reasonable' complexity assumptions.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
The Las-Vegas processor identity problem (how and when to be unique) 拉斯维加斯处理器标识问题(如何以及何时是唯一的)
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253474
S. Kutten, R. Ostrovsky, B. Patt-Shamir
One of the fundamental problems in distributed computing is how identical processes with identical local memory can choose unique IDs provided they can flip a coin. The variant considered is the asynchronous shared memory model (atomic registers), and the basic correctness requirement is that upon termination the processes must always have unique IDs. The authors study this problem from several viewpoints. On the positive side, they present the first Las-Vegas protocol that solves the problem. The protocol terminates in (optimal) O(log n) expected time, using O(n) shared memory space, where n is the number of participating processes. On the negative side, they show that there is no Las-Vegas protocol unless n is known precisely, and that no finite-state Las-Vegas protocol can work under schedules that may depend on the history of the shared variable. For the case of arbitrary adversary, they present a Las-Vegas protocol that uses O(n) unbounded registers.<>
分布式计算中的一个基本问题是,具有相同本地内存的相同进程如何选择唯一的id,前提是它们可以抛硬币。考虑的变体是异步共享内存模型(原子寄存器),基本的正确性要求是在终止时进程必须始终具有惟一的id。作者从几个角度对这个问题进行了研究。积极的一面是,他们提出了第一个解决这个问题的拉斯维加斯协议。该协议在(最优)O(log n)预期时间内终止,使用O(n)个共享内存空间,其中n是参与进程的数量。消极的一面是,他们表明,除非n是精确已知的,否则不存在拉斯维加斯协议,并且没有有限状态的拉斯维加斯协议可以在可能依赖于共享变量历史的时间表下工作。对于任意对手的情况,他们提出了一个使用O(n)个无界寄存器的Las-Vegas协议
{"title":"The Las-Vegas processor identity problem (how and when to be unique)","authors":"S. Kutten, R. Ostrovsky, B. Patt-Shamir","doi":"10.1109/ISTCS.1993.253474","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253474","url":null,"abstract":"One of the fundamental problems in distributed computing is how identical processes with identical local memory can choose unique IDs provided they can flip a coin. The variant considered is the asynchronous shared memory model (atomic registers), and the basic correctness requirement is that upon termination the processes must always have unique IDs. The authors study this problem from several viewpoints. On the positive side, they present the first Las-Vegas protocol that solves the problem. The protocol terminates in (optimal) O(log n) expected time, using O(n) shared memory space, where n is the number of participating processes. On the negative side, they show that there is no Las-Vegas protocol unless n is known precisely, and that no finite-state Las-Vegas protocol can work under schedules that may depend on the history of the shared variable. For the case of arbitrary adversary, they present a Las-Vegas protocol that uses O(n) unbounded registers.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116545718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
On fixed-parameter tractability and approximability of NP-hard optimization problems NP-hard优化问题的定参数可跟踪性和近似性
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253478
L. Cai, Jianer Chen
Fixed-parameter tractability and approximability of NP-hard optimization problems are studied based on a model GC(s(n), Pi /sub k//sup L/). The main results are (1) a class of NP-hard optimization problems, including dominating-set and zero-one integer-programing, are fixed-parameter tractable if and only if GC(s(n), Pi /sub 2//sup L/) contained in P for some s(n) in omega (log n); (2) most approximable NP-hard optimization problems are fixed-parameter tractable. In particular, the class MAX NP is fixed-parameter tractable; (3) a class of optimization problems do not have fully polynomial time approximation scheme unless GC(s(n), Pi /sub k//sup L/) contained in P for some s(n) in omega (log n) and for some k>l; and (4) every fixed-parameter tractable optimization problem can be approximated in polynomial time to a non-trivial ratio.<>
基于GC(s(n), Pi /sub k//sup L/)模型,研究了NP-hard优化问题的定参数可跟踪性和近似性。主要结果是:(1)一类NP-hard优化问题,包括支配集和0 - 1整数规划,当且仅当对于(log n)中的某个s(n), GC(s(n), Pi /sub 2//sup L/)包含在P中是定参数可处理的;(2)大多数近似NP-hard优化问题是固定参数可处理的。特别地,MAX NP类是固定参数可处理的;(3)一类优化问题除非GC(s(n), Pi /sub k//sup L/)包含在P中,对于(log n)中的某些s(n)和某些k> L,则不具有完全多项式时间逼近方案;(4)每一个固定参数可处理的优化问题都可以在多项式时间内逼近到一个非平凡的比率。
{"title":"On fixed-parameter tractability and approximability of NP-hard optimization problems","authors":"L. Cai, Jianer Chen","doi":"10.1109/ISTCS.1993.253478","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253478","url":null,"abstract":"Fixed-parameter tractability and approximability of NP-hard optimization problems are studied based on a model GC(s(n), Pi /sub k//sup L/). The main results are (1) a class of NP-hard optimization problems, including dominating-set and zero-one integer-programing, are fixed-parameter tractable if and only if GC(s(n), Pi /sub 2//sup L/) contained in P for some s(n) in omega (log n); (2) most approximable NP-hard optimization problems are fixed-parameter tractable. In particular, the class MAX NP is fixed-parameter tractable; (3) a class of optimization problems do not have fully polynomial time approximation scheme unless GC(s(n), Pi /sub k//sup L/) contained in P for some s(n) in omega (log n) and for some k>l; and (4) every fixed-parameter tractable optimization problem can be approximated in polynomial time to a non-trivial ratio.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
Hot-potato worm routing is almost as easy as store-and-forward packet routing 热土豆蠕虫路由几乎和存储转发数据包路由一样简单
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253469
I. Newman, A. Schuster
The theory of worm routing (rather than packet routing) recently attracts an increased attention as an abstraction of the underlying communication mechanisms in many parallel machines. Routing the worms in the hot-potato style is a desired form of communication in high-speed optical interconnection networks. The authors develop a simple method for the design of parallel hot-potato worm routing algorithms. The basic approach is to simulate known packet routing algorithms, so that in each step worms are moved around instead of packets. For hot-potato permutation routing of worms of size k the authors have the following results. They get a O(k/sup 2.5/n) algorithm for the n*n mesh, and a O(k/sup 1.5/n) algorithm for the corresponding offline problem. For the 2/sup n/-nodes hypercube they get a O(k/sup 3/n log /sup 2/n) deterministic algorithm, and a O(k/sup 3/n) randomized algorithm. Although the results are given for permutation routing on the mesh and the hypercube, the general method can be applied to many other networks and to more general communication patterns as well. Moreover, once better routing algorithms are found for the underlying network, the worm routing algorithm improves, too.<>
蠕虫路由理论(而不是包路由)最近引起了越来越多的关注,因为它是许多并行机器中底层通信机制的抽象。在高速光互连网络中,以烫手山芋方式路由蠕虫是一种理想的通信形式。提出了一种简单的并行热土豆蠕虫路由算法设计方法。基本方法是模拟已知的数据包路由算法,以便在每一步中移动蠕虫而不是数据包。对于大小为k的蠕虫的热土豆排列路线,作者有以下结果。对于n*n网格,他们得到了O(k/sup 2.5/n)算法,对于相应的离线问题,他们得到了O(k/sup 1.5/n)算法。对于2/sup n/节点的超立方体,他们得到一个O(k/sup 3/n log /sup 2/n)确定性算法和一个O(k/sup 3/n)随机算法。虽然给出的结果适用于网格和超立方体上的排列路由,但一般方法也可以应用于许多其他网络和更一般的通信模式。此外,一旦为底层网络找到更好的路由算法,蠕虫路由算法也会得到改进。
{"title":"Hot-potato worm routing is almost as easy as store-and-forward packet routing","authors":"I. Newman, A. Schuster","doi":"10.1109/ISTCS.1993.253469","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253469","url":null,"abstract":"The theory of worm routing (rather than packet routing) recently attracts an increased attention as an abstraction of the underlying communication mechanisms in many parallel machines. Routing the worms in the hot-potato style is a desired form of communication in high-speed optical interconnection networks. The authors develop a simple method for the design of parallel hot-potato worm routing algorithms. The basic approach is to simulate known packet routing algorithms, so that in each step worms are moved around instead of packets. For hot-potato permutation routing of worms of size k the authors have the following results. They get a O(k/sup 2.5/n) algorithm for the n*n mesh, and a O(k/sup 1.5/n) algorithm for the corresponding offline problem. For the 2/sup n/-nodes hypercube they get a O(k/sup 3/n log /sup 2/n) deterministic algorithm, and a O(k/sup 3/n) randomized algorithm. Although the results are given for permutation routing on the mesh and the hypercube, the general method can be applied to many other networks and to more general communication patterns as well. Moreover, once better routing algorithms are found for the underlying network, the worm routing algorithm improves, too.<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Approximating bounded 0-1 integer linear programs 近似有界0-1整数线性规划
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253482
D. Peleg, G. Schechtman, A. Wool
The problem of finding approximate solutions for a subclass of 0-1 integer linear programming denoted by I L P(k,p) is considered. The problem involves finding X in
研究了0-1整数线性规划的一个子类的近似解问题,该子类记为I L P(k, P)。这个问题涉及到求X in
{"title":"Approximating bounded 0-1 integer linear programs","authors":"D. Peleg, G. Schechtman, A. Wool","doi":"10.1109/ISTCS.1993.253482","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253482","url":null,"abstract":"The problem of finding approximate solutions for a subclass of 0-1 integer linear programming denoted by I L P(k,p) is considered. The problem involves finding X in","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"95 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Deterministic approximate counting of depth-2 circuits 深度2电路的确定性近似计数
Pub Date : 1993-06-07 DOI: 10.1109/ISTCS.1993.253488
M. Luby, B. Velickovic, A. Wigderson
The authors describe deterministic algorithms which for a given depth-2 circuit F approximate the probability that on a random input F outputs a specific value alpha . The approach gives an algorithm which for a given GF(2) multivariate polynomial p and given in >0 approximates the number of zeros (or ones) of p within a multiplicative factor 1+ in . The algorithm runs in time exp(exp(O( square root log(n/ in )))), where n is the size of the circuit. They also obtain an algorithm which given a DNF formula F and in >0 approximates the number of satisfying assignments of F within a factor of 1+ in and runs in time exp(O((log(n/ in ))/sup 4/)).<>
作者描述了一种确定性算法,该算法对于给定的深度2电路F近似于随机输入F输出特定值alpha的概率。该方法给出了一种算法,对于给定的GF(2)多元多项式p,并给出了>0,该算法在乘因子1+ in内近似p的0(或1)个数。算法运行时间为exp(exp(O)√log(n/ in)))),其中n为电路的大小。他们还得到了一种算法,该算法给定DNF公式F,并且在>中,在1+ in的因子内近似F的满意赋值数量,并且运行时间为exp(O((log(n/ in))/sup 4/))。>
{"title":"Deterministic approximate counting of depth-2 circuits","authors":"M. Luby, B. Velickovic, A. Wigderson","doi":"10.1109/ISTCS.1993.253488","DOIUrl":"https://doi.org/10.1109/ISTCS.1993.253488","url":null,"abstract":"The authors describe deterministic algorithms which for a given depth-2 circuit F approximate the probability that on a random input F outputs a specific value alpha . The approach gives an algorithm which for a given GF(2) multivariate polynomial p and given in >0 approximates the number of zeros (or ones) of p within a multiplicative factor 1+ in . The algorithm runs in time exp(exp(O( square root log(n/ in )))), where n is the size of the circuit. They also obtain an algorithm which given a DNF formula F and in >0 approximates the number of satisfying assignments of F within a factor of 1+ in and runs in time exp(O((log(n/ in ))/sup 4/)).<<ETX>>","PeriodicalId":281109,"journal":{"name":"[1993] The 2nd Israel Symposium on Theory and Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130956049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
期刊
[1993] The 2nd Israel Symposium on Theory and Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1