首页 > 最新文献

Proceedings 2001 IEEE International Conference on Cluster Computing最新文献

英文 中文
Building low-diameter P2P networks 构建低直径P2P网络
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959925
Gopal Pandurangan, P. Raghavan, E. Upfal
In a peer-to-peer (P2P) network, nodes connect into an existing network and participate in providing and availing of services. There is no dichotomy between a central server and distributed clients. Current P2P networks (e.g., Gnutella) are constructed by participants following their own uncoordinated (and often whimsical) protocols; they consequently suffer from frequent network overload and fragmentation into disconnected pieces separated by choke-points with inadequate bandwidth. The authors propose a simple scheme for participants to build P2P networks in a distributed fashion, and prove that it results in connected networks of constant degree and logarithmic diameter. It does so with no global knowledge of all the nodes in the network. In the most common P2P application to date (search), these properties are important.
在点对点(P2P)网络中,节点连接到现有网络中,并参与提供和利用服务。在中央服务器和分布式客户端之间没有二分法。当前的P2P网络(例如Gnutella)是由参与者按照他们自己的不协调(通常是异想天开的)协议构建的;因此,它们遭受频繁的网络过载,并被带宽不足的阻塞点分隔成不连接的块。作者提出了一个简单的方案,让参与者以分布式的方式构建P2P网络,并证明了该方案可以产生常数度和对数直径的连接网络。它是在不了解网络中所有节点的全局知识的情况下这样做的。在目前最常见的P2P应用程序(搜索)中,这些属性很重要。
{"title":"Building low-diameter P2P networks","authors":"Gopal Pandurangan, P. Raghavan, E. Upfal","doi":"10.1109/SFCS.2001.959925","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959925","url":null,"abstract":"In a peer-to-peer (P2P) network, nodes connect into an existing network and participate in providing and availing of services. There is no dichotomy between a central server and distributed clients. Current P2P networks (e.g., Gnutella) are constructed by participants following their own uncoordinated (and often whimsical) protocols; they consequently suffer from frequent network overload and fragmentation into disconnected pieces separated by choke-points with inadequate bandwidth. The authors propose a simple scheme for participants to build P2P networks in a distributed fashion, and prove that it results in connected networks of constant degree and logarithmic diameter. It does so with no global knowledge of all the nodes in the network. In the most common P2P application to date (search), these properties are important.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115392318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 220
Extractors from Reed-Muller codes 里德-穆勒代码的提取器
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959940
A. Ta-Shma, David Zuckerman, S. Safra
Finding explicit extractors is an important derandomization goal that has received a lot of attention in the past decade. Previous research has focused on two approaches, one related to hashing and the other to pseudorandom generators. A third view, regarding extractors as good error correcting codes, was noticed before. Yet, researchers had failed to build extractors directly from a good code without using other tools from pseudorandomness. We succeed in constructing an extractor directly from a Reed-Muller code. To do this, we develop a novel proof technique. Furthermore, our construction is the first to achieve a degree close to linear. In contrast, the best previous constructions brought the log of the degree within a constant of optimal, which gives polynomial degree. This improvement is important for certain applications. For example, it follows that approximating the VC dimension to within a factor of N/sup 1-/spl delta// is AM-hard for any positive /spl delta/.
寻找显式提取器是一个重要的非随机化目标,在过去十年中受到了很多关注。以前的研究主要集中在两种方法上,一种与散列有关,另一种与伪随机生成器有关。第三种观点,认为提取器是很好的纠错码,之前已经注意到了。然而,研究人员未能直接从良好的代码中构建提取器,而不使用来自伪随机的其他工具。我们成功地直接从Reed-Muller代码构造了一个提取器。为了做到这一点,我们开发了一种新的证明技术。此外,我们的结构是第一个实现接近线性的程度。相比之下,以前最好的构造将次的对数置于最优常数内,即多项式次。这种改进对于某些应用程序非常重要。例如,由此可见,将VC维近似于N/sup -/spl delta//的因子范围内,对于任何正的/spl delta//都是AM-hard。
{"title":"Extractors from Reed-Muller codes","authors":"A. Ta-Shma, David Zuckerman, S. Safra","doi":"10.1109/SFCS.2001.959940","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959940","url":null,"abstract":"Finding explicit extractors is an important derandomization goal that has received a lot of attention in the past decade. Previous research has focused on two approaches, one related to hashing and the other to pseudorandom generators. A third view, regarding extractors as good error correcting codes, was noticed before. Yet, researchers had failed to build extractors directly from a good code without using other tools from pseudorandomness. We succeed in constructing an extractor directly from a Reed-Muller code. To do this, we develop a novel proof technique. Furthermore, our construction is the first to achieve a degree close to linear. In contrast, the best previous constructions brought the log of the degree within a constant of optimal, which gives polynomial degree. This improvement is important for certain applications. For example, it follows that approximating the VC dimension to within a factor of N/sup 1-/spl delta// is AM-hard for any positive /spl delta/.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130826916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Testing random variables for independence and identity 测试随机变量的独立性和同一性
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959920
Tugkan Batu, L. Fortnow, E. Fischer, Ravi Kumar, R. Rubinfeld, Patrick White
Given access to independent samples of a distribution A over [n] /spl times/ [m], we show how to test whether the distributions formed by projecting A to each coordinate are independent, i.e., whether A is /spl epsi/-close in the L/sub 1/ norm to the product distribution A/sub 1//spl times/A/sub 2/ for some distributions A/sub 1/ over [n] and A/sub 2/ over [m]. The sample complexity of our test is O/spl tilde/(n/sup 2/3/m/sup 1/3/poly(/spl epsi//sup -1/)), assuming without loss of generality that m/spl les/n. We also give a matching lower bound, up to poly (log n, /spl epsi//sup -1/) factors. Furthermore, given access to samples of a distribution X over [n], we show how to test if X is /spl epsi/-close in L/sub 1/ norm to an explicitly specified distribution Y. Our test uses O/spl tilde/(n/sup 1/2/poly(/spl epsi//sup -1/)) samples, which nearly matches the known tight bounds for the case when Y is uniform.
给定分布a / [n] /spl乘以/ [m]的独立样本,我们展示了如何测试通过将a投影到每个坐标形成的分布是否独立,即,对于某些分布a /sub 1// [n]和a /sub 2/ / [m], a在L/sub 1/范数中是否/spl epsi/-接近乘积分布a /sub 1//spl乘以/ a /sub 2/。我们测试的样本复杂性是O/spl波浪/(n/sup 2/3/m/sup 1/3/poly(/spl epsi//sup -1/)),假设m/spl小于/n,而不损失一般性。我们还给出了一个匹配的下界,直到poly (log n, /spl epsi//sup -1/)因子。此外,给定对分布X / [n]的样本的访问权,我们展示了如何测试X在L/sub 1/范数中是否/spl epsi/-接近显式指定的分布Y。我们的测试使用O/spl波浪/(n/sup 1/2/poly(/spl epsi//sup -1/))样本,这几乎与Y是均匀的情况下的已知紧密界限相匹配。
{"title":"Testing random variables for independence and identity","authors":"Tugkan Batu, L. Fortnow, E. Fischer, Ravi Kumar, R. Rubinfeld, Patrick White","doi":"10.1109/SFCS.2001.959920","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959920","url":null,"abstract":"Given access to independent samples of a distribution A over [n] /spl times/ [m], we show how to test whether the distributions formed by projecting A to each coordinate are independent, i.e., whether A is /spl epsi/-close in the L/sub 1/ norm to the product distribution A/sub 1//spl times/A/sub 2/ for some distributions A/sub 1/ over [n] and A/sub 2/ over [m]. The sample complexity of our test is O/spl tilde/(n/sup 2/3/m/sup 1/3/poly(/spl epsi//sup -1/)), assuming without loss of generality that m/spl les/n. We also give a matching lower bound, up to poly (log n, /spl epsi//sup -1/) factors. Furthermore, given access to samples of a distribution X over [n], we show how to test if X is /spl epsi/-close in L/sub 1/ norm to an explicitly specified distribution Y. Our test uses O/spl tilde/(n/sup 1/2/poly(/spl epsi//sup -1/)) samples, which nearly matches the known tight bounds for the case when Y is uniform.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121822001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 224
Simple extractors for all min-entropies and a new pseudo-random generator 所有最小熵的简单提取器和一个新的伪随机生成器
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959941
Ronen Shaltiel, C. Umans
We present a simple, self-contained extractor construction that produces good extractors for all min-entropies (min-entropy measures the amount of randomness contained in a weak random source). Our construction is algebraic and builds on a new polynomial-based approach introduced by A. Ta-Shma et al. (2001). Using our improvements, we obtain, for example, an extractor with output length m=k/sup 1-/spl delta// and seed length O(log n). This matches the parameters of L. Trevisan's (1999) breakthrough result and additionally achieves those parameters for small min-entropies k. Our construction gives a much simpler and more direct solution to this problem. Applying similar ideas to the problem of building pseudo-random generators, we obtain a new pseudo-random generator construction that is not based on the NW generator (N. Nisan and A. Widgerson, 1994), and turns worst-case hardness directly into pseudo-randomness. The parameters of this generator are strong enough to obtain a new proof that P=BPP if E requires exponential size circuits. Essentially, the same construction yields a hitting set generator with optimal seed length that outputs s/sup /spl Omega/(1)/ bits when given a function that requires circuits of size s (for any s). This implies a hardness versus randomness trade off for RP and BPP that is optimal (up to polynomial factors), solving an open problem raised by R. Impagliazzo et al. (1999). Our generators can also be used to derandomize AM.
我们提出了一个简单的、自包含的提取器结构,它对所有最小熵(最小熵测量弱随机源中包含的随机性量)产生良好的提取器。我们的构造是代数的,建立在a . Ta-Shma等人(2001)引入的一种新的基于多项式的方法之上。利用我们的改进,我们得到了一个输出长度为m=k/sup 1-/spl delta//和种子长度为O(log n)的提取器。这与L. Trevisan(1999)的突破性结果的参数相匹配,并且在最小熵k较小的情况下也实现了这些参数。我们的构造为这个问题提供了一个更简单、更直接的解决方案。将类似的思想应用于构建伪随机生成器的问题,我们获得了一种新的伪随机生成器构造,它不是基于NW生成器(N. Nisan和a . Widgerson, 1994),并将最坏情况硬度直接转化为伪随机性。该发生器的参数足够强,可以得到当E需要指数级电路时P=BPP的新证明。本质上,相同的构造产生了一个具有最佳种子长度的碰撞集生成器,当给定一个需要大小为s的电路的函数时(对于任何s),它输出s/sup /spl Omega/(1)/ bits。这意味着RP和BPP的最佳(最多多项式因子)的硬与随机权衡,解决了R. Impagliazzo等人(1999)提出的一个开放问题。我们的生成器也可以用来去随机化AM。
{"title":"Simple extractors for all min-entropies and a new pseudo-random generator","authors":"Ronen Shaltiel, C. Umans","doi":"10.1109/SFCS.2001.959941","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959941","url":null,"abstract":"We present a simple, self-contained extractor construction that produces good extractors for all min-entropies (min-entropy measures the amount of randomness contained in a weak random source). Our construction is algebraic and builds on a new polynomial-based approach introduced by A. Ta-Shma et al. (2001). Using our improvements, we obtain, for example, an extractor with output length m=k/sup 1-/spl delta// and seed length O(log n). This matches the parameters of L. Trevisan's (1999) breakthrough result and additionally achieves those parameters for small min-entropies k. Our construction gives a much simpler and more direct solution to this problem. Applying similar ideas to the problem of building pseudo-random generators, we obtain a new pseudo-random generator construction that is not based on the NW generator (N. Nisan and A. Widgerson, 1994), and turns worst-case hardness directly into pseudo-randomness. The parameters of this generator are strong enough to obtain a new proof that P=BPP if E requires exponential size circuits. Essentially, the same construction yields a hitting set generator with optimal seed length that outputs s/sup /spl Omega/(1)/ bits when given a function that requires circuits of size s (for any s). This implies a hardness versus randomness trade off for RP and BPP that is optimal (up to polynomial factors), solving an open problem raised by R. Impagliazzo et al. (1999). Our generators can also be used to derandomize AM.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 213
On the impossibility of basing trapdoor functions on trapdoor predicates 论在陷门谓词上建立陷门函数的不可能性
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959887
Yael Gertner, T. Malkin, Omer Reingold
We prove that, somewhat surprisingly, there is no black-box reduction of (poly-to-one) trapdoor functions to trapdoor predicates (equivalently, to public-key encryption schemes). Our proof follows the methodology that was introduced by R. Impagliazzo and S. Rudich (1989), although we use a new, weaker model of separation.
令人惊讶的是,我们证明(多对一)陷阱门函数没有黑盒约简到陷阱门谓词(相当于公钥加密方案)。我们的证明遵循R. Impagliazzo和S. Rudich(1989)引入的方法,尽管我们使用了一个新的,较弱的分离模型。
{"title":"On the impossibility of basing trapdoor functions on trapdoor predicates","authors":"Yael Gertner, T. Malkin, Omer Reingold","doi":"10.1109/SFCS.2001.959887","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959887","url":null,"abstract":"We prove that, somewhat surprisingly, there is no black-box reduction of (poly-to-one) trapdoor functions to trapdoor predicates (equivalently, to public-key encryption schemes). Our proof follows the methodology that was introduced by R. Impagliazzo and S. Rudich (1989), although we use a new, weaker model of separation.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1938 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128980890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
A Ramsey-type theorem for metric spaces and its applications for metrical task systems and related problems 度量空间的ramsey型定理及其在度量任务系统及相关问题中的应用
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959914
Y. Bartal, B. Bollobás, M. Mendel
The paper gives a nearly logarithmic lower bound on the randomized competitive ratio for a Metrical Task Systems model (A. Borodin et al., 1992). This implies a similar lower bound for the extensively studied K-server problem. Our proof is based on proving a Ramsey-type theorem for metric spaces. In particular, we prove that in every metric space there exists a large subspace which is approximately a "hierarchically well-separated tree" (HST) (Y. Bartal, 1996). This theorem may be of independent interest.
本文给出了一个测量任务系统模型的随机竞争比的近乎对数的下界(a . Borodin et al., 1992)。这意味着广泛研究的K-server问题也有类似的下界。我们的证明是基于对度量空间的ramsey型定理的证明。特别地,我们证明了在每个度量空间中存在一个大的子空间,它近似于一个“层次上良好分离的树”(Y. Bartal, 1996)。这个定理可能有独立的意义。
{"title":"A Ramsey-type theorem for metric spaces and its applications for metrical task systems and related problems","authors":"Y. Bartal, B. Bollobás, M. Mendel","doi":"10.1109/SFCS.2001.959914","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959914","url":null,"abstract":"The paper gives a nearly logarithmic lower bound on the randomized competitive ratio for a Metrical Task Systems model (A. Borodin et al., 1992). This implies a similar lower bound for the extensively studied K-server problem. Our proof is based on proving a Ramsey-type theorem for metric spaces. In particular, we prove that in every metric space there exists a large subspace which is approximately a \"hierarchically well-separated tree\" (HST) (Y. Bartal, 1996). This theorem may be of independent interest.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Testing subgraphs in large graphs 测试大图中的子图
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959918
N. Alon
Let H be a fixed graph with h vertices, let G be a graph on n vertices and suppose that at least /spl epsi/n/sup 2/ edges have to be deleted from it to make it H-free. It is known that in this case G contains at least f (/spl epsi/, H)n/sup h/ copies of H. We show that the largest possible function f (/spl epsi/, H) is polynomial in /spl epsi/ if and only if H is bipartite. This implies that there is a one-sided error property tester for checking H-freeness, whose query complexity is polynomial in 1//spl epsi/, if and only if H is bipartite.
设H是一个有H个顶点的固定图,设G是一个有n个顶点的图并假设至少要删除/spl / epsi/n/sup / 2条边才能使它无H。已知在这种情况下,G至少包含f (/spl epsi/, H)n/sup H /个H拷贝。我们证明了最大可能函数f (/spl epsi/, H)是/spl epsi/的多项式,当且仅当H是二部的。这表明,当且仅当H是二部的,存在一个检验H自由度的单侧错误性质检验器,其查询复杂度为1//spl epsi/的多项式。
{"title":"Testing subgraphs in large graphs","authors":"N. Alon","doi":"10.1109/SFCS.2001.959918","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959918","url":null,"abstract":"Let H be a fixed graph with h vertices, let G be a graph on n vertices and suppose that at least /spl epsi/n/sup 2/ edges have to be deleted from it to make it H-free. It is known that in this case G contains at least f (/spl epsi/, H)n/sup h/ copies of H. We show that the largest possible function f (/spl epsi/, H) is polynomial in /spl epsi/ if and only if H is bipartite. This implies that there is a one-sided error property tester for checking H-freeness, whose query complexity is polynomial in 1//spl epsi/, if and only if H is bipartite.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 184
Expander-based constructions of efficiently decodable codes 基于扩展器的高效可解码代码结构
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959942
V. Guruswami, P. Indyk
We present several novel constructions of codes which share the common thread of using expander (or expander-like) graphs as a component. The expanders enable the design of efficient decoding algorithms that correct a large number of errors through various forms of "voting" procedures. We consider both the notions of unique and list decoding, and in all cases obtain asymptotically good codes which are decodable up to a "maximum" possible radius and either: (a) achieve a similar rate as the previously best known codes but come with significantly faster algorithms, or (b) achieve a rate better than any prior construction with similar error-correction properties. Among our main results are: i) codes of rate /spl Omega/(/spl epsi//sup 2/) over constant-sized alphabet that can be list decoded in quadratic time from (1-/spl epsi/) errors; ii) codes of rate /spl Omega/(/spl epsi/) over constant-sized alphabet that can be uniquely decoded from (1/2-/spl epsi/) errors in near-linear time (this matches AG-codes with much faster algorithms); iii) linear-time encodable and decodable binary codes of positive rate (in fact, rate /spl Omega/(/spl epsi//sup 2/)) that can correct up to (1/4-/spl epsi/) fraction errors.
我们提出了几种新的代码结构,它们共享使用扩展器(或类似扩展器)图作为组件的共同思路。扩展器能够设计有效的解码算法,通过各种形式的“投票”程序纠正大量错误。我们考虑了唯一译码和列表译码的概念,并且在所有情况下都获得了可译码到“最大”可能半径的渐近好的代码,并且:(a)实现与以前最知名的代码相似的速率,但具有显着更快的算法,或者(b)实现比任何先前具有类似纠错特性的结构更好的速率。我们的主要成果包括:i)在恒定大小的字母表上,速率/spl Omega/(/spl epsi//sup 2/)的代码可以在二次时间内从(1-/spl epsi/)错误中列出解码;ii)码率/spl Omega/(/spl epsi/)在恒定大小的字母表上,可以在近线性时间内从(1/2-/spl epsi/)错误中唯一解码(这与具有更快算法的ag代码相匹配);iii)线性时间可编码和可解码的二进制码的正率(实际上,率/spl Omega/(/spl epsi//sup 2/)),可以纠正高达(1/4-/spl epsi/)分数错误。
{"title":"Expander-based constructions of efficiently decodable codes","authors":"V. Guruswami, P. Indyk","doi":"10.1109/SFCS.2001.959942","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959942","url":null,"abstract":"We present several novel constructions of codes which share the common thread of using expander (or expander-like) graphs as a component. The expanders enable the design of efficient decoding algorithms that correct a large number of errors through various forms of \"voting\" procedures. We consider both the notions of unique and list decoding, and in all cases obtain asymptotically good codes which are decodable up to a \"maximum\" possible radius and either: (a) achieve a similar rate as the previously best known codes but come with significantly faster algorithms, or (b) achieve a rate better than any prior construction with similar error-correction properties. Among our main results are: i) codes of rate /spl Omega/(/spl epsi//sup 2/) over constant-sized alphabet that can be list decoded in quadratic time from (1-/spl epsi/) errors; ii) codes of rate /spl Omega/(/spl epsi/) over constant-sized alphabet that can be uniquely decoded from (1/2-/spl epsi/) errors in near-linear time (this matches AG-codes with much faster algorithms); iii) linear-time encodable and decodable binary codes of positive rate (in fact, rate /spl Omega/(/spl epsi//sup 2/)) that can correct up to (1/4-/spl epsi/) fraction errors.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126343179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
An iterative rounding 2-approximation algorithm for the element connectivity problem 单元连通性问题的迭代舍入2逼近算法
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959908
L. Fleischer, K. Jain, David P. Williamson
In the survivable network design problem (SNDP), given an undirected graph and values r/sub ij/ for each pair of vertices i and j, we attempt to find a minimum-cost subgraph such that there are r/sub ij/ disjoint paths between vertices i and j. In the edge connected version of this problem (EC-SNDP), these paths must be edge-disjoint. In the vertex connected version of the problem (VC-SNDP), the paths must be vertex disjoint. K. Jain et al. (1999) propose a version of the problem intermediate in difficulty to these two, called the element connectivity problem (ELC-SNDP, or ELC). These variants of SNDP are all known to be NP-hard. The best known approximation algorithm for the EC-SNDP has performance guarantee of 2 (K. Jain, 2001), and iteratively rounds solutions to a linear programming relaxation of the problem. ELC has a primal-dual O (log k) approximation algorithm, where k=max/sub i,j/ r/sub ij/. VC-SNDP is not known to have a non-trivial approximation algorithm; however, recently L. Fleischer (2001) has shown how to extend the technique of K. Jain ( 2001) to give a 2-approximation algorithm in the case that r/sub ij//spl isin/{0, 1, 2}. She also shows that the same techniques will not work for VC-SNDP for more general values of r/sub ij/. The authors show that these techniques can be extended to a 2-approximation algorithm for ELC. This gives the first constant approximation algorithm for a general survivable network design problem which allows node failures.
在可生存网络设计问题(SNDP)中,给定一个无向图和每对顶点i和j的值r/sub ij/,我们试图找到一个最小代价的子图,使得顶点i和j之间有r/sub ij/不相交的路径。在这个问题的边连通版本(EC-SNDP)中,这些路径必须是边不相交的。在问题的顶点连通版本(VC-SNDP)中,路径必须是顶点不相交的。K. Jain等人(1999)提出了一个难度介于这两者之间的问题版本,称为元素连接问题(ELC- sndp,或ELC)。这些SNDP的变体都是NP-hard。最著名的EC-SNDP近似算法具有2的性能保证(K. Jain, 2001),并且迭代地将解舍为问题的线性规划松弛。ELC有一个原始对偶O (log k)近似算法,其中k=max/下标i,j/ r/下标ij/。VC-SNDP不具有非平凡近似算法;然而,最近L. Fleischer(2001)展示了如何扩展K. Jain(2001)的技术,在r/sub ij//spl isin/{0,1,2}的情况下给出一个2逼近算法。她还表明,对于更一般的r/sub ij/值,相同的技术将不适用于VC-SNDP。作者表明,这些技术可以扩展到ELC的2逼近算法。这给出了允许节点故障的一般可生存网络设计问题的第一个常数近似算法。
{"title":"An iterative rounding 2-approximation algorithm for the element connectivity problem","authors":"L. Fleischer, K. Jain, David P. Williamson","doi":"10.1109/SFCS.2001.959908","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959908","url":null,"abstract":"In the survivable network design problem (SNDP), given an undirected graph and values r/sub ij/ for each pair of vertices i and j, we attempt to find a minimum-cost subgraph such that there are r/sub ij/ disjoint paths between vertices i and j. In the edge connected version of this problem (EC-SNDP), these paths must be edge-disjoint. In the vertex connected version of the problem (VC-SNDP), the paths must be vertex disjoint. K. Jain et al. (1999) propose a version of the problem intermediate in difficulty to these two, called the element connectivity problem (ELC-SNDP, or ELC). These variants of SNDP are all known to be NP-hard. The best known approximation algorithm for the EC-SNDP has performance guarantee of 2 (K. Jain, 2001), and iteratively rounds solutions to a linear programming relaxation of the problem. ELC has a primal-dual O (log k) approximation algorithm, where k=max/sub i,j/ r/sub ij/. VC-SNDP is not known to have a non-trivial approximation algorithm; however, recently L. Fleischer (2001) has shown how to extend the technique of K. Jain ( 2001) to give a 2-approximation algorithm in the case that r/sub ij//spl isin/{0, 1, 2}. She also shows that the same techniques will not work for VC-SNDP for more general values of r/sub ij/. The authors show that these techniques can be extended to a 2-approximation algorithm for ELC. This gives the first constant approximation algorithm for a general survivable network design problem which allows node failures.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125769322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Fully dynamic all pairs shortest paths with real edge weights 具有实边权的全动态全对最短路径
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959900
C. Demetrescu, G. Italiano
We present the first fully dynamic algorithm for maintaining all pairs shortest paths in directed graphs with real-valued edge weights. Given a dynamic directed graph G such that each edge can assume at most S different real values, we show how to support updates deterministically in O(S/spl middot/n/sup 2.5/log/sup 3/n) amortized time and queries in optimal worst-case time. No previous fully dynamic algorithm was known for this problem. In the special case where edge weights can only be increased, we give a randomized algorithm with one-sided error which supports updates faster in O(S/spl middot/nlog/sup 3/n) amortized time.
提出了在有向图中维护所有对最短路径的全动态算法。给定一个动态有向图G,使得每条边最多可以假设S个不同的实值,我们展示了如何在O(S/spl middot/n/sup 2.5/log/sup 3/n)平摊时间和最优最坏情况下的查询时间内确定性地支持更新。对于这个问题,以前还没有完全动态的算法。在边缘权重只能增加的特殊情况下,我们给出了一种具有单边误差的随机化算法,该算法支持在O(S/spl middot/nlog/sup 3/n)平摊时间内更快地更新。
{"title":"Fully dynamic all pairs shortest paths with real edge weights","authors":"C. Demetrescu, G. Italiano","doi":"10.1109/SFCS.2001.959900","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959900","url":null,"abstract":"We present the first fully dynamic algorithm for maintaining all pairs shortest paths in directed graphs with real-valued edge weights. Given a dynamic directed graph G such that each edge can assume at most S different real values, we show how to support updates deterministically in O(S/spl middot/n/sup 2.5/log/sup 3/n) amortized time and queries in optimal worst-case time. No previous fully dynamic algorithm was known for this problem. In the special case where edge weights can only be increased, we give a randomized algorithm with one-sided error which supports updates faster in O(S/spl middot/nlog/sup 3/n) amortized time.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132011761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
期刊
Proceedings 2001 IEEE International Conference on Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1