首页 > 最新文献

Proceedings of the tenth annual ACM symposium on Theory of computing最新文献

英文 中文
An analysis of the full alpha-beta pruning algorithm 完整的α - β剪枝算法分析
Pub Date : 1978-05-01 DOI: 10.1145/800133.804359
G. Baudet
An analysis of the alpha-beta pruning algorithm is presented which takes into account both shallow and deep cut-offs. A formula is first developed to measure the average number of terminal nodes examined by the algorithm in a uniform free of degree n and depth d when ties are allowed among the bottom positions: specifically, all bottom values are assumed to be independent identically distributed random variables drawn from a discrete probability distribution. A worst case analysis over all possible probability distributions is then presented by considering the limiting case when the discrete probability distribution tends to a continuous probability distribution. The branching factor of the alpha-beta pruning algorithm is shown to grow with n as &THgr;(n/In n), therefore confirming a claim by Knuth and Moore that deep cut-offs only have a second order effect on the behavior of the algorithm.
对考虑浅截止和深截止的α - β剪枝算法进行了分析。首先建立了在允许底部位置之间存在联系的情况下,算法在不受n度和深度d约束的均匀自由状态下检查的终端节点的平均数目的计算公式:假设所有底部值都是从离散概率分布中提取的独立同分布随机变量。然后,通过考虑离散概率分布趋向于连续概率分布时的极限情况,对所有可能的概率分布进行了最坏情况分析。α - β剪枝算法的分支因子随着n的增长而增长为&THgr;(n/In n),因此证实了Knuth和Moore的说法,即深度截止值对算法的行为只有二阶影响。
{"title":"An analysis of the full alpha-beta pruning algorithm","authors":"G. Baudet","doi":"10.1145/800133.804359","DOIUrl":"https://doi.org/10.1145/800133.804359","url":null,"abstract":"An analysis of the alpha-beta pruning algorithm is presented which takes into account both shallow and deep cut-offs. A formula is first developed to measure the average number of terminal nodes examined by the algorithm in a uniform free of degree n and depth d when ties are allowed among the bottom positions: specifically, all bottom values are assumed to be independent identically distributed random variables drawn from a discrete probability distribution. A worst case analysis over all possible probability distributions is then presented by considering the limiting case when the discrete probability distribution tends to a continuous probability distribution. The branching factor of the alpha-beta pruning algorithm is shown to grow with n as &THgr;(n/In n), therefore confirming a claim by Knuth and Moore that deep cut-offs only have a second order effect on the behavior of the algorithm.","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114139743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Proceedings of the tenth annual ACM symposium on Theory of computing 第十届ACM计算理论年会论文集
M. Fischer, R. DeMillo, N. Lynch, W. Burkhard, A. Aho
{"title":"Proceedings of the tenth annual ACM symposium on Theory of computing","authors":"M. Fischer, R. DeMillo, N. Lynch, W. Burkhard, A. Aho","doi":"10.1145/800133","DOIUrl":"https://doi.org/10.1145/800133","url":null,"abstract":"","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Propositional representation of arithmetic proofs (Preliminary Version) 算术证明的命题表示(初版)
Pub Date : 1978-05-01 DOI: 10.1145/800133.804354
M. Dowd
Equations f@@@@ = g@@@@ between polynomial time computable functions can be represented by sets of propositional formulas. If f@@@@ = g@@@@ is provable in certain arithmetic systems, then polynomial length proofs of the representing formulas exist in certain propositional systems. Two cases of this phenomenon and a general theory are given.
多项式时间可计算函数之间的方程f@@@@ = g@@@@可以用命题公式集表示。如果f@@@@ = g@@@@在某些算术系统中是可证明的,则表示公式的多项式长度证明在某些命题系统中存在。给出了这一现象的两个例子和一般理论。
{"title":"Propositional representation of arithmetic proofs (Preliminary Version)","authors":"M. Dowd","doi":"10.1145/800133.804354","DOIUrl":"https://doi.org/10.1145/800133.804354","url":null,"abstract":"Equations f@@@@ = g@@@@ between polynomial time computable functions can be represented by sets of propositional formulas. If f@@@@ = g@@@@ is provable in certain arithmetic systems, then polynomial length proofs of the representing formulas exist in certain propositional systems. Two cases of this phenomenon and a general theory are given.","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Coping with errors in binary search procedures (Preliminary Report) 处理二分查找程序中的错误(初步报告)
Pub Date : 1978-05-01 DOI: 10.1145/800133.804351
R. Rivest, A. Meyer, D. Kleitman, Karl Winklmann, J. Spencer
We consider the problem of identifying an unknown value x&egr;{1,2,...,n} using only comparisons of x to constants when as many as E of 'the comparisons may receive erroneous answers. For a continuous analogue of this problem we show that there is a unique strategy that is optimal in the worst case. This strategy for the continuous problem is then shown to yield a strategy for the original discrete problem that uses log2n+E.log2log2n+O(E.log2E) comparisons in the worst case. This number is shown to be optimal even if arbitrary “Yes-No” questions are allowed. We show that a modified version of this search problem with errors is equivalent to the problem of finding the minimal root of a set of increasing functions. The modified version is then also shown to be of complexity log2n+E.log2log2n+0(E.log2E).
我们考虑识别未知值x&egr;{1,2,…,n}只使用x与常数的比较,当多达E()的比较可能得到错误的答案时。对于这个问题的连续模拟,我们证明了在最坏情况下存在一个唯一的最优策略。然后,连续问题的这种策略被证明可以产生原始离散问题的策略,该策略在最坏情况下使用log2n+E.log2log2n+O(E.log2E)比较。即使允许任意的“是-否”问题,这个数字也被证明是最优的。我们证明了这个带有错误的搜索问题的修改版本等价于寻找一组递增函数的最小根的问题。修改后的版本也显示为复杂度log2n+E.log2log2n+0(E.log2E)。
{"title":"Coping with errors in binary search procedures (Preliminary Report)","authors":"R. Rivest, A. Meyer, D. Kleitman, Karl Winklmann, J. Spencer","doi":"10.1145/800133.804351","DOIUrl":"https://doi.org/10.1145/800133.804351","url":null,"abstract":"We consider the problem of identifying an unknown value x&egr;{1,2,...,n} using only comparisons of x to constants when as many as E of 'the comparisons may receive erroneous answers. For a continuous analogue of this problem we show that there is a unique strategy that is optimal in the worst case. This strategy for the continuous problem is then shown to yield a strategy for the original discrete problem that uses log2n+E.log2log2n+O(E.log2E) comparisons in the worst case. This number is shown to be optimal even if arbitrary “Yes-No” questions are allowed. We show that a modified version of this search problem with errors is equivalent to the problem of finding the minimal root of a set of increasing functions. The modified version is then also shown to be of complexity log2n+E.log2log2n+0(E.log2E).","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122824307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The macro model for data compression (Extended Abstract) 数据压缩的宏模型(扩展摘要)
Pub Date : 1978-05-01 DOI: 10.1145/800133.804329
J. Storer, T. G. Szymanski
A general model for data compression is presented which includes most data compression systems in the literature as special cases. All macro schemes are based on the principle of finding redundant strings or patterns and replacing them by pointers to a common copy. Different varieties of macro schemes may be defined by varying the interpretation of pointers, for instance, a pointer may indicate a substring of the compressed string, a substring of the original string, or a substring of some other string such as an external dictionary. Other varieties of macros schemes may be defined by restricting the type of overlapping or recursion that may be used. Trade-offs between different varieties of macro schemes, exact lower bounds on the amount of compression obtainable, and the complexity of encoding and decoding are discussed as well as how the work of other authors (such as Lempel-Ziv) relates to this model.
提出了一个通用的数据压缩模型,其中包括文献中大多数的数据压缩系统作为特例。所有宏方案都是基于查找冗余字符串或模式并用指向公共副本的指针替换它们的原则。不同种类的宏方案可以通过改变指针的解释来定义,例如,指针可以表示压缩字符串的子字符串,原始字符串的子字符串,或者其他字符串的子字符串,例如外部字典。其他类型的宏方案可以通过限制可能使用的重叠或递归类型来定义。讨论了不同种类的宏方案之间的权衡、可获得的压缩量的确切下界、编码和解码的复杂性,以及其他作者(如Lempel-Ziv)的工作与该模型的关系。
{"title":"The macro model for data compression (Extended Abstract)","authors":"J. Storer, T. G. Szymanski","doi":"10.1145/800133.804329","DOIUrl":"https://doi.org/10.1145/800133.804329","url":null,"abstract":"A general model for data compression is presented which includes most data compression systems in the literature as special cases. All macro schemes are based on the principle of finding redundant strings or patterns and replacing them by pointers to a common copy. Different varieties of macro schemes may be defined by varying the interpretation of pointers, for instance, a pointer may indicate a substring of the compressed string, a substring of the original string, or a substring of some other string such as an external dictionary. Other varieties of macros schemes may be defined by restricting the type of overlapping or recursion that may be used. Trade-offs between different varieties of macro schemes, exact lower bounds on the amount of compression obtainable, and the complexity of encoding and decoding are discussed as well as how the work of other authors (such as Lempel-Ziv) relates to this model.","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122892379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
On the complexity of the Maximum Subgraph Problem 最大子图问题的复杂性
Pub Date : 1978-05-01 DOI: 10.1145/800133.804356
John M. Lewis
For a fixed graph property, the Maximum Subgraph Recognition Problem for the property is: Given a graph G and integer k, does G have a subgraph induced by k vertices which satisfies the property. This paper studies the complexity of this problem for various properties. The principal result is that if the property is any one of a wide class of monotone properties, the Maximum Subgraph Problem is NP-hard. This suggests a promising direction of inquiry into the P = ?NP question.
对于一个固定的图属性,该属性的最大子图识别问题为:给定一个图G和整数k, G是否有一个由k个顶点诱导的满足该属性的子图。本文研究了该问题在不同性质下的复杂性。主要结果是,如果性质是单调性质的任何一类,则极大子图问题是np困难的。这为探究P = ?NP问题提供了一个有希望的方向。
{"title":"On the complexity of the Maximum Subgraph Problem","authors":"John M. Lewis","doi":"10.1145/800133.804356","DOIUrl":"https://doi.org/10.1145/800133.804356","url":null,"abstract":"For a fixed graph property, the Maximum Subgraph Recognition Problem for the property is: Given a graph G and integer k, does G have a subgraph induced by k vertices which satisfies the property. This paper studies the complexity of this problem for various properties. The principal result is that if the property is any one of a wide class of monotone properties, the Maximum Subgraph Problem is NP-hard. This suggests a promising direction of inquiry into the P = ?NP question.","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132378852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Parallelism in random access machines 随机存取机的并行性
Pub Date : 1978-05-01 DOI: 10.1145/800133.804339
S. Fortune, J. Wyllie
A model of computation based on random access machines operating in parallel and sharing a common memory is presented. The computational power of this model is related to that of traditional models. In particular, deterministic parallel RAM's can accept in polynomial time exactly the sets accepted by polynomial tape bounded Turing machines; nondeterministic RAM's can accept in polynomial time exactly the sets accepted by nondeterministic exponential time bounded Turing machines. Similar results hold for other classes. The effect of limiting the size of the common memory is also considered.
提出了一种基于随机存取机并行运行并共享公共存储器的计算模型。该模型的计算能力与传统模型的计算能力有关。特别是,确定性并行RAM可以在多项式时间内完全接受多项式带界图灵机所接受的集合;非确定性随机存储器可以在多项式时间内完全接受非确定性指数有界图灵机所接受的集合。类似的结果也适用于其他类。还考虑了限制公共存储器大小的影响。
{"title":"Parallelism in random access machines","authors":"S. Fortune, J. Wyllie","doi":"10.1145/800133.804339","DOIUrl":"https://doi.org/10.1145/800133.804339","url":null,"abstract":"A model of computation based on random access machines operating in parallel and sharing a common memory is presented. The computational power of this model is related to that of traditional models. In particular, deterministic parallel RAM's can accept in polynomial time exactly the sets accepted by polynomial tape bounded Turing machines; nondeterministic RAM's can accept in polynomial time exactly the sets accepted by nondeterministic exponential time bounded Turing machines. Similar results hold for other classes. The effect of limiting the size of the common memory is also considered.","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132430864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1005
On time-space classes and their relation to the theory of real addition 论时空类及其与实加法理论的关系
Pub Date : 1978-05-01 DOI: 10.1145/800133.804352
Anna R. Bruss, A. Meyer
A new lower bound on the computational complexity of the theory of real addition and several related theories is established: any decision procedure for these theories requires either space 2&egr;n or nondeterministic time 2&egr;n2 for some constant &egr; > O and infinitely many n. The proof is based on the families of languages TISP(T(n),S(n)) which can be recognized simultaneously in time T(n) and space S(n) and the conditions under which they form a hierarchy.
建立了实加法理论及其相关理论的计算复杂度的一个新的下界:这些理论的任何决策过程要么需要空间2&egr;n,要么需要不确定的时间2&egr;n2对于某常数&egr;这个证明是基于在时间T(n)和空间S(n)上可以同时被识别的语言族TISP(T(n),S(n))及其构成层次的条件。
{"title":"On time-space classes and their relation to the theory of real addition","authors":"Anna R. Bruss, A. Meyer","doi":"10.1145/800133.804352","DOIUrl":"https://doi.org/10.1145/800133.804352","url":null,"abstract":"A new lower bound on the computational complexity of the theory of real addition and several related theories is established: any decision procedure for these theories requires either space 2&egr;n or nondeterministic time 2&egr;n2 for some constant &egr; > O and infinitely many n. The proof is based on the families of languages TISP(T(n),S(n)) which can be recognized simultaneously in time T(n) and space S(n) and the conditions under which they form a hierarchy.","PeriodicalId":313820,"journal":{"name":"Proceedings of the tenth annual ACM symposium on Theory of computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1978-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
Proceedings of the tenth annual ACM symposium on Theory of computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1