首页 > 最新文献

2011 IEEE 52nd Annual Symposium on Foundations of Computer Science最新文献

英文 中文
Efficient Computation of Approximate Pure Nash Equilibria in Congestion Games 拥挤对策中近似纯纳什均衡的有效计算
Pub Date : 2011-04-14 DOI: 10.1109/FOCS.2011.50
I. Caragiannis, A. Fanelli, N. Gravin, Alexander Skopalik
Congestion games constitute an important class of games in which computing an exact or even approximate pure Nash equilibrium is in general {sf PLS}-complete. We present a surprisingly simple polynomial-time algorithm that computes $O(1)$-approximate Nash equilibria in these games. In particular, for congestion games with linear latency functions, our algorithm computes $(2+epsilon)$-approximate pure Nash equilibria in time polynomial in the number of players, the number of resources and $1/epsilon$. It also applies to games with polynomial latency functions with constant maximum degree $d$; there, the approximation guarantee is $d^{O(d)}$. The algorithm essentially identifies a polynomially long sequence of best-response moves that lead to an approximate equilibrium, the existence of such short sequences is interesting in itself. These are the first positive algorithmic results for approximate equilibria in non-symmetric congestion games. We strengthen them further by proving that, for congestion games that deviate from our mild assumptions, computing $rho$-approximate equilibria is {sf PLS}-complete for any polynomial-time computable $rho$.
拥塞对策是一类重要的对策,其中计算精确甚至近似的纯纳什均衡通常是{sfpls完备}的。我们提出了一个惊人的简单的多项式时间算法,计算$O(1)$ -近似纳什均衡在这些游戏。特别是,对于具有线性延迟函数的拥塞博弈,我们的算法在玩家数量,资源数量和$1/epsilon$的时间多项式中计算$(2+epsilon)$ -近似纯纳什均衡。它也适用于具有多项式延迟函数的游戏,具有恒定的最大度$d$;近似保证是$d^{O(d)}$。该算法本质上确定了一个多项式长的最佳响应移动序列,导致近似均衡,这种短序列的存在本身就很有趣。这是非对称拥塞对策中近似均衡的第一个积极的算法结果。我们进一步证明,对于偏离我们温和假设的拥塞博弈,对于任何多项式时间可计算的$rho$,计算{sf}$rho$ -近似均衡是PLS-complete。
{"title":"Efficient Computation of Approximate Pure Nash Equilibria in Congestion Games","authors":"I. Caragiannis, A. Fanelli, N. Gravin, Alexander Skopalik","doi":"10.1109/FOCS.2011.50","DOIUrl":"https://doi.org/10.1109/FOCS.2011.50","url":null,"abstract":"Congestion games constitute an important class of games in which computing an exact or even approximate pure Nash equilibrium is in general {sf PLS}-complete. We present a surprisingly simple polynomial-time algorithm that computes $O(1)$-approximate Nash equilibria in these games. In particular, for congestion games with linear latency functions, our algorithm computes $(2+epsilon)$-approximate pure Nash equilibria in time polynomial in the number of players, the number of resources and $1/epsilon$. It also applies to games with polynomial latency functions with constant maximum degree $d$; there, the approximation guarantee is $d^{O(d)}$. The algorithm essentially identifies a polynomially long sequence of best-response moves that lead to an approximate equilibrium, the existence of such short sequences is interesting in itself. These are the first positive algorithmic results for approximate equilibria in non-symmetric congestion games. We strengthen them further by proving that, for congestion games that deviate from our mild assumptions, computing $rho$-approximate equilibria is {sf PLS}-complete for any polynomial-time computable $rho$.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
A Parallel Approximation Algorithm for Positive Semidefinite Programming 正半定规划的并行逼近算法
Pub Date : 2011-04-13 DOI: 10.1109/FOCS.2011.25
Rahul Jain, Penghui Yao
Positive semi definite programs are an important subclass of semi definite programs in which all matrices involved in the specification of the problem are positive semi definite and all scalars involved are non-negative. We present a parallel algorithm, which given an instance of a positive semi definite program of size N and an approximation factor e >, 0, runs in (parallel) time poly(1/e) polylog(N), using poly(N) processors, and outputs a value which is within multiplicative factor of (1+ e) to the optimal. Our result generalizes analogous result of Luby and Nisan (1993) for positive linear programs and our algorithm is inspired by their algorithm of [10].
正半定规划是半定规划的一个重要子类,其中所涉及的矩阵都是正半定的,所涉及的标量都是非负的。我们提出了一种并行算法,该算法给出了一个大小为N的正半确定程序的实例和一个近似因子e >, 0,在(并行)时间poly(1/e) polylog(N)中运行,使用poly(N)处理器,并输出一个在(1+ e)乘因子范围内的值至最优。我们的结果推广了Luby和Nisan(1993)关于正线性规划的类似结果,我们的算法受到了他们[10]算法的启发。
{"title":"A Parallel Approximation Algorithm for Positive Semidefinite Programming","authors":"Rahul Jain, Penghui Yao","doi":"10.1109/FOCS.2011.25","DOIUrl":"https://doi.org/10.1109/FOCS.2011.25","url":null,"abstract":"Positive semi definite programs are an important subclass of semi definite programs in which all matrices involved in the specification of the problem are positive semi definite and all scalars involved are non-negative. We present a parallel algorithm, which given an instance of a positive semi definite program of size N and an approximation factor e &gt, 0, runs in (parallel) time poly(1/e) polylog(N), using poly(N) processors, and outputs a value which is within multiplicative factor of (1+ e) to the optimal. Our result generalizes analogous result of Luby and Nisan (1993) for positive linear programs and our algorithm is inspired by their algorithm of [10].","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122873592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A Small PRG for Polynomial Threshold Functions of Gaussians 高斯多项式阈值函数的小PRG
Pub Date : 2011-04-06 DOI: 10.1109/FOCS.2011.16
D. Kane
We discuss a psuedorandom generator to $epsilon$-fool degree-d polynomial threshold functions with respect to the Gaussian distribution with seed length $2^O_c(d)log(n) epsilon^{-4-c}$. Our analysis involves several new ideas including what we term the "noisy derivative" of a function and a stronger version of standard anticoncentration results.
我们讨论了关于种子长度为$2^O_c(d)log(n) epsilon^{-4-c}$的高斯分布的伪随机生成器$epsilon$ -fool次多项式阈值函数。我们的分析涉及了几个新想法,包括我们称之为函数的“噪声导数”和标准反集中结果的更强版本。
{"title":"A Small PRG for Polynomial Threshold Functions of Gaussians","authors":"D. Kane","doi":"10.1109/FOCS.2011.16","DOIUrl":"https://doi.org/10.1109/FOCS.2011.16","url":null,"abstract":"We discuss a psuedorandom generator to $epsilon$-fool degree-d polynomial threshold functions with respect to the Gaussian distribution with seed length $2^O_c(d)log(n) epsilon^{-4-c}$. Our analysis involves several new ideas including what we term the \"noisy derivative\" of a function and a stronger version of standard anticoncentration results.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133052571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
The Grothendieck Constant is Strictly Smaller than Krivine's Bound 格罗滕迪克常数严格小于克里文界
Pub Date : 2011-03-31 DOI: 10.1017/fmp.2013.4
M. Braverman, K. Makarychev, Yury Makarychev, A. Naor
The classical Grothendieck constant, denoted $K_G$, is equal to the integrality gap of the natural semi definite relaxation of the problem of computing$$max {sum_{i=1}^msum_{j=1}^n a_{ij} epsilon_idelta_j: {epsilon_i}_{i=1}^m,{delta_j}_{j=1}^nsubseteq {-1,1}},$$a generic and well-studied optimization problem with many applications. Krivine proved in 1977 that $K_Gleq pi / (2log(1+sqrt{2}))$ and conjectured that his estimate is sharp. We obtain a sharper Grothendieck inequality, showing that $K_G 0$. Our main contribution is conceptual: despite dealing with a binary rounding problem, random 2-dimensional projections combined with a careful partition of $R^2$ in order to round the projected vectors, beat the random hyper plane technique, contrary to Krivine's long-standing conjecture.
经典的格罗滕迪克常数,记为$K_G$,等于计算问题$$max {sum_{i=1}^msum_{j=1}^n a_{ij} epsilon_idelta_j: {epsilon_i}_{i=1}^m,{delta_j}_{j=1}^nsubseteq {-1,1}},$$的自然半确定松弛的完整性间隙,这是一个广泛研究的优化问题,有许多应用。Krivine在1977年证明了$K_Gleq pi / (2log(1+sqrt{2}))$,并推测他的估计是准确的。我们得到一个更清晰的格罗滕迪克不等式,表明$K_G 0$。我们的主要贡献是概念上的:尽管处理了二进制舍入问题,但随机的二维投影结合$R^2$的仔细划分,以舍入投影向量,击败了随机超平面技术,这与Krivine长期以来的猜想相反。
{"title":"The Grothendieck Constant is Strictly Smaller than Krivine's Bound","authors":"M. Braverman, K. Makarychev, Yury Makarychev, A. Naor","doi":"10.1017/fmp.2013.4","DOIUrl":"https://doi.org/10.1017/fmp.2013.4","url":null,"abstract":"The classical Grothendieck constant, denoted $K_G$, is equal to the integrality gap of the natural semi definite relaxation of the problem of computing$$max {sum_{i=1}^msum_{j=1}^n a_{ij} epsilon_idelta_j: {epsilon_i}_{i=1}^m,{delta_j}_{j=1}^nsubseteq {-1,1}},$$a generic and well-studied optimization problem with many applications. Krivine proved in 1977 that $K_Gleq pi / (2log(1+sqrt{2}))$ and conjectured that his estimate is sharp. We obtain a sharper Grothendieck inequality, showing that $K_G 0$. Our main contribution is conceptual: despite dealing with a binary rounding problem, random 2-dimensional projections combined with a careful partition of $R^2$ in order to round the projected vectors, beat the random hyper plane technique, contrary to Krivine's long-standing conjecture.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121150390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in General 3-SAT更快,更简单- PPSZ保持的唯一sat边界
Pub Date : 2011-03-10 DOI: 10.1137/120868177
Timon Hertli
The PPSZ algorithm by Paturi, Pudl'ak, Saks, and Zane [1998] is the fastest known algorithm for Unique k-SAT, where the input formula does not have more than one satisfying assignment. For k>=5 the same bounds hold for general k-SAT. We show that this is also the case for k=3,4, using a slightly modified PPSZ algorithm. We do the analysis by defining a cost for satisfiable CNF formulas, which we prove to decrease in each PPSZ step by a certain amount. This improves our previous best bounds with Moser and Scheder [2011] for 3-SAT to O(1.308^n) and for 4-SAT to O(1.469^n).
Paturi, Pudl ak, Saks, and Zane[1998]提出的PPSZ算法是目前已知的最快的Unique k-SAT算法,该算法的输入公式不会有多于一个满意的赋值。对于k>=5,一般k- sat也有相同的界。我们使用稍微修改的PPSZ算法证明,对于k=3,4也是如此。我们通过定义一个可满足CNF公式的成本来进行分析,我们证明了每个PPSZ步骤都会减少一定数量的成本。这改进了我们之前使用Moser和Scheder[2011]对3-SAT到O(1.308^n)和4-SAT到O(1.469^n)的最佳界限。
{"title":"3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in General","authors":"Timon Hertli","doi":"10.1137/120868177","DOIUrl":"https://doi.org/10.1137/120868177","url":null,"abstract":"The PPSZ algorithm by Paturi, Pudl'ak, Saks, and Zane [1998] is the fastest known algorithm for Unique k-SAT, where the input formula does not have more than one satisfying assignment. For k>=5 the same bounds hold for general k-SAT. We show that this is also the case for k=3,4, using a slightly modified PPSZ algorithm. We do the analysis by defining a cost for satisfiable CNF formulas, which we prove to decrease in each PPSZ step by a certain amount. This improves our previous best bounds with Moser and Scheder [2011] for 3-SAT to O(1.308^n) and for 4-SAT to O(1.469^n).","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124762423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
Fully Dynamic Maximal Matching in O (log n) Update Time 在O (log n)更新时间内的完全动态最大匹配
Pub Date : 2011-03-06 DOI: 10.1137/130914140
Surender Baswana, Manoj Gupta, Sandeep Sen
We present an algorithm for maintaining maximal matching in a graph under addition and deletion of edges. Our data structure is randomized that takes $O( log n)$ expected amortized time for each edge update where $n$ is the number of vertices in the graph. While there is a trivial $O(n)$ algorithm for edge update, the previous best known result for this problem was due to Ivkovi'c and Llyodcite{llyod}. For a graph with $n$ vertices and $m$ edges, they give an $O( {(n+ m)}^{0.7072})$ update time algorithm which is sub linear only for a sparse graph. %To the best of our knowledge this %is the first polylog update time for maximal matching that implies an % exponential improvement from the previous results. For the related problem of maximum matching, Onak and Rubinfeld cite{onak} designed a randomized data structure that achieves $O(log^2 n)$ expected amortized time for each update for maintaining a $c$-approximate maximum matching for some large constant $c$. In contrast, we can maintain a factor two approximate maximum matching in $O(log n )$ expected amortized time per update as a direct corollary of the maximal matching scheme. This in turn also implies a two approximate vertex cover maintenance scheme that takes $O(log n )$expected amortized time per update.
提出了一种图在加边和删边情况下保持最大匹配的算法。我们的数据结构是随机化的,每次边缘更新需要$O( log n)$预期平摊时间,其中$n$是图中顶点的数量。虽然有一个微不足道的$O(n)$边缘更新算法,但这个问题之前最著名的结果是由于ivkovovic和lloyd cite{llyod}。对于具有$n$顶点和$m$边的图,他们给出了$O( {(n+ m)}^{0.7072})$更新时间算法,该算法仅对稀疏图是次线性的。 %To the best of our knowledge this %is the first polylog update time for maximal matching that implies an % exponential improvement from the previous results. For the related problem of maximum matching, Onak and Rubinfeld cite{onak} designed a randomized data structure that achieves $O(log^2 n)$ expected amortized time for each update for maintaining a $c$-approximate maximum matching for some large constant $c$. In contrast, we can maintain a factor two approximate maximum matching in $O(log n )$ expected amortized time per update as a direct corollary of the maximal matching scheme. This in turn also implies a two approximate vertex cover maintenance scheme that takes $O(log n )$expected amortized time per update.
{"title":"Fully Dynamic Maximal Matching in O (log n) Update Time","authors":"Surender Baswana, Manoj Gupta, Sandeep Sen","doi":"10.1137/130914140","DOIUrl":"https://doi.org/10.1137/130914140","url":null,"abstract":"We present an algorithm for maintaining maximal matching in a graph under addition and deletion of edges. Our data structure is randomized that takes $O( log n)$ expected amortized time for each edge update where $n$ is the number of vertices in the graph. While there is a trivial $O(n)$ algorithm for edge update, the previous best known result for this problem was due to Ivkovi'c and Llyodcite{llyod}. For a graph with $n$ vertices and $m$ edges, they give an $O( {(n+ m)}^{0.7072})$ update time algorithm which is sub linear only for a sparse graph. %To the best of our knowledge this %is the first polylog update time for maximal matching that implies an % exponential improvement from the previous results. For the related problem of maximum matching, Onak and Rubinfeld cite{onak} designed a randomized data structure that achieves $O(log^2 n)$ expected amortized time for each update for maintaining a $c$-approximate maximum matching for some large constant $c$. In contrast, we can maintain a factor two approximate maximum matching in $O(log n )$ expected amortized time per update as a direct corollary of the maximal matching scheme. This in turn also implies a two approximate vertex cover maintenance scheme that takes $O(log n )$expected amortized time per update.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122125964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
Near Optimal Column-Based Matrix Reconstruction 接近最优的基于列的矩阵重构
Pub Date : 2011-03-04 DOI: 10.1137/12086755X
Christos Boutsidis, P. Drineas, M. Magdon-Ismail
We consider low-rank reconstruction of a matrix using a subset of its columns and we present asymptotically optimal algorithms for both spectral norm and Frobenius norm reconstruction. The main tools we introduce to obtain our results are: (i) the use of fast approximate SVD-like decompositions for column-based matrix reconstruction, and (ii) two deterministic algorithms for selecting rows from matrices with orthonormal columns, building upon the sparse representation theorem for decompositions of the identity that appeared in [1].
我们考虑了使用列子集的矩阵的低秩重构,并给出了谱范数和Frobenius范数重构的渐近最优算法。我们引入的主要工具是:(i)使用快速近似类奇异值分解进行基于列的矩阵重构,以及(ii)基于[1]中出现的单位分解的稀疏表示定理,从具有标准正交列的矩阵中选择行的两种确定性算法。
{"title":"Near Optimal Column-Based Matrix Reconstruction","authors":"Christos Boutsidis, P. Drineas, M. Magdon-Ismail","doi":"10.1137/12086755X","DOIUrl":"https://doi.org/10.1137/12086755X","url":null,"abstract":"We consider low-rank reconstruction of a matrix using a subset of its columns and we present asymptotically optimal algorithms for both spectral norm and Frobenius norm reconstruction. The main tools we introduce to obtain our results are: (i) the use of fast approximate SVD-like decompositions for column-based matrix reconstruction, and (ii) two deterministic algorithms for selecting rows from matrices with orthonormal columns, building upon the sparse representation theorem for decompositions of the identity that appeared in [1].","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 244
Solving Connectivity Problems Parameterized by Treewidth in Single Exponential Time 单指数时间下树宽参数化连通性问题的求解
Pub Date : 2011-03-02 DOI: 10.1145/3506707
Marek Cygan, Jesper Nederlof, Marcin Pilipczuk, Michal Pilipczuk, J. M. M. Van Rooij, J. O. Wojtaszczyk
For the vast majority of local problems on graphs of small tree width (where by local we mean that a solution can be verified by checking separately the neighbourhood of each vertex), standard dynamic programming techniques give c^tw |V|^O(1) time algorithms, where tw is the tree width of the input graph G = (V, E) and c is a constant. On the other hand, for problems with a global requirement (usually connectivity) the best -- known algorithms were naive dynamic programming schemes running in at least tw^tw time. We breach this gap by introducing a technique we named Cut&Count that allows to produce c^tw |V|^O(1) time Monte Carlo algorithms for most connectivity-type problems, including Hamiltonian Path, Steiner Tree, Feedback Vertex Set and Connected Dominating Set. These results have numerous consequences in various fields, like parameterized complexity, exact and approximate algorithms on planar and H-minor-free graphs and exact algorithms on graphs of bounded degree. The constant c in our algorithms is in all cases small, and in several cases we are able to show that improving those constants would cause the Strong Exponential Time Hypothesis to fail. In contrast to the problems aiming to minimize the number of connected components that we solve using Cut&Count as mentioned above, we show that, assuming the Exponential Time Hypothesis, the aforementioned gap cannot be breached for some problems that aim to maximize the number of connected components like Cycle Packing.
对于绝大多数树宽度较小的图上的局部问题(这里的局部是指可以通过单独检查每个顶点的邻域来验证解决方案),标准的动态规划技术给出了c^tw |V|^O(1)时间算法,其中tw是输入图G = (V, E)的树宽度,c是常数。另一方面,对于具有全局需求(通常是连通性)的问题,最著名的算法是在至少tw^tw时间内运行的朴素动态规划方案。我们通过引入一种名为Cut&Count的技术打破了这一空白,该技术允许对大多数连通性类型的问题产生c^tw |V|^O(1)时间蒙特卡罗算法,包括哈密顿路径,斯坦纳树,反馈顶点集和连接支配集。这些结果在参数化复杂度、平面图和无h次图上的精确和近似算法以及有界度图上的精确算法等各个领域产生了许多影响。我们算法中的常数c在所有情况下都很小,在一些情况下,我们能够证明提高这些常数会导致强指数时间假设失败。与我们前面提到的使用Cut&Count解决的旨在最小化连接组件数量的问题相反,我们表明,假设指数时间假设,对于一些旨在最大化连接组件数量的问题(如循环包装),上述差距不能被破坏。
{"title":"Solving Connectivity Problems Parameterized by Treewidth in Single Exponential Time","authors":"Marek Cygan, Jesper Nederlof, Marcin Pilipczuk, Michal Pilipczuk, J. M. M. Van Rooij, J. O. Wojtaszczyk","doi":"10.1145/3506707","DOIUrl":"https://doi.org/10.1145/3506707","url":null,"abstract":"For the vast majority of local problems on graphs of small tree width (where by local we mean that a solution can be verified by checking separately the neighbourhood of each vertex), standard dynamic programming techniques give c^tw |V|^O(1) time algorithms, where tw is the tree width of the input graph G = (V, E) and c is a constant. On the other hand, for problems with a global requirement (usually connectivity) the best -- known algorithms were naive dynamic programming schemes running in at least tw^tw time. We breach this gap by introducing a technique we named Cut&Count that allows to produce c^tw |V|^O(1) time Monte Carlo algorithms for most connectivity-type problems, including Hamiltonian Path, Steiner Tree, Feedback Vertex Set and Connected Dominating Set. These results have numerous consequences in various fields, like parameterized complexity, exact and approximate algorithms on planar and H-minor-free graphs and exact algorithms on graphs of bounded degree. The constant c in our algorithms is in all cases small, and in several cases we are able to show that improving those constants would cause the Strong Exponential Time Hypothesis to fail. In contrast to the problems aiming to minimize the number of connected components that we solve using Cut&Count as mentioned above, we show that, assuming the Exponential Time Hypothesis, the aforementioned gap cannot be breached for some problems that aim to maximize the number of connected components like Cycle Packing.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 317
Privacy Amplification and Non-malleable Extractors via Character Sums 基于字符和的隐私放大和非延展性提取器
Pub Date : 2011-02-26 DOI: 10.1137/120868414
Y. Dodis, Xin Li, T. Wooley, David Zuckerman
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramatically strengthens the notion of a strong extractor. A strong extractor takes two inputs, a weakly-random $x$ and a uniformly random seed $y$, and outputs a string which appears uniform, even given $y$. For a non-malleable extractor $nm$, the output $nm(x,y)$ should appear uniform given $y$ as well as $nm(x,adv(y))$, where $adv$ is an arbitrary function with $adv(y) neq y$. We show that an extractor introduced by Chor and Gold reich is non-malleable when the entropy rate is above half. It outputs a linear number of bits when the entropy rate is $1/2 + alpha$, for any $alpha>0$. Previously, no nontrivial parameters were known for any non-malleable extractor. To achieve a polynomial running time when outputting many bits, we rely on a widely-believed conjecture about the distribution of prime numbers in arithmetic progressions. Our analysis involves a character sum estimate, which may be of independent interest. Using our non-malleable extractor, we obtain protocols for ``privacy amplification & quot;: key agreement between two parties who share a weakly-random secret. Our protocols work in the presence of an active adversary with unlimited computational power, and have asymptotically optimal entropy loss. When the secret has entropy rate greater than $1/2$, the protocol follows from a result of Dodis and Wichs, and takes two rounds. When the secret has entropy rate $delta$ for any constant~$delta>0$, our new protocol takes a constant (polynomial in $1/delta$) number of rounds. Our protocols run in polynomial time under the above well-known conjecture about primes.
在研究如何通过公共通道与活跃的对手进行通信时,多迪斯和威克斯引入了不可延展性提取器的概念。非延展性萃取器大大加强了强萃取器的概念。强提取器接受两个输入,一个弱随机$x$和一个均匀随机种子$y$,并输出一个看起来均匀的字符串,即使给定$y$。对于不可延展性提取器$nm$,在给定$y$和$nm(x,adv(y))$的情况下,输出$nm(x,y)$应该是一致的,其中$adv$是带有$adv(y) neq y$的任意函数。我们证明了Chor和Gold reich引入的提取器在熵率大于一半时是不可延展性的。对于任意$alpha>0$,当熵率为$1/2 + alpha$时,它输出一个线性位数。以前,对于任何非延展性提取器,没有已知的重要参数。为了在输出多个比特时实现多项式的运行时间,我们依赖于一个关于等差数列中素数分布的普遍猜想。我们的分析涉及一个特征和估计,这可能是独立的兴趣。使用我们的不可延展性提取器,我们获得了共享弱随机秘密的双方之间的“隐私放大”密钥协议。我们的协议在具有无限计算能力的活跃对手存在的情况下工作,并且具有渐近最优熵损失。当秘密的熵率大于$1/2$时,协议遵循Dodis和Wichs的结果,并进行两轮。当秘密对于任意常数$delta>0$具有熵率$delta$时,我们的新协议采用常数($1/delta$中的多项式)轮数。在上述素数猜想下,我们的协议在多项式时间内运行。
{"title":"Privacy Amplification and Non-malleable Extractors via Character Sums","authors":"Y. Dodis, Xin Li, T. Wooley, David Zuckerman","doi":"10.1137/120868414","DOIUrl":"https://doi.org/10.1137/120868414","url":null,"abstract":"In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramatically strengthens the notion of a strong extractor. A strong extractor takes two inputs, a weakly-random $x$ and a uniformly random seed $y$, and outputs a string which appears uniform, even given $y$. For a non-malleable extractor $nm$, the output $nm(x,y)$ should appear uniform given $y$ as well as $nm(x,adv(y))$, where $adv$ is an arbitrary function with $adv(y) neq y$. We show that an extractor introduced by Chor and Gold reich is non-malleable when the entropy rate is above half. It outputs a linear number of bits when the entropy rate is $1/2 + alpha$, for any $alpha>0$. Previously, no nontrivial parameters were known for any non-malleable extractor. To achieve a polynomial running time when outputting many bits, we rely on a widely-believed conjecture about the distribution of prime numbers in arithmetic progressions. Our analysis involves a character sum estimate, which may be of independent interest. Using our non-malleable extractor, we obtain protocols for ``privacy amplification & quot;: key agreement between two parties who share a weakly-random secret. Our protocols work in the presence of an active adversary with unlimited computational power, and have asymptotically optimal entropy loss. When the secret has entropy rate greater than $1/2$, the protocol follows from a result of Dodis and Wichs, and takes two rounds. When the secret has entropy rate $delta$ for any constant~$delta>0$, our new protocol takes a constant (polynomial in $1/delta$) number of rounds. Our protocols run in polynomial time under the above well-known conjecture about primes.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
A Nearly-m log n Time Solver for SDD Linear Systems SDD线性系统的近m log n时间解算器
Pub Date : 2011-02-23 DOI: 10.1109/FOCS.2011.85
I. Koutis, G. Miller, Richard Peng
We present an improved algorithm for solving symmetrically diagonally dominant linear systems. On input of an $ntimes n$ symmetric diagonally dominant matrix $A$ with $m$ non-zero entries and a vector $b$ such that $Abar{x} = b$ for some (unknown) vector $bar{x}$, our algorithm computes a vector $x$ such that $| |{x}-bar{x}| |_A1 in time. O tiled (m log n log (1/epsilon))^2. The solver utilizes in a standard way a 'preconditioning' chain of progressively sparser graphs. To claim the faster running time we make a two-fold improvement in the algorithm for constructing the chain. The new chain exploits previously unknown properties of the graph sparsification algorithm given in [Koutis,Miller,Peng, FOCS 2010], allowing for stronger preconditioning properties.We also present an algorithm of independent interest that constructs nearly-tight low-stretch spanning trees in time Otiled (mlog n), a factor of O (log n) faster than the algorithm in [Abraham,Bartal,Neiman, FOCS 2008]. This speedup directly reflects on the construction time of the preconditioning chain.
提出了一种求解对称对角占优线性系统的改进算法。当输入一个$n乘以n$对称对角占优矩阵$A$具有$m$非零项和一个向量$b$使得对于某个(未知)向量$bar{x}$, $Abar{x} = b$时,我们的算法计算一个向量$x$使得$| |{x}-bar{x}| |_A1在时间上。O平铺(m log n log (1/))^2)求解器以一种标准的方式利用逐步稀疏图的“预处理”链。为了获得更快的运行时间,我们对构建链的算法进行了两倍的改进。新的链利用了[Koutis,Miller,Peng, FOCS 2010]中给出的图稀疏化算法先前未知的性质,允许更强的预处理性质。我们还提出了一种独立感兴趣的算法,该算法在时间(mlog n)内构建近紧低拉伸生成树,比[Abraham,Bartal,Neiman, FOCS 2008]中的算法快O (log n)倍。这种加速直接反映在预处理链的构建时间上。
{"title":"A Nearly-m log n Time Solver for SDD Linear Systems","authors":"I. Koutis, G. Miller, Richard Peng","doi":"10.1109/FOCS.2011.85","DOIUrl":"https://doi.org/10.1109/FOCS.2011.85","url":null,"abstract":"We present an improved algorithm for solving symmetrically diagonally dominant linear systems. On input of an $ntimes n$ symmetric diagonally dominant matrix $A$ with $m$ non-zero entries and a vector $b$ such that $Abar{x} = b$ for some (unknown) vector $bar{x}$, our algorithm computes a vector $x$ such that $| |{x}-bar{x}| |_A1 in time. O tiled (m log n log (1/epsilon))^2. The solver utilizes in a standard way a 'preconditioning' chain of progressively sparser graphs. To claim the faster running time we make a two-fold improvement in the algorithm for constructing the chain. The new chain exploits previously unknown properties of the graph sparsification algorithm given in [Koutis,Miller,Peng, FOCS 2010], allowing for stronger preconditioning properties.We also present an algorithm of independent interest that constructs nearly-tight low-stretch spanning trees in time Otiled (mlog n), a factor of O (log n) faster than the algorithm in [Abraham,Bartal,Neiman, FOCS 2008]. This speedup directly reflects on the construction time of the preconditioning chain.","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125140763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 278
期刊
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1