首页 > 最新文献

Proceedings 2001 IEEE International Conference on Cluster Computing最新文献

英文 中文
Unique sink orientations of cubes 立方体的独特下沉方向
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959931
Tibor Szabó, E. Welzl
Suppose we are given (the edge graph of) an n-dimensional hypercube with its edges oriented so that every face has a unique sink. Such an orientation is called a unique sink orientation, and we are interested in finding the unique sink of the whole cube, when the orientation is given implicitly. The basic operation available is the so-called vertex evaluation, where we can access an arbitrary vertex of the cube, for which we obtain the orientations of the incident edges. Unique sink orientations occur when the edges of a deformed geometric n-dimensional cube (i.e., a polytope with the combinatorial structure of a cube) are oriented according to some generic linear function. These orientations are easily seen to be acyclic. The main motivation for studying unique sink orientations are certain linear complementarity problems, which allow this combinatorial abstraction (due to Stickney and Watson, 1978), where orientations with cycles can arise. Similarly, some quadratic optimization problems, like computing the smallest enclosing ball of a finite point set, can be formulated as finding a sink in a unique sink orientation (with cycles possible). For acyclic unique sink orientations, randomized procedures due to Bernd Gartner (1998, 2001) with an expected number of at Most e/sup 2/spl radic/n/ vertex evaluations have been known. For the general case, a simple randomized (3/2)/sup n/ procedure exists (without explicit mention in the literature). We present new algorithms, a deterministic O(1.61/sup n/) procedure and a randomized O((43/20)/sup n/2/)=O(1.47/sup n/) procedure for unique sink orientations. An interesting aspect of these algorithms is that they do not proceed on a path to the sink (in a simplex-like fashion), but they exploit the potential of random access (in the sense of arbitrary access) to any vertex of the cube. We consider this feature the main contribution of the paper. We believe that unique sink orientations have a rich structure, and there is ample space for improvement on the bounds given above.
假设我们给出了一个n维超立方体的边缘图,它的边缘定向使得每个面都有一个唯一的sink。这样的方向被称为唯一汇聚方向,我们感兴趣的是找到整个立方体的唯一汇聚,当方向是隐式给定的。可用的基本操作是所谓的顶点计算,我们可以访问立方体的任意顶点,从而获得入射边的方向。当一个变形的几何n维立方体(即具有立方体组合结构的多面体)的边缘根据某些一般线性函数定向时,就会出现唯一的汇聚方向。这些取向很容易被看作是无环的。研究唯一汇方向的主要动机是某些线性互补问题,它允许这种组合抽象(由于Stickney和Watson, 1978),其中可能出现带循环的方向。类似地,一些二次优化问题,如计算有限点集的最小封闭球,可以表述为在唯一的汇聚方向上找到一个汇聚(可能有循环)。对于非循环唯一汇方向,由Bernd Gartner(1998,2001)提出的随机化程序,其期望数量最多为e/sup 2/spl根/n/顶点评估。对于一般情况,存在一个简单的随机(3/2)/sup /程序(在文献中没有明确提及)。我们提出了一个新的算法,一个确定性的O(1.61/sup n/)过程和一个随机的O((43/20)/sup n/2/)=O(1.47/sup n/)过程。这些算法的一个有趣的方面是,它们不沿着通往汇聚点的路径前进(以类似于简单函数的方式),但它们利用了对立方体任何顶点的随机访问(在任意访问的意义上)的潜力。我们认为这一特点是本文的主要贡献。我们认为,独特的汇取向具有丰富的结构,并且在上述边界上有很大的改进空间。
{"title":"Unique sink orientations of cubes","authors":"Tibor Szabó, E. Welzl","doi":"10.1109/SFCS.2001.959931","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959931","url":null,"abstract":"Suppose we are given (the edge graph of) an n-dimensional hypercube with its edges oriented so that every face has a unique sink. Such an orientation is called a unique sink orientation, and we are interested in finding the unique sink of the whole cube, when the orientation is given implicitly. The basic operation available is the so-called vertex evaluation, where we can access an arbitrary vertex of the cube, for which we obtain the orientations of the incident edges. Unique sink orientations occur when the edges of a deformed geometric n-dimensional cube (i.e., a polytope with the combinatorial structure of a cube) are oriented according to some generic linear function. These orientations are easily seen to be acyclic. The main motivation for studying unique sink orientations are certain linear complementarity problems, which allow this combinatorial abstraction (due to Stickney and Watson, 1978), where orientations with cycles can arise. Similarly, some quadratic optimization problems, like computing the smallest enclosing ball of a finite point set, can be formulated as finding a sink in a unique sink orientation (with cycles possible). For acyclic unique sink orientations, randomized procedures due to Bernd Gartner (1998, 2001) with an expected number of at Most e/sup 2/spl radic/n/ vertex evaluations have been known. For the general case, a simple randomized (3/2)/sup n/ procedure exists (without explicit mention in the literature). We present new algorithms, a deterministic O(1.61/sup n/) procedure and a randomized O((43/20)/sup n/2/)=O(1.47/sup n/) procedure for unique sink orientations. An interesting aspect of these algorithms is that they do not proceed on a path to the sink (in a simplex-like fashion), but they exploit the potential of random access (in the sense of arbitrary access) to any vertex of the cube. We consider this feature the main contribution of the paper. We believe that unique sink orientations have a rich structure, and there is ample space for improvement on the bounds given above.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Game theory and mathematical economics: a theoretical computer scientist's introduction 博弈论与数理经济学:理论计算机科学家导论
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959877
C. Papadimitriou
There has been recently increasing interaction between game theory and, more generally, economic theory, with theoretical computer science, mainly in the context of the Internet. The paper is an invitation to this important frontier.
近来,博弈论以及更广泛意义上的经济学理论与理论计算机科学(主要是在互联网背景下)之间的互动越来越多。本文就是对这一重要前沿领域的邀请。
{"title":"Game theory and mathematical economics: a theoretical computer scientist's introduction","authors":"C. Papadimitriou","doi":"10.1109/SFCS.2001.959877","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959877","url":null,"abstract":"There has been recently increasing interaction between game theory and, more generally, economic theory, with theoretical computer science, mainly in the context of the Internet. The paper is an invitation to this important frontier.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129554095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Vickrey prices and shortest paths: what is an edge worth? Vickrey价格和最短路径:一条边值多少钱?
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959899
J. Hershberger, S. Suri
We solve a shortest path problem that is motivated by recent interest in pricing networks or other computational resources. Informally, how much is an edge in a network worth to a user who wants to send data between two nodes along a shortest path? If the network is a decentralized entity, such as the Internet, in which multiple self-interested agents own different parts of the network, then auction-based pricing seems appropriate. A celebrated result from auction theory shows that the use of Vickrey pricing motivates the owners of the network resources to bid truthfully. In Vickrey's scheme, each agent is compensated in proportion to the marginal utility he brings to the auction. In the context of shortest path routing, an edge's utility is the value by which it lowers the length of the shortest path, i.e., the difference between the shortest path lengths with and without the edge. Our problem is to compute these marginal values for all the edges of the network efficiently. The naive method requires solving the single-source shortest path problem up to n times, for an n-node network. We show that the Vickrey prices for all the edges can be computed in the same asymptotic time complexity as one single-source shortest path problem. This solves an open problem posed by N. Nisan and A. Ronen (1999).
我们解决了一个最短路径问题,这个问题是由最近对定价网络或其他计算资源的兴趣所激发的。非正式地说,对于想要沿着最短路径在两个节点之间发送数据的用户来说,网络中的一条边值多少钱?如果网络是一个分散的实体,比如互联网,其中多个自利的代理拥有网络的不同部分,那么基于拍卖的定价似乎是合适的。拍卖理论的一个著名结果表明,使用维克里定价可以激励网络资源的所有者诚实地出价。在维克瑞的方案中,每个代理人按照他为拍卖带来的边际效用的比例获得补偿。在最短路径路由的上下文中,边的效用是它降低最短路径长度的值,即有边和没有边的最短路径长度之差。我们的问题是有效地计算网络所有边的这些边缘值。对于n个节点的网络,朴素方法需要求解最多n次的单源最短路径问题。我们证明了所有边的Vickrey价格可以在与单源最短路径问题相同的渐近时间复杂度下计算。这解决了N. Nisan和A. Ronen(1999)提出的一个开放性问题。
{"title":"Vickrey prices and shortest paths: what is an edge worth?","authors":"J. Hershberger, S. Suri","doi":"10.1109/SFCS.2001.959899","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959899","url":null,"abstract":"We solve a shortest path problem that is motivated by recent interest in pricing networks or other computational resources. Informally, how much is an edge in a network worth to a user who wants to send data between two nodes along a shortest path? If the network is a decentralized entity, such as the Internet, in which multiple self-interested agents own different parts of the network, then auction-based pricing seems appropriate. A celebrated result from auction theory shows that the use of Vickrey pricing motivates the owners of the network resources to bid truthfully. In Vickrey's scheme, each agent is compensated in proportion to the marginal utility he brings to the auction. In the context of shortest path routing, an edge's utility is the value by which it lowers the length of the shortest path, i.e., the difference between the shortest path lengths with and without the edge. Our problem is to compute these marginal values for all the edges of the network efficiently. The naive method requires solving the single-source shortest path problem up to n times, for an n-node network. We show that the Vickrey prices for all the edges can be computed in the same asymptotic time complexity as one single-source shortest path problem. This solves an open problem posed by N. Nisan and A. Ronen (1999).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124232945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 254
Arc-disjoint paths in expander digraphs 展开图中的弧不相交路径
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959932
T. Bohman, A. Frieze
Given a digraph D=(V, A) and a set of /spl kappa/ pairs of vertices in V, we are interested in finding for each pair (x/sub i/, y/sub i/), a directed path connecting x/sub i/ to y/sub i/, such that the set of /spl kappa/ paths so found is arc-disjoint. For arbitrary graphs, the problem is /spl Nscr//spl Pscr/-complete, even for /spl kappa/=2. We present a polynomial time randomized algorithm for finding arc-disjoint paths in an r-regular expander digraph D. We show that if D has sufficiently strong expansion properties and r is sufficiently large, then all sets of /spl kappa/=/spl Omega/(n/log n) pairs of vertices can be joined. This is within a constant factor of best possible.
给定一个有向图D=(V, a)和V中的一组/spl kappa/对顶点,我们感兴趣的是为每一对(x/下标i/, y/下标i/)找到一条连接x/下标i/到y/下标i/的有向路径,使得所找到的/spl kappa/路径集是弧不相交的。对于任意图,问题是/spl Nscr//spl Pscr/-complete,即使/spl kappa/=2。提出了一种求r正则展开有向图D中弧不相交路径的多项式时间随机化算法,证明了如果D具有足够强的展开性质,且r足够大,则所有/spl kappa/=/spl Omega/(n/log n)顶点对集合都可以连接。这是在最佳可能的常数因子之内。
{"title":"Arc-disjoint paths in expander digraphs","authors":"T. Bohman, A. Frieze","doi":"10.1109/SFCS.2001.959932","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959932","url":null,"abstract":"Given a digraph D=(V, A) and a set of /spl kappa/ pairs of vertices in V, we are interested in finding for each pair (x/sub i/, y/sub i/), a directed path connecting x/sub i/ to y/sub i/, such that the set of /spl kappa/ paths so found is arc-disjoint. For arbitrary graphs, the problem is /spl Nscr//spl Pscr/-complete, even for /spl kappa/=2. We present a polynomial time randomized algorithm for finding arc-disjoint paths in an r-regular expander digraph D. We show that if D has sufficiently strong expansion properties and r is sufficiently large, then all sets of /spl kappa/=/spl Omega/(n/log n) pairs of vertices can be joined. This is within a constant factor of best possible.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the average-case hardness of CVP 关于CVP的平均硬度
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959905
Jin-Yi Cai
We prove a connection of the worst-case complexity to the average-case complexity based on the Closest Vector Problem (CVP) for lattices. We assume that there is an efficient algorithm which can approximately solve a random instance of CVP, with a non-trivial success probability. For lattices under a certain natural distribution, we show that one can approximately solve several lattice problems (including a version of CVP) efficiently for every lattice with high probability.
基于格的最接近向量问题(CVP),证明了最坏情况复杂度与平均情况复杂度之间的联系。我们假设存在一种有效的算法,它可以近似求解一个随机的CVP实例,并且成功概率是非平凡的。对于一定自然分布下的格,我们证明了人们可以对每个格以高概率有效地近似求解几个格问题(包括一个版本的CVP)。
{"title":"On the average-case hardness of CVP","authors":"Jin-Yi Cai","doi":"10.1109/SFCS.2001.959905","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959905","url":null,"abstract":"We prove a connection of the worst-case complexity to the average-case complexity based on the Closest Vector Problem (CVP) for lattices. We assume that there is an efficient algorithm which can approximately solve a random instance of CVP, with a non-trivial success probability. For lattices under a certain natural distribution, we show that one can approximately solve several lattice problems (including a version of CVP) efficiently for every lattice with high probability.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122064871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Three theorems regarding testing graph properties 关于测试图属性的三个定理
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959922
Oded Goldreich, L. Trevisan
Property testing is a relaxation of decision problems in which it is required to distinguish YES-instances (i.e., objects having a predetermined property) from instances that are far from any YES-instance. We present three theorems regarding testing graph properties in the adjacency matrix representation. More specifically, these theorems relate to the project of characterizing graph properties according to the complexity of testing them (in the adjacency matrix representation). The first theorem is that there exist monotone graph properties in /spl Nscr//spl Pscr/ for which testing is very hard (i.e., requires one to examine a constant fraction of the entries in the matrix). The second theorem is that every graph property that can be tested making a number of queries that is independent of the size of the graph, can be so tested by uniformly selecting a set of vertices and accepting iff the induced subgraph has some fixed graph property (which is not necessarily the same as the one being tested). The third theorem refers to the framework of graph partition problems, and is a characterization of the subclass of properties that can be tested using a one-sided error tester, making a number of queries that is independent of the size of the graph.
属性测试是对决策问题的一种放松,其中需要将YES-instance(即,具有预定属性的对象)与远离任何YES-instance的实例区分开来。给出了关于邻接矩阵表示中图的性质检验的三个定理。更具体地说,这些定理涉及到根据测试它们的复杂性来描述图属性的项目(在邻接矩阵表示中)。第一个定理是,在/spl Nscr//spl Pscr/中存在单调图性质,对其进行测试非常困难(即,需要检查矩阵中常量部分的条目)。第二个定理是,每一个可以被测试的图属性都可以通过一些独立于图大小的查询来测试,可以通过统一选择一组顶点并接受诱导子图具有一些固定的图属性(不一定与被测试的相同)来测试。第三个定理涉及图划分问题的框架,是可以使用单侧错误测试器进行测试的属性子类的表征,进行许多与图大小无关的查询。
{"title":"Three theorems regarding testing graph properties","authors":"Oded Goldreich, L. Trevisan","doi":"10.1109/SFCS.2001.959922","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959922","url":null,"abstract":"Property testing is a relaxation of decision problems in which it is required to distinguish YES-instances (i.e., objects having a predetermined property) from instances that are far from any YES-instance. We present three theorems regarding testing graph properties in the adjacency matrix representation. More specifically, these theorems relate to the project of characterizing graph properties according to the complexity of testing them (in the adjacency matrix representation). The first theorem is that there exist monotone graph properties in /spl Nscr//spl Pscr/ for which testing is very hard (i.e., requires one to examine a constant fraction of the entries in the matrix). The second theorem is that every graph property that can be tested making a number of queries that is independent of the size of the graph, can be so tested by uniformly selecting a set of vertices and accepting iff the induced subgraph has some fixed graph property (which is not necessarily the same as the one being tested). The third theorem refers to the framework of graph partition problems, and is a characterization of the subclass of properties that can be tested using a one-sided error tester, making a number of queries that is independent of the size of the graph.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133929920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 189
Deterministic computation of the Frobenius form Frobenius形式的确定性计算
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959911
A. Storjohann
A deterministic algorithm for computing the Frobenius canonical-form of a matrix over a field is described. A similarity transformation-matrix is recovered in the same time. The algorithm is nearly optimal, requiring about the same number of field operations as required for matrix multiplication. Previously-known reductions to matrix multiplication are probabilistic.
描述了计算域上矩阵的Frobenius标准形式的一种确定性算法。同时恢复相似变换矩阵。该算法几乎是最优的,所需的字段操作数量与矩阵乘法所需的字段操作数量相同。以前已知的矩阵乘法的简化是概率性的。
{"title":"Deterministic computation of the Frobenius form","authors":"A. Storjohann","doi":"10.1109/SFCS.2001.959911","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959911","url":null,"abstract":"A deterministic algorithm for computing the Frobenius canonical-form of a matrix over a field is described. A similarity transformation-matrix is recovered in the same time. The algorithm is nearly optimal, requiring about the same number of field operations as required for matrix multiplication. Previously-known reductions to matrix multiplication are probabilistic.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132997010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Simple routing strategies for adversarial systems 对抗性系统的简单路由策略
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959890
B. Awerbuch, P. Berenbrink, A. Brinkmann, C. Scheideler
In this paper we consider the problem of delivering dynamically changing input streams in dynamically changing networks where both the topology and the input streams can change in an unpredictable way. In particular, we present two simple distributed balancing algorithms (one for packet injections and one for flow injections) and show that for the case of a single receiver these algorithms will always ensure that the number of packets or flow in the system is bounded at any time step, even for an injection process that completely saturates the capacities of the available edges and even if the network topology changes in a completely unpredictable way. We also show that the maximum number of packets or flow that can be in the system at any time is essentially best possible by providing a lower bound that holds for any online algorithm, whether distributed or not. Interestingly, our balancing algorithms do not behave well in a completely adversarial setting. We show that also in the other extreme of a static network and a static injection pattern the algorithms will converge to a point in which they achieve an average routing time that is close to the best possible average routing time that can be achieved by any strategy. This demonstrates that there are simple algorithms that can be efficient for very different scenarios.
在本文中,我们考虑在动态变化的网络中传递动态变化的输入流的问题,其中拓扑和输入流都以不可预测的方式变化。特别是,我们提出了两种简单的分布式平衡算法(一种用于数据包注入,另一种用于流量注入),并表明对于单个接收器的情况,这些算法将始终确保系统中数据包或流量的数量在任何时间步长都是有界的,即使对于完全饱和可用边缘容量的注入过程,即使网络拓扑以完全不可预测的方式变化。我们还表明,在任何时候,系统中可以存在的数据包或流的最大数量基本上是通过提供一个适用于任何在线算法(无论是否分布式)的下界来实现的。有趣的是,我们的平衡算法在完全对抗的情况下表现不佳。我们还表明,在静态网络和静态注入模式的另一个极端中,算法将收敛到一个点,在这个点上,它们实现的平均路由时间接近于任何策略可以实现的最佳平均路由时间。这表明,有一些简单的算法可以有效地用于非常不同的场景。
{"title":"Simple routing strategies for adversarial systems","authors":"B. Awerbuch, P. Berenbrink, A. Brinkmann, C. Scheideler","doi":"10.1109/SFCS.2001.959890","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959890","url":null,"abstract":"In this paper we consider the problem of delivering dynamically changing input streams in dynamically changing networks where both the topology and the input streams can change in an unpredictable way. In particular, we present two simple distributed balancing algorithms (one for packet injections and one for flow injections) and show that for the case of a single receiver these algorithms will always ensure that the number of packets or flow in the system is bounded at any time step, even for an injection process that completely saturates the capacities of the available edges and even if the network topology changes in a completely unpredictable way. We also show that the maximum number of packets or flow that can be in the system at any time is essentially best possible by providing a lower bound that holds for any online algorithm, whether distributed or not. Interestingly, our balancing algorithms do not behave well in a completely adversarial setting. We show that also in the other extreme of a static network and a static injection pattern the algorithms will converge to a point in which they achieve an average routing time that is close to the best possible average routing time that can be achieved by any strategy. This demonstrates that there are simple algorithms that can be efficient for very different scenarios.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 72
Online facility location 在线设施位置
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959917
A. Meyerson
We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these points. We provide a randomized online O(1)-competitive algorithm in the case where points arrive in random order. If points are ordered adversarially, we show that no algorithm can be constant-competitive, and provide an O(log n)-competitive algorithm. Our algorithms are randomized and the analysis depends heavily on the concept of expected waiting time. We also combine our techniques with those of M. Charikar and S. Guha (1999) to provide a linear-time constant approximation for the offline facility location problem.
我们考虑设施位置的在线变体,其中需求点每次到达一个,我们必须维护一组设施来服务这些点。在点以随机顺序到达的情况下,我们提供了一个随机在线O(1)竞争算法。如果点是对偶排序的,我们证明了没有算法可以是恒定竞争的,并提供了一个O(log n)竞争算法。我们的算法是随机的,分析在很大程度上依赖于预期等待时间的概念。我们还将我们的技术与M. Charikar和S. Guha(1999)的技术相结合,为离线设施选址问题提供了线性时间常数近似。
{"title":"Online facility location","authors":"A. Meyerson","doi":"10.1109/SFCS.2001.959917","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959917","url":null,"abstract":"We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these points. We provide a randomized online O(1)-competitive algorithm in the case where points arrive in random order. If points are ordered adversarially, we show that no algorithm can be constant-competitive, and provide an O(log n)-competitive algorithm. Our algorithms are randomized and the analysis depends heavily on the concept of expected waiting time. We also combine our techniques with those of M. Charikar and S. Guha (1999) to provide a linear-time constant approximation for the offline facility location problem.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133397419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 283
Counting axioms do not polynomially simulate counting gates 计数公理不多项式地模拟计数门
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959894
R. Impagliazzo, Nathan Segerlind
We give a family of tautologies whose algebraic translations have constant-degree, polynomial size polynomial calculus refutations over Z/sub 2/, but which require superpolynomial size bounded-depth Frege proofs from Count/sub 2/ axioms. This gives a superpolynomial size separation of bounded-depth Frege plus mod 2 counting axioms from bounded-depth Frege plus parity gates. Combined with another result of the authors, it gives the first size (as opposed to degree) separation between the polynomial calculus and Nullstellensatz systems.
我们给出了一类重言式,它们的代数平移在Z/sub 2/上具有常次、多项式大小的多项式微积分反驳,但它们需要从Count/sub 2/公理中得到超多项式大小的有界深度的Frege证明。这给出了有界深度Frege加模2计数公理与有界深度Frege加奇偶校验门的超多项式大小分离。结合作者的另一个结果,它给出了多项式演算和Nullstellensatz系统之间的第一个大小(而不是度)分离。
{"title":"Counting axioms do not polynomially simulate counting gates","authors":"R. Impagliazzo, Nathan Segerlind","doi":"10.1109/SFCS.2001.959894","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959894","url":null,"abstract":"We give a family of tautologies whose algebraic translations have constant-degree, polynomial size polynomial calculus refutations over Z/sub 2/, but which require superpolynomial size bounded-depth Frege proofs from Count/sub 2/ axioms. This gives a superpolynomial size separation of bounded-depth Frege plus mod 2 counting axioms from bounded-depth Frege plus parity gates. Combined with another result of the authors, it gives the first size (as opposed to degree) separation between the polynomial calculus and Nullstellensatz systems.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128785276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
Proceedings 2001 IEEE International Conference on Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1