首页 > 最新文献

Proceedings 2001 IEEE International Conference on Cluster Computing最新文献

英文 中文
Tight approximation results for general covering integer programs 一般覆盖整数规划的紧逼近结果
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959928
Stavros G. Kolliopoulos, N. Young
In this paper we study approximation algorithms for solving a general covering integer program. An n-vector x of nonnegative integers is sought, which minimizes c/sup T//spl middot/x, subject to Ax/spl ges/b, x/spl les/d. The entries of A, b, c are nonnegative. Let m be the number of rows of A. Covering problems have been heavily studied in combinatorial optimization. We focus on the effect of the multiplicity constraints, x/spl les/d, on approximately. Two longstanding open questions remain for this general formulation with upper bounds on the variables. (i) The integrality gap of the standard LP relaxation is arbitrarily large. Existing approximation algorithms that achieve the well-known O(log m)-approximation with respect to the LP value do so at the expense of violating the upper bounds on the variables by the same O(log m) multiplicative factor. What is the smallest possible violation of the upper bounds that still achieves cost within O(log m) of the standard LP optimum? (ii) The best known approximation ratio for the problem has been O(log(max/sub j//spl Sigma//sub i/A/sub ij/)) since 1982. This bound can be as bad as polynomial in the input size. Is an O(log m)-approximation, like the one known for the special case of Set Cover, possible? We settle these two open questions. To answer the first question we give an algorithm based on the relatively simple new idea of randomly rounding variables to smaller-than-integer units. To settle the second question we give a reduction from approximating the problem while respecting multiplicity constraints to approximating the problem with a bounded violation of the multiplicity constraints.
本文研究了求解一般覆盖整数规划的近似算法。求一个非负整数的n向量x,使c/sup T//spl middot/x最小,服从Ax/spl ges/b, x/spl les/d。A b c的元素都是非负的。设m为a的行数,覆盖问题在组合优化中得到了广泛的研究。我们关注多重约束的影响,x/spl / les/d,对近似。对于这个具有变量上界的一般公式,仍然存在两个长期存在的开放性问题。(i)标准LP弛豫的完整性间隙任意大。现有的近似算法实现了众所周知的关于LP值的O(log m)近似,这样做的代价是违反了变量的上界,同样是O(log m)乘法因子。在标准LP最优的O(log m)范围内,对上界的最小可能违背是什么?(ii)自1982年以来,该问题最著名的近似比为O(log(max/sub j//spl Sigma//sub i/A/sub ij/))。这个边界可以是输入大小的多项式。O(log m)的近似,就像集合覆盖的特殊情况一样,可能吗?我们解决了这两个悬而未决的问题。为了回答第一个问题,我们给出了一个基于相对简单的新思想的算法,该思想将变量随机四舍五入到小于整数的单位。为了解决第二个问题,我们给出了从尊重多重性约束近似问题到有界违反多重性约束近似问题的简化。
{"title":"Tight approximation results for general covering integer programs","authors":"Stavros G. Kolliopoulos, N. Young","doi":"10.1109/SFCS.2001.959928","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959928","url":null,"abstract":"In this paper we study approximation algorithms for solving a general covering integer program. An n-vector x of nonnegative integers is sought, which minimizes c/sup T//spl middot/x, subject to Ax/spl ges/b, x/spl les/d. The entries of A, b, c are nonnegative. Let m be the number of rows of A. Covering problems have been heavily studied in combinatorial optimization. We focus on the effect of the multiplicity constraints, x/spl les/d, on approximately. Two longstanding open questions remain for this general formulation with upper bounds on the variables. (i) The integrality gap of the standard LP relaxation is arbitrarily large. Existing approximation algorithms that achieve the well-known O(log m)-approximation with respect to the LP value do so at the expense of violating the upper bounds on the variables by the same O(log m) multiplicative factor. What is the smallest possible violation of the upper bounds that still achieves cost within O(log m) of the standard LP optimum? (ii) The best known approximation ratio for the problem has been O(log(max/sub j//spl Sigma//sub i/A/sub ij/)) since 1982. This bound can be as bad as polynomial in the input size. Is an O(log m)-approximation, like the one known for the special case of Set Cover, possible? We settle these two open questions. To answer the first question we give an algorithm based on the relatively simple new idea of randomly rounding variables to smaller-than-integer units. To settle the second question we give a reduction from approximating the problem while respecting multiplicity constraints to approximating the problem with a bounded violation of the multiplicity constraints.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131843269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Universally composable security: a new paradigm for cryptographic protocols 普遍可组合安全性:加密协议的新范式
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959888
R. Canetti
We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is composed of an arbitrary set of protocols, or more generally when the protocol is used as a component of an arbitrary system. This is an essential property for maintaining security of cryptographic protocols in complex and unpredictable environments such as the Internet. In particular, universally composable definitions guarantee security even when an unbounded number of protocol instances are executed concurrently in an adversarially controlled manner, they guarantee non-malleability with respect to arbitrary protocols, and more. We show how to formulate universally composable definitions of security for practically any cryptographic task. Furthermore, we demonstrate that practically any such definition can be realized using known techniques, as long as only a minority of the participants are corrupted. We then proceed to formulate universally composable definitions of a wide array of cryptographic tasks, including authenticated and secure communication, key-exchange, public-key encryption, signature, commitment, oblivious transfer, zero knowledge and more. We also make initial steps towards studying the realizability of the proposed definitions in various settings.
我们提出了一种定义加密协议安全性的新范式,称为通用可组合安全性。普遍可组合的安全定义的显著特性是,即使安全协议由任意一组协议组成,或者更一般地说,当协议用作任意系统的组件时,它们也能保证安全性。这是在复杂和不可预测的环境(如Internet)中维护加密协议安全性的基本属性。特别是,通用可组合定义即使在以对抗性控制的方式并发执行无限数量的协议实例时也能保证安全性,它们保证任意协议的不可延展性,等等。我们将展示如何为几乎任何加密任务制定普遍可组合的安全性定义。此外,我们证明,实际上任何这样的定义都可以使用已知的技术来实现,只要只有少数参与者被破坏。然后,我们继续制定广泛的加密任务的普遍可组合的定义,包括身份验证和安全通信,密钥交换,公钥加密,签名,承诺,遗忘传输,零知识等。我们还采取初步步骤,研究在各种情况下提出的定义的可实现性。
{"title":"Universally composable security: a new paradigm for cryptographic protocols","authors":"R. Canetti","doi":"10.1109/SFCS.2001.959888","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959888","url":null,"abstract":"We propose a novel paradigm for defining security of cryptographic protocols, called universally composable security. The salient property of universally composable definitions of security is that they guarantee security even when a secure protocol is composed of an arbitrary set of protocols, or more generally when the protocol is used as a component of an arbitrary system. This is an essential property for maintaining security of cryptographic protocols in complex and unpredictable environments such as the Internet. In particular, universally composable definitions guarantee security even when an unbounded number of protocol instances are executed concurrently in an adversarially controlled manner, they guarantee non-malleability with respect to arbitrary protocols, and more. We show how to formulate universally composable definitions of security for practically any cryptographic task. Furthermore, we demonstrate that practically any such definition can be realized using known techniques, as long as only a minority of the participants are corrupted. We then proceed to formulate universally composable definitions of a wide array of cryptographic tasks, including authenticated and secure communication, key-exchange, public-key encryption, signature, commitment, oblivious transfer, zero knowledge and more. We also make initial steps towards studying the realizability of the proposed definitions in various settings.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127617639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3173
Resolution is not automatizable unless W[P] is tractable 除非W[P]是可处理的,否则分辨率不是自动化的
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959895
Michael Alekhnovich, A. Razborov
We show that neither Resolution nor tree-like Resolution is automatizable unless the class W[P] from the hierarchy of parameterized problems is fixed-parameter tractable by randomized algorithms with one-sided error.
我们证明,除非来自参数化问题层次的类W[P]是可由具有单侧误差的随机算法处理的固定参数,否则分辨力和树状分辨力都不是可自动化的。
{"title":"Resolution is not automatizable unless W[P] is tractable","authors":"Michael Alekhnovich, A. Razborov","doi":"10.1109/SFCS.2001.959895","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959895","url":null,"abstract":"We show that neither Resolution nor tree-like Resolution is automatizable unless the class W[P] from the hierarchy of parameterized problems is fixed-parameter tractable by randomized algorithms with one-sided error.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 126
Query efficient PCPs with perfect completeness 查询高效、完备的pcp
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959937
J. Håstad, Subhash Khot
For every integer k>1, we present a PCP characterization of NP where the verifier uses logarithmic randomness, queries 4k+k/sup 2/ bits in the proof, accepts a correct proof with probability 1 (i.e. it is has perfect completeness) and accepts any supposed proof of a false statement with a certain maximum probability. In particular, the verifier achieves optimal amortized query complexity of 1+/spl delta/ for arbitrarily small constant /spl delta/>0. Such a characterization was already proved by A. Samorodnitsky and L. Trevisan (2000), but their verifier loses perfect completeness and their proof makes an essential use of this feature. By using an adaptive verifier, we can decrease the number of query bits to 2k+k/sup 2/, the same number obtained by Samorodnitsky and Trevisan. Finally, we extend some of the results to larger domains.
对于每一个k>1的整数,我们给出了NP的PCP表征,其中验证者使用对数随机性,在证明中查询4k+k/sup 2/ bits,以概率1接受一个正确的证明(即它具有完全完备性),并以一定的最大概率接受一个假陈述的任何假设证明。特别是,对于任意小常数/spl delta/>0,验证器实现了1+/spl delta/的最优平摊查询复杂度。a . Samorodnitsky和L. Trevisan(2000)已经证明了这种表征,但他们的验证者失去了完美的完备性,他们的证明实质上利用了这一特征。通过使用自适应验证器,我们可以将查询比特数减少到与Samorodnitsky和Trevisan相同的2k+k/sup 2/。最后,我们将一些结果扩展到更大的领域。
{"title":"Query efficient PCPs with perfect completeness","authors":"J. Håstad, Subhash Khot","doi":"10.1109/SFCS.2001.959937","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959937","url":null,"abstract":"For every integer k>1, we present a PCP characterization of NP where the verifier uses logarithmic randomness, queries 4k+k/sup 2/ bits in the proof, accepts a correct proof with probability 1 (i.e. it is has perfect completeness) and accepts any supposed proof of a false statement with a certain maximum probability. In particular, the verifier achieves optimal amortized query complexity of 1+/spl delta/ for arbitrarily small constant /spl delta/>0. Such a characterization was already proved by A. Samorodnitsky and L. Trevisan (2000), but their verifier loses perfect completeness and their proof makes an essential use of this feature. By using an adaptive verifier, we can decrease the number of query bits to 2k+k/sup 2/, the same number obtained by Samorodnitsky and Trevisan. Finally, we extend some of the results to larger domains.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122544288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Facility location with nonuniform hard capacities 硬件容量不统一的设施位置
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959907
Martin Pál, É. Tardos, T. Wexler
The authors give the first constant factor approximation algorithm for the facility location problem with nonuniform, hard capacities. Facility location problems have received a great deal of attention in recent years. Approximation algorithms have been developed for many variants. Most of these algorithms are based on linear programming, but the LP techniques developed thus far have been unsuccessful in dealing with hard capacities. A local-search based approximation algorithm (M. Korupolu et al., 1998; F.A. Chudak and D.P. Williamson, 1999) is known for the special case of hard but uniform capacities. We present a local-search heuristic that yields an approximation guarantee of 9 + /spl epsi/ for the case of nonuniform hard capacities. To obtain this result, we introduce new operations that are natural in this context. Our proof is based on network flow techniques.
针对具有非均匀硬容量的设施选址问题,给出了第一种常因子近似算法。近年来,设施选址问题受到了广泛的关注。已经为许多变体开发了近似算法。这些算法大多基于线性规划,但迄今为止开发的LP技术在处理硬容量方面并不成功。基于局部搜索的近似算法(M. Korupolu et al., 1998;F.A. Chudak和D.P. Williamson(1999)以硬但统一的能力的特殊情况而闻名。我们提出了一个局部搜索启发式算法,对于非均匀硬容量的情况,它产生了9 + /spl epsi/的近似保证。为了获得这个结果,我们引入了在这个上下文中很自然的新操作。我们的证明是基于网络流技术。
{"title":"Facility location with nonuniform hard capacities","authors":"Martin Pál, É. Tardos, T. Wexler","doi":"10.1109/SFCS.2001.959907","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959907","url":null,"abstract":"The authors give the first constant factor approximation algorithm for the facility location problem with nonuniform, hard capacities. Facility location problems have received a great deal of attention in recent years. Approximation algorithms have been developed for many variants. Most of these algorithms are based on linear programming, but the LP techniques developed thus far have been unsuccessful in dealing with hard capacities. A local-search based approximation algorithm (M. Korupolu et al., 1998; F.A. Chudak and D.P. Williamson, 1999) is known for the special case of hard but uniform capacities. We present a local-search heuristic that yields an approximation guarantee of 9 + /spl epsi/ for the case of nonuniform hard capacities. To obtain this result, we introduce new operations that are natural in this context. Our proof is based on network flow techniques.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129087045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 140
Designing networks incrementally 逐步设计网络
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959915
A. Meyerson, Kamesh Munagala, Serge A. Plotkin
We consider the problem of incrementally designing a network to route demand to a single sink on an underlying metric space. We are given cables whose costs per unit length scale in a concave fashion with capacity. Under certain natural restrictions on the costs (called the Access Network Design constraints), we present a simple and efficient randomized algorithm that is competitive to the minimum cost solution when the demand points arrive online. In particular, if the order of arrival is a random permutation, we can prove a O(1) competitive ratio. For the fully adversarial case, the algorithm is O(K) -competitive, where K is the number of different pipe types. Since the value of K is typically small, this improves the previous O(log n log log n)-competitive algorithm which was based on probabilistically approximating the underlying metric by a tree metric. Our algorithm also improves the best known approximation ratio and running time for the offline version of this problem.
我们考虑增量设计网络的问题,将需求路由到底层度量空间上的单个接收器。给定电缆,其单位长度的成本与容量呈凹形关系。在一定的自然成本限制下(称为接入网设计约束),我们提出了一个简单有效的随机算法,当需求点到达在线时,该算法与最小成本解决方案竞争。特别是,如果到达顺序是随机排列,我们可以证明一个O(1)竞争比。对于完全对抗的情况,算法是O(K)竞争的,其中K是不同管道类型的数量。由于K的值通常很小,这改进了之前的O(log n log log n)竞争算法,该算法基于通过树度量概率近似底层度量。我们的算法还改进了该问题的离线版本的最著名的近似比和运行时间。
{"title":"Designing networks incrementally","authors":"A. Meyerson, Kamesh Munagala, Serge A. Plotkin","doi":"10.1109/SFCS.2001.959915","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959915","url":null,"abstract":"We consider the problem of incrementally designing a network to route demand to a single sink on an underlying metric space. We are given cables whose costs per unit length scale in a concave fashion with capacity. Under certain natural restrictions on the costs (called the Access Network Design constraints), we present a simple and efficient randomized algorithm that is competitive to the minimum cost solution when the demand points arrive online. In particular, if the order of arrival is a random permutation, we can prove a O(1) competitive ratio. For the fully adversarial case, the algorithm is O(K) -competitive, where K is the number of different pipe types. Since the value of K is typically small, this improves the previous O(log n log log n)-competitive algorithm which was based on probabilistically approximating the underlying metric by a tree metric. Our algorithm also improves the best known approximation ratio and running time for the offline version of this problem.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122784757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Source routing and scheduling in packet networks 分组网络中的源路由和调度
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959891
M. Andrews, Antonio Fernández, Ashish Goel, Lisa Zhang
We study routing and scheduling in packet-switched networks. We assume an adversary that controls the injection time, source, and destination for each packet injected. A set of paths for these packets is admissible if no link in the network is overloaded. We present the first on-line routing algorithm that finds a set of admissible paths whenever this is feasible. Our algorithm calculates a path for each packet as soon as it is injected at its source using a simple shortest path computation. The length of a link reflects its current congestion. We also show how our algorithm can be implemented under today's Internet routing paradigms. When the paths are known (either given by the adversary or computed as above) our goal is to schedule the packets along the given paths so that the packets experience small end-to-end delays. The best previous delay bounds for deterministic and distributed scheduling protocols were exponential in the path length. In this paper we present the first deterministic and distributed scheduling protocol that guarantees a polynomial end-to-end delay for every packet. Finally, we discuss the effects of combining routing with scheduling. We first show that some, unstable scheduling protocols remain unstable no matter how the paths are chosen. However, the freedom to choose paths can make a difference. For example, we show that a ring with parallel links is stable for all greedy scheduling protocols if paths are chosen intelligently, whereas this is not the case if the adversary specifies the paths.
研究分组交换网络中的路由和调度问题。我们假设有一个对手控制每个注入的数据包的注入时间、源和目的地。如果网络中没有链路过载,这些数据包的一组路径是允许的。我们提出了第一个在线路由算法,它在可行的情况下找到一组可接受的路径。我们的算法使用简单的最短路径计算,一旦每个数据包被注入到其源处,就为其计算一条路径。链路的长度反映了当前的拥塞情况。我们还展示了如何在当今的互联网路由范式下实现我们的算法。当路径已知(由对手给出或如上所述计算)时,我们的目标是沿着给定的路径调度数据包,以便数据包经历较小的端到端延迟。确定性调度协议和分布式调度协议的最佳先验延迟界与路径长度呈指数关系。在本文中,我们提出了第一个确定性和分布式调度协议,它保证了每个数据包的多项式端到端延迟。最后,讨论了路由与调度相结合的效果。我们首先证明,无论如何选择路径,一些不稳定的调度协议仍然不稳定。然而,选择道路的自由可以带来不同。例如,我们证明,如果智能地选择路径,具有并行链路的环对于所有贪婪调度协议都是稳定的,而如果对手指定路径,则不是这种情况。
{"title":"Source routing and scheduling in packet networks","authors":"M. Andrews, Antonio Fernández, Ashish Goel, Lisa Zhang","doi":"10.1109/SFCS.2001.959891","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959891","url":null,"abstract":"We study routing and scheduling in packet-switched networks. We assume an adversary that controls the injection time, source, and destination for each packet injected. A set of paths for these packets is admissible if no link in the network is overloaded. We present the first on-line routing algorithm that finds a set of admissible paths whenever this is feasible. Our algorithm calculates a path for each packet as soon as it is injected at its source using a simple shortest path computation. The length of a link reflects its current congestion. We also show how our algorithm can be implemented under today's Internet routing paradigms. When the paths are known (either given by the adversary or computed as above) our goal is to schedule the packets along the given paths so that the packets experience small end-to-end delays. The best previous delay bounds for deterministic and distributed scheduling protocols were exponential in the path length. In this paper we present the first deterministic and distributed scheduling protocol that guarantees a polynomial end-to-end delay for every packet. Finally, we discuss the effects of combining routing with scheduling. We first show that some, unstable scheduling protocols remain unstable no matter how the paths are chosen. However, the freedom to choose paths can make a difference. For example, we show that a ring with parallel links is stable for all greedy scheduling protocols if paths are chosen intelligently, whereas this is not the case if the adversary specifies the paths.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128039410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Lower bounds for polynomial calculus: non-binomial case 多项式微积分的下界:非二项情况
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959893
Michael Alekhnovich, A. Razborov
We generalize recent linear lower bounds for Polynomial Calculus based on binomial ideals. We produce a general hardness criterion (that we call immunity) which is satisfied by a random function and prove linear lower bounds on the degree of PC refutations for a wide class of tautologies based on immune functions. As some applications of our techniques, we introduce mod/sub p/ Tseitin tautologies in the Boolean case (e.g. in the presence of axioms x/sub i//sup 2/=x/sub i/), prove that they are hard for PC over fields with characteristic different from p, and generalize them to Flow tautologies which are based on the MAJORITY function and are proved to be hard over any field. We also show the /spl Omega/(n) lower bound for random k-CNFs over fields of characteristic 2.
基于二项式理想,推广了多项式微积分的线性下界。我们提出了一个由随机函数满足的一般硬度判据(我们称之为免疫),并证明了基于免疫函数的广义重言式的PC驳斥度的线性下界。作为我们技术的一些应用,我们在布尔情况下引入了mod/sub p/ tseittin重言式(例如在存在公理x/sub i//sup 2/=x/sub i/的情况下),证明了它们在与p特征不同的域上PC是困难的,并将其推广到基于MAJORITY函数的Flow重言式,证明了它们在任何域上都是困难的。我们还展示了特征为2的域上随机k- cnf的/spl ω /(n)下界。
{"title":"Lower bounds for polynomial calculus: non-binomial case","authors":"Michael Alekhnovich, A. Razborov","doi":"10.1109/SFCS.2001.959893","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959893","url":null,"abstract":"We generalize recent linear lower bounds for Polynomial Calculus based on binomial ideals. We produce a general hardness criterion (that we call immunity) which is satisfied by a random function and prove linear lower bounds on the degree of PC refutations for a wide class of tautologies based on immune functions. As some applications of our techniques, we introduce mod/sub p/ Tseitin tautologies in the Boolean case (e.g. in the presence of axioms x/sub i//sup 2/=x/sub i/), prove that they are hard for PC over fields with characteristic different from p, and generalize them to Flow tautologies which are based on the MAJORITY function and are proved to be hard over any field. We also show the /spl Omega/(n) lower bound for random k-CNFs over fields of characteristic 2.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128072113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 142
A replacement for Voronoi diagrams of near linear size 接近线性大小的Voronoi图的替代
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959884
Sariel Har-Peled
For a set P of n points in R/sup d/, we define a new type of space decomposition. The new diagram provides an /spl epsi/-approximation to the distance function associated with the Voronoi diagram of P, while being of near linear size, for d/spl ges/2. This contrasts with the standard Voronoi diagram that has /spl Omega/ (n/sup [d/2]/) complexity in the worst case.
对于R/sup /中n个点的集合P,我们定义了一种新的空间分解类型。新的图提供了与P的Voronoi图相关的距离函数的/spl epsi/-近似值,同时具有接近线性的大小,用于d/spl ges/2。这与在最坏情况下具有/spl Omega/ (n/sup [d/2]/)复杂性的标准Voronoi图形成对比。
{"title":"A replacement for Voronoi diagrams of near linear size","authors":"Sariel Har-Peled","doi":"10.1109/SFCS.2001.959884","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959884","url":null,"abstract":"For a set P of n points in R/sup d/, we define a new type of space decomposition. The new diagram provides an /spl epsi/-approximation to the distance function associated with the Voronoi diagram of P, while being of near linear size, for d/spl ges/2. This contrasts with the standard Voronoi diagram that has /spl Omega/ (n/sup [d/2]/) complexity in the worst case.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"70 9-10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114014048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 178
Sorting and selection with structured costs 排序和选择与结构化成本
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959916
Anupam Gupta, Amit Kumar
The study of the effect of priced information on basic algorithmic problems was initiated by M. Charikar et al. (2000). The authors continue the study of sorting and selection in the priced comparison model, i.e., when each comparison has an associated cost, and answer some of the open problems suggested by Charikar et al. If the comparison costs are allowed to be arbitrary, we show that one cannot get good approximation ratios. A different way to assign costs is based on the idea that one can distill out an intrinsic value for each item being compared, such that the cost of comparing two elements is some "well-behaved" or "structured" function of their values. We feel that most practical applications will have some structured cost property. The authors study the problems of sorting and selection (which includes finding the maximum and the median) in the structured cost model. We get a variety of approximation results for these problems, depending on the restrictions we put on the structured costs. We show that it is possible to get much improved results with the structured cost model than the case when we do not have any assumptions on comparison costs.
定价信息对基本算法问题影响的研究是由M. Charikar等人(2000)发起的。作者继续研究定价比较模型中的排序和选择,即当每次比较都有相关成本时,并回答Charikar等人提出的一些开放问题。如果允许比较代价是任意的,我们证明不能得到好的近似比。另一种分配成本的方法是基于这样一种理念,即人们可以从被比较的每个项目中提炼出一个内在价值,这样比较两个元素的成本就是它们价值的某种“表现良好的”或“结构化的”函数。我们认为,大多数实际应用将具有一些结构化的成本属性。作者研究了结构化成本模型中的排序和选择问题(包括寻找最大值和中值)。我们得到了这些问题的各种近似结果,这取决于我们对结构化成本的限制。我们表明,与没有对比较成本进行任何假设的情况相比,使用结构化成本模型有可能获得更好的结果。
{"title":"Sorting and selection with structured costs","authors":"Anupam Gupta, Amit Kumar","doi":"10.1109/SFCS.2001.959916","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959916","url":null,"abstract":"The study of the effect of priced information on basic algorithmic problems was initiated by M. Charikar et al. (2000). The authors continue the study of sorting and selection in the priced comparison model, i.e., when each comparison has an associated cost, and answer some of the open problems suggested by Charikar et al. If the comparison costs are allowed to be arbitrary, we show that one cannot get good approximation ratios. A different way to assign costs is based on the idea that one can distill out an intrinsic value for each item being compared, such that the cost of comparing two elements is some \"well-behaved\" or \"structured\" function of their values. We feel that most practical applications will have some structured cost property. The authors study the problems of sorting and selection (which includes finding the maximum and the median) in the structured cost model. We get a variety of approximation results for these problems, depending on the restrictions we put on the structured costs. We show that it is possible to get much improved results with the structured cost model than the case when we do not have any assumptions on comparison costs.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131878410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
期刊
Proceedings 2001 IEEE International Conference on Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1