首页 > 最新文献

Proceedings 2001 IEEE International Conference on Cluster Computing最新文献

英文 中文
Almost tight upper bounds for vertical decompositions in four dimensions 四维垂直分解的上界几乎很紧
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959880
V. Koltun
We show that the complexity of the vertical decomposition of an arrangement of n fixed-degree algebraic surfaces or surface patches in four dimensions is O(n/sup 4+/spl epsi//) for any /spl epsi/ > 0. This improves the best previously known upper bound for this problem by a near-linear factor, and settles a major problem in the theory of arrangements of surfaces, open since 1989. The new bound can be extended to higher dimensions, yielding the bound O (n/sup 2d-4+/spl epsi//), for any /spl epsi/ > 0, on the complexity of vertical decompositions in dimensions d /spl ges/ 4. We also describe the immediate algorithmic applications of these results, which include improved algorithms for point location, range searching, ray shooting, robot motion planning, and some geometric optimization problems.
我们证明了在四维空间中,对于任意/spl epsi/ > 0, n个定度代数曲面或面块排列的垂直分解复杂度为O(n/sup 4+/spl epsi//)。这通过一个近线性因子改进了这个问题的上界,并解决了自1989年以来开放的曲面排列理论中的一个主要问题。对于d /spl ges/ 4维垂直分解的复杂度,新界可以推广到更高的维度,得到对于任意/spl epsi/ > 0的界O (n/sup 2d-4+/spl epsi//)。我们还描述了这些结果的直接算法应用,包括点定位、范围搜索、射线拍摄、机器人运动规划和一些几何优化问题的改进算法。
{"title":"Almost tight upper bounds for vertical decompositions in four dimensions","authors":"V. Koltun","doi":"10.1109/SFCS.2001.959880","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959880","url":null,"abstract":"We show that the complexity of the vertical decomposition of an arrangement of n fixed-degree algebraic surfaces or surface patches in four dimensions is O(n/sup 4+/spl epsi//) for any /spl epsi/ > 0. This improves the best previously known upper bound for this problem by a near-linear factor, and settles a major problem in the theory of arrangements of surfaces, open since 1989. The new bound can be extended to higher dimensions, yielding the bound O (n/sup 2d-4+/spl epsi//), for any /spl epsi/ > 0, on the complexity of vertical decompositions in dimensions d /spl ges/ 4. We also describe the immediate algorithmic applications of these results, which include improved algorithms for point location, range searching, ray shooting, robot motion planning, and some geometric optimization problems.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114996051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Algorithmic applications of low-distortion geometric embeddings 低失真几何嵌入的算法应用
Pub Date : 2001-10-14 DOI: 10.1109/SFCS.2001.959878
P. Indyk
The author surveys algorithmic results obtained using low-distortion embeddings of metric spaces into (mostly) normed spaces. He shows that low-distortion embeddings provide a powerful and versatile toolkit for solving algorithmic problems. Their fundamental nature makes them applicable in a variety of diverse settings, while their relation to rich mathematical fields (e.g., functional analysis) ensures availability of tools for their construction.
作者调查了使用度量空间的低失真嵌入(大部分)赋范空间的算法结果。他表明,低失真嵌入为解决算法问题提供了一个强大而通用的工具包。它们的基本性质使它们适用于各种不同的设置,而它们与丰富的数学领域(例如,函数分析)的关系确保了构建它们的工具的可用性。
{"title":"Algorithmic applications of low-distortion geometric embeddings","authors":"P. Indyk","doi":"10.1109/SFCS.2001.959878","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959878","url":null,"abstract":"The author surveys algorithmic results obtained using low-distortion embeddings of metric spaces into (mostly) normed spaces. He shows that low-distortion embeddings provide a powerful and versatile toolkit for solving algorithmic problems. Their fundamental nature makes them applicable in a variety of diverse settings, while their relation to rich mathematical fields (e.g., functional analysis) ensures availability of tools for their construction.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 297
How powerful is adiabatic quantum computation? 绝热量子计算有多强大?
Pub Date : 2001-10-08 DOI: 10.1109/SFCS.2001.959902
W. V. Dam, M. Mosca, U. Vazirani
The authors analyze the computational power and limitations of the recently proposed 'quantum adiabatic evolution algorithm'. Adiabatic quantum computation is a novel paradigm for the design of quantum algorithms; it is truly quantum in the sense that it can be used to speed up searching by a quadratic factor over any classical algorithm. On the question of whether this new paradigm may be used to efficiently solve NP-complete problems on a quantum computer, we show that the usual query complexity arguments cannot be used to rule out a polynomial time solution. On the other hand, we argue that the adiabatic approach may be thought of as a kind of 'quantum local search'. We design a family of minimization problems that is hard for such local search heuristics, and establish an exponential lower bound for the adiabatic algorithm for these problems. This provides insights into the limitations of this approach. It remains an open question whether adiabatic quantum computation can establish an exponential speed-up over traditional computing or if there exists a classical algorithm that can simulate the quantum adiabatic process efficiently.
作者分析了最近提出的“量子绝热进化算法”的计算能力和局限性。绝热量子计算是一种新的量子算法设计范式;在某种意义上,它是真正的量子,它可以用来加速搜索,通过二次因子比任何经典算法。关于这种新范式是否可以用于有效地解决量子计算机上的np完全问题的问题,我们表明,通常的查询复杂性参数不能用于排除多项式时间解。另一方面,我们认为绝热方法可以被认为是一种“量子局部搜索”。我们设计了一类局部搜索启发式算法难以解决的最小化问题,并为这些问题的绝热算法建立了指数下界。这提供了对这种方法的局限性的见解。绝热量子计算是否能够比传统计算建立指数级的加速,或者是否存在一种经典算法可以有效地模拟量子绝热过程,仍然是一个悬而未决的问题。
{"title":"How powerful is adiabatic quantum computation?","authors":"W. V. Dam, M. Mosca, U. Vazirani","doi":"10.1109/SFCS.2001.959902","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959902","url":null,"abstract":"The authors analyze the computational power and limitations of the recently proposed 'quantum adiabatic evolution algorithm'. Adiabatic quantum computation is a novel paradigm for the design of quantum algorithms; it is truly quantum in the sense that it can be used to speed up searching by a quadratic factor over any classical algorithm. On the question of whether this new paradigm may be used to efficiently solve NP-complete problems on a quantum computer, we show that the usual query complexity arguments cannot be used to rule out a polynomial time solution. On the other hand, we argue that the adiabatic approach may be thought of as a kind of 'quantum local search'. We design a family of minimization problems that is hard for such local search heuristics, and establish an exponential lower bound for the adiabatic algorithm for these problems. This provides insights into the limitations of this approach. It remains an open question whether adiabatic quantum computation can establish an exponential speed-up over traditional computing or if there exists a classical algorithm that can simulate the quantum adiabatic process efficiently.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132165585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 290
Coding theory: tutorial & survey 编码理论:教程和调查
Pub Date : 2001-10-08 DOI: 10.1109/SFCS.2001.959879
M. Sudan
Coding theory has played a central role in the theoretical computer science. Computer scientists have long exploited notions, constructions, theorems and techniques of coding theory. More recently, theoretical computer science has also been contributing to the theory of error-correcting codes in particular in making progress on some fundamental algorithmic connections. Here we survey some of the central goals of coding theory and the progress made via algebraic methods. We stress that this is a very partial view of coding theory and a lot of promising combinatorial and probabilistic approaches are not covered by this survey.
编码理论在理论计算机科学中起着核心作用。计算机科学家长期以来一直在利用编码理论的概念、结构、定理和技术。最近,理论计算机科学也对纠错码理论做出了贡献,特别是在一些基本算法连接方面取得了进展。在这里,我们调查了一些编码理论的中心目标和通过代数方法取得的进展。我们强调,这是一个非常片面的观点,编码理论和许多有前途的组合和概率方法不包括在这个调查。
{"title":"Coding theory: tutorial & survey","authors":"M. Sudan","doi":"10.1109/SFCS.2001.959879","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959879","url":null,"abstract":"Coding theory has played a central role in the theoretical computer science. Computer scientists have long exploited notions, constructions, theorems and techniques of coding theory. More recently, theoretical computer science has also been contributing to the theory of error-correcting codes in particular in making progress on some fundamental algorithmic connections. Here we survey some of the central goals of coding theory and the progress made via algebraic methods. We stress that this is a very partial view of coding theory and a lot of promising combinatorial and probabilistic approaches are not covered by this survey.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
S/sub 2/ ZPP/sup NP/ S/sub 2/ ZPP/sup NP/
Pub Date : 2001-10-08 DOI: 10.1109/SFCS.2001.959938
Jin-Yi Cai
We show that the class Sp2 is a subclass of ZPP . The proof uses universal hashing, approximate counting and witness sampling. As a consequence, a collapse first noticed by Samik Sengupta that the assumption NP has small circuits collapses PH to Sp2 becomes the strongest version to date of the Karp-Lipton Theorem. We also discuss the problem of finding irrefutable proofs for Sp2 in ZPP .
证明了类Sp2是ZPP的一个子类。该证明使用了通用哈希、近似计数和见证抽样。因此,Samik Sengupta首先注意到的一个坍缩,即假设NP有小电路将PH坍缩到Sp2,成为迄今为止卡普-利普顿定理的最强版本。我们还讨论了在ZPP中寻找Sp2的无可辩驳证明的问题。
{"title":"S/sub 2/ ZPP/sup NP/","authors":"Jin-Yi Cai","doi":"10.1109/SFCS.2001.959938","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959938","url":null,"abstract":"We show that the class Sp2 is a subclass of ZPP . The proof uses universal hashing, approximate counting and witness sampling. As a consequence, a collapse first noticed by Samik Sengupta that the assumption NP has small circuits collapses PH to Sp2 becomes the strongest version to date of the Karp-Lipton Theorem. We also discuss the problem of finding irrefutable proofs for Sp2 in ZPP .","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128105385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Random evolution in massive graphs 海量图中的随机进化
Pub Date : 2001-10-08 DOI: 10.1109/SFCS.2001.959927
W. Aiello, F. Graham, Linyuan Lu
Many massive graphs (such as the WWW graph and Call graphs) share certain universal characteristics which can be described by the so-called "power law." In this paper, we, examine three important aspects of power law graphs, (1) the evolution of power law graphs, (2) the asymmetry of in-degrees and out-degrees, (3) the "scale invariance" of power law graphs. In particular, we give three increasingly general directed graph models and one general undirected graph model for generating power law graphs by adding at most one node and possibly one or more edges at a time. We show that for any given edge density and desired power laws for in-degrees and out-degrees, not necessarily the same, the resulting graph will almost surely have the desired edge density and the power laws for the in-degrees and out-degrees. Our most general directed and undirected models include nearly all known power law evolution models as special cases. Finally, we show that our evolution models generate "scale invariant" graphs. We describe a method for scaling the time in our evolution model such that the power law of the degree sequences remains invariant.
许多大型图(如WWW图和Call图)都具有某些普遍的特征,这些特征可以用所谓的“幂律”来描述。本文研究了幂律图的三个重要方面:(1)幂律图的演化,(2)幂律图的内外度不对称,(3)幂律图的“尺度不变性”。特别地,我们给出了三种越来越通用的有向图模型和一种通用的无向图模型,用于通过一次最多添加一个节点和可能的一个或多个边来生成幂律图。我们表明,对于任何给定的边密度和所需的幂律的进度数和出度数,不一定相同,所得到的图几乎肯定具有所需的边密度和进度数和出度数的幂律。我们最一般的有向和无向模型包括几乎所有已知的幂律演化模型作为特例。最后,我们展示了我们的进化模型生成“尺度不变”图。我们描述了一种在进化模型中缩放时间的方法,使度序列的幂律保持不变。
{"title":"Random evolution in massive graphs","authors":"W. Aiello, F. Graham, Linyuan Lu","doi":"10.1109/SFCS.2001.959927","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959927","url":null,"abstract":"Many massive graphs (such as the WWW graph and Call graphs) share certain universal characteristics which can be described by the so-called \"power law.\" In this paper, we, examine three important aspects of power law graphs, (1) the evolution of power law graphs, (2) the asymmetry of in-degrees and out-degrees, (3) the \"scale invariance\" of power law graphs. In particular, we give three increasingly general directed graph models and one general undirected graph model for generating power law graphs by adding at most one node and possibly one or more edges at a time. We show that for any given edge density and desired power laws for in-degrees and out-degrees, not necessarily the same, the resulting graph will almost surely have the desired edge density and the power laws for the in-degrees and out-degrees. Our most general directed and undirected models include nearly all known power law evolution models as special cases. Finally, we show that our evolution models generate \"scale invariant\" graphs. We describe a method for scaling the time in our evolution model such that the power law of the degree sequences remains invariant.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125624154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 278
Sequential and parallel algorithms for mixed packing and covering 混合包装和覆盖的顺序和并行算法
Pub Date : 2001-10-08 DOI: 10.1109/SFCS.2001.959930
N. Young
We describe sequential and parallel algorithms that approximately solve linear programs with no negative coefficients (aka mixed packing and covering problems). For explicitly given problems, our fastest sequential algorithm returns a solution satisfying all constraints within a 1/spl plusmn//spl epsi/ factor in O(mdlog(m)//spl epsi//sup 2/) time, where m is the number of constraints and d is the maximum number of constraints any variable appears in. Our parallel algorithm runs in time polylogarithmic in the input size times /spl epsi//sup -4/ and uses a total number of operations comparable to the sequential algorithm. The main contribution is that the algorithms solve mixed packing and covering problems (in contrast to pure packing or pure covering problems, which have only "/spl les/" or only "/spl ges/" inequalities, but not both) and run in time independent of the so-called width of the problem.
我们描述了近似解决无负系数线性规划(又名混合包装和覆盖问题)的顺序和并行算法。对于显式给定的问题,我们最快的顺序算法在O(mdlog(m)//spl epsi//sup 2/)时间内返回满足所有约束的1/spl plusmn//spl epsi/因子的解,其中m是约束的数量,d是任何变量出现的最大约束数量。我们的并行算法在输入大小的时间上以多对数方式运行/spl epsi//sup -4/,并且使用与顺序算法相当的操作总数。主要贡献是算法解决混合包装和覆盖问题(与纯包装或纯覆盖问题相反,它们只有“/spl les/”或“/spl ges/”不等式,但不是两者都有),并且在时间上独立于所谓的问题宽度运行。
{"title":"Sequential and parallel algorithms for mixed packing and covering","authors":"N. Young","doi":"10.1109/SFCS.2001.959930","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959930","url":null,"abstract":"We describe sequential and parallel algorithms that approximately solve linear programs with no negative coefficients (aka mixed packing and covering problems). For explicitly given problems, our fastest sequential algorithm returns a solution satisfying all constraints within a 1/spl plusmn//spl epsi/ factor in O(mdlog(m)//spl epsi//sup 2/) time, where m is the number of constraints and d is the maximum number of constraints any variable appears in. Our parallel algorithm runs in time polylogarithmic in the input size times /spl epsi//sup -4/ and uses a total number of operations comparable to the sequential algorithm. The main contribution is that the algorithms solve mixed packing and covering problems (in contrast to pure packing or pure covering problems, which have only \"/spl les/\" or only \"/spl ges/\" inequalities, but not both) and run in time independent of the so-called width of the problem.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 210
Web search via hub synthesis 通过枢纽合成的网络搜索
Pub Date : 2001-08-18 DOI: 10.1109/SFCS.2001.959926
D. Achlioptas, A. Fiat, Anna R. Karlin, Frank McSherry
We present a model for web search that captures in a unified manner three critical components of the problem: how the link structure of the web is generated, how the content of a web document is generated, and how a human searcher generates a query. The key to this unification lies in capturing the correlations between these components in terms of proximity in a shared latent semantic space. Given such a combined model, the correct answer to a search query is well defined, and thus it becomes possible to evaluate web search algorithms rigorously. We present a new web search algorithm, based on spectral techniques, and prove that it is guaranteed to produce an approximately correct answer in our model. The algorithm assumes no knowledge of the model, and is well-defined regardless of the model's accuracy.
我们提出了一个网络搜索模型,它以统一的方式捕获了问题的三个关键组成部分:如何生成网络的链接结构,如何生成网络文档的内容,以及人工搜索者如何生成查询。这种统一的关键在于根据共享潜在语义空间中的接近度捕获这些组件之间的相关性。有了这样一个组合模型,搜索查询的正确答案就得到了很好的定义,从而可以严格地评估网络搜索算法。我们提出了一种新的基于谱技术的网络搜索算法,并证明了它保证在我们的模型中产生近似正确的答案。该算法假定不了解模型,并且无论模型的准确性如何都定义良好。
{"title":"Web search via hub synthesis","authors":"D. Achlioptas, A. Fiat, Anna R. Karlin, Frank McSherry","doi":"10.1109/SFCS.2001.959926","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959926","url":null,"abstract":"We present a model for web search that captures in a unified manner three critical components of the problem: how the link structure of the web is generated, how the content of a web document is generated, and how a human searcher generates a query. The key to this unification lies in capturing the correlations between these components in terms of proximity in a shared latent semantic space. Given such a combined model, the correct answer to a search query is well defined, and thus it becomes possible to evaluate web search algorithms rigorously. We present a new web search algorithm, based on spectral techniques, and prove that it is guaranteed to produce an approximately correct answer in our model. The algorithm assumes no knowledge of the model, and is well-defined regardless of the model's accuracy.","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116537817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Lower bounds for quantum communication complexity 量子通信复杂度的下限
Pub Date : 2001-06-28 DOI: 10.1109/SFCS.2001.959903
H. Klauck
We prove new lower bounds for bounded error quantum communication complexity. Our methods are based on the Fourier transform of the considered functions. First we generalize a method for proving classical communication complexity lower bounds developed by R. Raz (1995) to the quantum case. Applying this method we give an exponential separation between bounded error quantum communication complexity and nondeterministic quantum communication complexity. We develop several other Fourier based lower bound methods, notably showing that /spl radic/(s~(f)/log n) n, for the average sensitivity s~(f) of a function f, yields a lower bound on the bounded error quantum communication complexity of f (x/spl and/y/spl oplus/yz), where x is a Boolean word held by Alice and y, z are Boolean words held by Bob. We then prove the first large lower bounds on the bounded error quantum communication complexity of functions, for which a polynomial quantum speedup is possible. For all the functions we investigate, only the previously applied general lower bound method based on discrepancy yields bounds that are O(log n).
我们证明了有界误差量子通信复杂度的新下界。我们的方法是基于所考虑的函数的傅里叶变换。首先,我们将R. Raz(1995)提出的证明经典通信复杂度下界的方法推广到量子情况。应用该方法给出了有界误差量子通信复杂度和不确定性量子通信复杂度之间的指数分离。我们开发了其他几种基于傅里叶的下界方法,特别是表明/spl径向/(s~(f)/log n) n,对于函数f的平均灵敏度s~(f),产生f (x/spl和/y/spl oplus/yz)的有界误差量子通信复杂度的下界,其中x是Alice持有的布尔词,y, z是Bob持有的布尔词。然后,我们证明了函数的有界误差量子通信复杂度的第一个大下界,对于这个下界,多项式量子加速是可能的。对于我们研究的所有函数,只有先前应用的基于差异的一般下界方法产生的边界是O(log n)。
{"title":"Lower bounds for quantum communication complexity","authors":"H. Klauck","doi":"10.1109/SFCS.2001.959903","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959903","url":null,"abstract":"We prove new lower bounds for bounded error quantum communication complexity. Our methods are based on the Fourier transform of the considered functions. First we generalize a method for proving classical communication complexity lower bounds developed by R. Raz (1995) to the quantum case. Applying this method we give an exponential separation between bounded error quantum communication complexity and nondeterministic quantum communication complexity. We develop several other Fourier based lower bound methods, notably showing that /spl radic/(s~(f)/log n) n, for the average sensitivity s~(f) of a function f, yields a lower bound on the bounded error quantum communication complexity of f (x/spl and/y/spl oplus/yz), where x is a Boolean word held by Alice and y, z are Boolean words held by Bob. We then prove the first large lower bounds on the bounded error quantum communication complexity of functions, for which a polynomial quantum speedup is possible. For all the functions we investigate, only the previously applied general lower bound method based on discrepancy yields bounds that are O(log n).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"414 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122809150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 131
The natural work-stealing algorithm is stable 自然偷功算法是稳定的
Pub Date : 2001-04-26 DOI: 10.1109/SFCS.2001.959892
P. Berenbrink, Tom Friedetzky, L. A. Goldberg
In this paper we analyse a very simple dynamic work-stealing algorithm. In the work-generation model, there are n generators which are arbitrarily distributed among a set of n processors. During each time-step, with probability /spl lambda/, each generator generates a unit-time task which it inserts into the queue of its host processor. After the new tasks are generated, each processor removes one task from its queue and services it. Clearly, the work-generation model allows the load to grow more and more imbalanced, so, even when /spl lambda/<1, the system load can be unbounded. The natural work-stealing algorithm that we analyse works as follows. During each time step, each empty processor sends a request to a randomly selected other processor. Any non-empty processor having received at least one such request in turn decides (again randomly) in favour of one of the requests. The number of tasks which are transferred from the non-empty processor to the empty one is determined by the so-called work-stealing function f. We analyse the long-term behaviour of the system as a function of /spl lambda/ and f. We show that the system is stable for any constant generation rate /spl lambda/<1 and for a wide class of functions f. We give a quantitative description of the functions f which lead to stable systems. Furthermore, we give upper bounds on the average system load (as a function of f and n).
本文分析了一种非常简单的动态偷功算法。在工作生成模型中,有n个生成器,它们随机分布在一组n个处理器中。在每个时间步长期间,每个生成器以概率/spl lambda/生成一个单位时间任务,并将其插入其主机处理器的队列中。生成新任务后,每个处理器从其队列中删除一个任务并为其提供服务。显然,工作生成模型允许负载变得越来越不平衡,因此,即使当/spl lambda/<1时,系统负载也可以无界。我们分析的自然偷功算法的工作原理如下。在每个时间步长期间,每个空处理器向随机选择的其他处理器发送请求。任何接收到至少一个此类请求的非空处理器依次决定(同样是随机的)支持其中一个请求。从非空处理器转移到空处理器的任务数量由所谓的工作窃取函数f决定。我们分析了系统的长期行为作为/spl lambda/和f的函数。我们表明,对于任何恒定的生成速率/spl lambda/<1和广泛的函数f,系统是稳定的。我们给出了导致稳定系统的函数f的定量描述。此外,我们给出了系统平均负荷的上界(作为f和n的函数)。
{"title":"The natural work-stealing algorithm is stable","authors":"P. Berenbrink, Tom Friedetzky, L. A. Goldberg","doi":"10.1109/SFCS.2001.959892","DOIUrl":"https://doi.org/10.1109/SFCS.2001.959892","url":null,"abstract":"In this paper we analyse a very simple dynamic work-stealing algorithm. In the work-generation model, there are n generators which are arbitrarily distributed among a set of n processors. During each time-step, with probability /spl lambda/, each generator generates a unit-time task which it inserts into the queue of its host processor. After the new tasks are generated, each processor removes one task from its queue and services it. Clearly, the work-generation model allows the load to grow more and more imbalanced, so, even when /spl lambda/<1, the system load can be unbounded. The natural work-stealing algorithm that we analyse works as follows. During each time step, each empty processor sends a request to a randomly selected other processor. Any non-empty processor having received at least one such request in turn decides (again randomly) in favour of one of the requests. The number of tasks which are transferred from the non-empty processor to the empty one is determined by the so-called work-stealing function f. We analyse the long-term behaviour of the system as a function of /spl lambda/ and f. We show that the system is stable for any constant generation rate /spl lambda/<1 and for a wide class of functions f. We give a quantitative description of the functions f which lead to stable systems. Furthermore, we give upper bounds on the average system load (as a function of f and n).","PeriodicalId":378126,"journal":{"name":"Proceedings 2001 IEEE International Conference on Cluster Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 93
期刊
Proceedings 2001 IEEE International Conference on Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1