首页 > 最新文献

40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)最新文献

英文 中文
A sublinear time approximation scheme for clustering in metric spaces 度量空间中聚类的次线性时间逼近格式
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814587
P. Indyk
The metric 2-clustering problem is defined as follows: given a metric (or weighted graph) (X,d), partition X into two sets S(1) and S(2) in order to minimize the value of /spl Sigma//sub i//spl Sigma//sub {u,v}/spl sub/S(i)/d(u,v). In this paper, we show an approximation scheme for this problem.
度量2-聚类问题定义如下:给定一个度量(或加权图)(X,d),将X划分为两个集合S(1)和S(2),以最小化/spl Sigma//sub {u,v}/spl Sigma//sub (i)/d(u,v)的值。在本文中,我们给出了这个问题的近似格式。
{"title":"A sublinear time approximation scheme for clustering in metric spaces","authors":"P. Indyk","doi":"10.1109/SFFCS.1999.814587","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814587","url":null,"abstract":"The metric 2-clustering problem is defined as follows: given a metric (or weighted graph) (X,d), partition X into two sets S(1) and S(2) in order to minimize the value of /spl Sigma//sub i//spl Sigma//sub {u,v}/spl sub/S(i)/d(u,v). In this paper, we show an approximation scheme for this problem.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125413698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
Long-lived adaptive collect with applications 应用程序的长期自适应收集
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814598
Y. Afek, Gideon Stupp, D. Touitou
A distributed algorithm is adaptive if the worst case step complexity of its operations is bounded by a function of the number of processes that are concurrently active during the operation (rather than a function of N, the total number of processes, which is usually much larger). We present long-lived and adaptive algorithms for collect in the read/write shared-memory model. Replacing the reads and writes in long-lived shared memory algorithms with our adaptive collect results in many cases in a corresponding long-lived algorithm which is adaptive. Examples of such applications, which are discussed are atomic-snapshots, and l-exclusion. Following the long-lived and adaptive collect we present a more pragmatic version of collect, called active set. This algorithm is slightly weaker than the collect but has several advantages. We employ this algorithm to transform algorithms, such as the Bakery algorithm, into their corresponding adaptive long-lived version, which is more efficient than the version that was obtained with the collect. Previously, long-lived and adaptive algorithms in this model were presented only for the renaming problem.
分布式算法是自适应的,如果其操作的最坏情况步复杂度由操作期间并发活动的进程数的函数限定(而不是进程总数N的函数,后者通常要大得多)。我们提出了在读/写共享内存模型中用于收集的长寿命和自适应算法。用我们的自适应收集取代长寿命共享内存算法中的读写,在许多情况下会产生相应的自适应长寿命算法。讨论的这类应用程序的示例是原子快照和l-exclusion。继长期和自适应收集之后,我们提出了一个更实用的收集版本,称为活动集。该算法略弱于collect,但有几个优点。我们使用该算法将算法(如Bakery算法)转换为相应的自适应长寿命版本,该版本比使用collect获得的版本更有效。以前,该模型中的长寿命和自适应算法仅针对重命名问题提出。
{"title":"Long-lived adaptive collect with applications","authors":"Y. Afek, Gideon Stupp, D. Touitou","doi":"10.1109/SFFCS.1999.814598","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814598","url":null,"abstract":"A distributed algorithm is adaptive if the worst case step complexity of its operations is bounded by a function of the number of processes that are concurrently active during the operation (rather than a function of N, the total number of processes, which is usually much larger). We present long-lived and adaptive algorithms for collect in the read/write shared-memory model. Replacing the reads and writes in long-lived shared memory algorithms with our adaptive collect results in many cases in a corresponding long-lived algorithm which is adaptive. Examples of such applications, which are discussed are atomic-snapshots, and l-exclusion. Following the long-lived and adaptive collect we present a more pragmatic version of collect, called active set. This algorithm is slightly weaker than the collect but has several advantages. We employ this algorithm to transform algorithms, such as the Bakery algorithm, into their corresponding adaptive long-lived version, which is more efficient than the version that was obtained with the collect. Previously, long-lived and adaptive algorithms in this model were presented only for the renaming problem.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Limits on the efficiency of one-way permutation-based hash functions 基于单向排列的哈希函数的效率限制
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814627
J. Kim, Daniel R. Simon, P. Tetali
Naor and Yung (1989) show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build a UOWHF which compresses by /spl epsiv/n bits, at the cost of /spl epsiv/n invocations of the one-way permutation. The show that this construction is not far from optimal, in the following sense, there exists an oracle relative to which there exists a one-way permutation with inversion probability 2/sup -p(n)/ (for any p(n)/spl isin//spl omega/(log n)), but any construction of an /spl epsiv/n-bit-compressing UOWHF. Requires /spl Omega/(/spl radic/n/p(n)) invocations of the one-way permutation, on average. (For example, there exists in this relativized world a one-way permutation with inversion probability n/sup -/spl omega/(1)/, but no UOWHF that involves it fewer than /spl Omega/(/spl radic/n/log n) times.) Thus any proof that a more efficient UOWHF can be derived from a one-way permutation is necessarily non-relativizing; in particular, no provable construction of a more efficient UOWHF can exist based solely on a "black box" one-way permutation. This result can be viewed as a partial justification for the practice of building efficient UOWHFs from stronger primitives (such as collision intractable hash functions), rather than from weaker primitives such as one-way permutations.
Naor和Yung(1989)表明,可以基于单向排列构造一个1位压缩的通用单向哈希函数(UOWHF)。可以迭代此构造以构建一个UOWHF,该UOWHF通过/spl epsiv/n位进行压缩,代价是单向置换调用/spl epsiv/n次。结果表明,该构造离最优不远,在以下意义上,存在一个相对于其存在反转概率为2/sup -p(n)/(对于任何p(n)/spl isin//spl ω /(log n))的单向排列的oracle,但任何构造/spl epsiv/n-bit压缩UOWHF。平均需要/spl Omega/(/spl radical /n/p(n))次单向排列调用。(例如,在这个相对化的世界中存在一个反转概率为n/sup -/spl ω /(1)/的单向置换,但不存在涉及它少于/spl ω /(/spl基/n/log n)次的UOWHF。)因此,任何证明可以从单向排列推导出更有效的uwhf的证明都必然是非相对化的;特别是,没有一个可证明的更有效的uwhf结构可以仅仅基于“黑盒”单向排列而存在。这个结果可以被看作是使用更强的原语(比如碰撞难以处理的散列函数)而不是使用更弱的原语(比如单向排列)来构建高效uowhf的部分理由。
{"title":"Limits on the efficiency of one-way permutation-based hash functions","authors":"J. Kim, Daniel R. Simon, P. Tetali","doi":"10.1109/SFFCS.1999.814627","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814627","url":null,"abstract":"Naor and Yung (1989) show that a one-bit-compressing universal one-way hash function (UOWHF) can be constructed based on a one-way permutation. This construction can be iterated to build a UOWHF which compresses by /spl epsiv/n bits, at the cost of /spl epsiv/n invocations of the one-way permutation. The show that this construction is not far from optimal, in the following sense, there exists an oracle relative to which there exists a one-way permutation with inversion probability 2/sup -p(n)/ (for any p(n)/spl isin//spl omega/(log n)), but any construction of an /spl epsiv/n-bit-compressing UOWHF. Requires /spl Omega/(/spl radic/n/p(n)) invocations of the one-way permutation, on average. (For example, there exists in this relativized world a one-way permutation with inversion probability n/sup -/spl omega/(1)/, but no UOWHF that involves it fewer than /spl Omega/(/spl radic/n/log n) times.) Thus any proof that a more efficient UOWHF can be derived from a one-way permutation is necessarily non-relativizing; in particular, no provable construction of a more efficient UOWHF can exist based solely on a \"black box\" one-way permutation. This result can be viewed as a partial justification for the practice of building efficient UOWHFs from stronger primitives (such as collision intractable hash functions), rather than from weaker primitives such as one-way permutations.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128640948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Primality and identity testing via Chinese remaindering 原始性和同一性通过中国余数测试
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814592
Manindra Agrawal, Somenath Biswas
Gives a simple and new primality testing algorithm by reducing primality testing for a number n to testing if a specific univariate identity over Z/sub n/ holds. We also give new randomized algorithms for testing if a multivariate polynomial, over a finite field or over rationals, is identically zero. The first of these algorithms also works over Z/sub n/ for any n. The running time of the algorithms is polynomial in the size of the arithmetic circuit representing the input polynomial and the error parameter. These algorithms use fewer random bits and work for a larger class of polynomials than all the previously known methods, e.g. the Schwartz-Zippel test (J.T. Schwartz, 1980; R.E. Zippel, 1979), the Chen-Kao (1997) test and the Lewin-Vadhan (1998) test. Our algorithms first transform the input polynomial to a univariate polynomial and then use Chinese remaindering over univariate polynomials to effectively test if it is zero.
将数n的素数检验简化为Z/下标n/上某单变量恒等式是否成立,给出了一种简单的素数检验算法。我们也给出了新的随机算法来检验一个多元多项式在有限域上或在有理数上是否同零。第一种算法也适用于任意n的Z/sub n/。算法的运行时间是表示输入多项式和误差参数的算术电路大小的多项式。这些算法使用更少的随机比特,并且比以前所有已知的方法都适用于更大的多项式类,例如Schwartz- zippel检验(J.T. Schwartz, 1980;R.E. Zippel, 1979), Chen-Kao(1997)测试和Lewin-Vadhan(1998)测试。我们的算法首先将输入多项式转换为单变量多项式,然后使用单变量多项式的中文剩余来有效地测试它是否为零。
{"title":"Primality and identity testing via Chinese remaindering","authors":"Manindra Agrawal, Somenath Biswas","doi":"10.1109/SFFCS.1999.814592","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814592","url":null,"abstract":"Gives a simple and new primality testing algorithm by reducing primality testing for a number n to testing if a specific univariate identity over Z/sub n/ holds. We also give new randomized algorithms for testing if a multivariate polynomial, over a finite field or over rationals, is identically zero. The first of these algorithms also works over Z/sub n/ for any n. The running time of the algorithms is polynomial in the size of the arithmetic circuit representing the input polynomial and the error parameter. These algorithms use fewer random bits and work for a larger class of polynomials than all the previously known methods, e.g. the Schwartz-Zippel test (J.T. Schwartz, 1980; R.E. Zippel, 1979), the Chen-Kao (1997) test and the Lewin-Vadhan (1998) test. Our algorithms first transform the input polynomial to a univariate polynomial and then use Chinese remaindering over univariate polynomials to effectively test if it is zero.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132504606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 144
Magic functions 神奇的功能
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814626
C. Dwork, M. Naor, Omer Reingold, L. Stockmeyer
In this paper we show that three apparently unrelated problems are in fact very closely related. We sketch these problems at a high level. The selective decommitment problem first arose in a slightly different form, selective decryption, in the context of Byzantine agreement, no later than 1985. Instead of seeing encryptions of plaintexts the adversary is given commitments to the plaintexts. This problem is poorly understood even in strong-receiver commitments, which leak no information about the plaintext values information-theoretically. The second problem is in complexity theory: what can be proved in (a possibly weakened form of) zero-knowledge in a 3-round argument (interactive proof in which the prover is polynomial-time bounded)? The Fiat-Shamir Methodology is cryptographic, and addresses a methodology suggested by Fiat and Shamir (1987) to construct a (non-interactive) signature scheme from any 3-round (not necessarily zero-knowledge) public-coin identification scheme.
在本文中,我们证明了三个表面上不相关的问题实际上是密切相关的。我们在高层次上概述这些问题。选择性解除承诺问题首先以一种稍微不同的形式出现,即在拜占庭协议背景下的选择性解密,不迟于1985年。攻击者不会看到明文的加密,而是得到对明文的承诺。即使在强接收方承诺中,也很难理解这个问题,理论上,强接收方承诺不会泄露关于明文值信息的信息。第二个问题是在复杂性理论中:在3轮论证(证明者是多项式时间有界的交互式证明)中,可以用零知识(可能是弱化形式)证明什么?Fiat-Shamir方法是密码学的,它解决了Fiat和Shamir(1987)提出的一种方法,该方法可以从任何3轮(不一定是零知识)公共货币识别方案中构建(非交互式)签名方案。
{"title":"Magic functions","authors":"C. Dwork, M. Naor, Omer Reingold, L. Stockmeyer","doi":"10.1109/SFFCS.1999.814626","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814626","url":null,"abstract":"In this paper we show that three apparently unrelated problems are in fact very closely related. We sketch these problems at a high level. The selective decommitment problem first arose in a slightly different form, selective decryption, in the context of Byzantine agreement, no later than 1985. Instead of seeing encryptions of plaintexts the adversary is given commitments to the plaintexts. This problem is poorly understood even in strong-receiver commitments, which leak no information about the plaintext values information-theoretically. The second problem is in complexity theory: what can be proved in (a possibly weakened form of) zero-knowledge in a 3-round argument (interactive proof in which the prover is polynomial-time bounded)? The Fiat-Shamir Methodology is cryptographic, and addresses a methodology suggested by Fiat and Shamir (1987) to construct a (non-interactive) signature scheme from any 3-round (not necessarily zero-knowledge) public-coin identification scheme.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 168
Finely-competitive paging Finely-competitive分页
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814617
Avrim Blum, C. Burch, A. Kalai
We construct an online algorithm for paging that achieves an O(r+log k) competitive ratio when compared to an offline strategy that is allowed the additional ability to "rent" pages at a cost of 1/r. In contrast, the competitive ratio of the Marking algorithm for this scenario is O(r log k). Our algorithm can be thought of in the standard setting as having a "fine-grained" competitive ratio, achieving an O(1) ratio when the request sequence consists of a small number of working sets, gracefully decaying to O(log k) as this number increases. Our result is a generalization of the result by Y. Bartal et al. (1997) that one can achieve an O(r+log n) ratio for the unfair n-state uniform-space Metrical Task System problem. That result was a key component of the polylog(n) competitive randomized algorithm given in that paper for the general Metrical Task System problem. One motivation of this work is that it may be a first step toward achieving a polylog(k) randomized competitive ratio for the much more difficult k-server problem.
我们构建了一个用于分页的在线算法,与允许以1/r的成本“租用”页面的离线策略相比,该算法实现了O(r+log k)竞争比。相比之下,在这种情况下,标记算法的竞争比是O(r log k)。在标准设置中,我们的算法可以被认为具有“细粒度”竞争比,当请求序列由少量工作集组成时实现O(1)比,随着这个数字的增加,优雅地衰减到O(log k)。我们的结果是Y. Bartal等人(1997)的结果的推广,该结果表明,对于不公平的n状态均匀空间度量任务系统问题,可以实现O(r+log n)比率。该结果是该论文中针对一般度量任务系统问题给出的多对数(n)竞争随机化算法的关键组成部分。这项工作的一个动机是,它可能是为更困难的k-server问题实现多元(k)随机竞争比的第一步。
{"title":"Finely-competitive paging","authors":"Avrim Blum, C. Burch, A. Kalai","doi":"10.1109/SFFCS.1999.814617","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814617","url":null,"abstract":"We construct an online algorithm for paging that achieves an O(r+log k) competitive ratio when compared to an offline strategy that is allowed the additional ability to \"rent\" pages at a cost of 1/r. In contrast, the competitive ratio of the Marking algorithm for this scenario is O(r log k). Our algorithm can be thought of in the standard setting as having a \"fine-grained\" competitive ratio, achieving an O(1) ratio when the request sequence consists of a small number of working sets, gracefully decaying to O(log k) as this number increases. Our result is a generalization of the result by Y. Bartal et al. (1997) that one can achieve an O(r+log n) ratio for the unfair n-state uniform-space Metrical Task System problem. That result was a key component of the polylog(n) competitive randomized algorithm given in that paper for the general Metrical Task System problem. One motivation of this work is that it may be a first step toward achieving a polylog(k) randomized competitive ratio for the much more difficult k-server problem.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
On the complexity of SAT 论SAT的复杂性
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814618
R. Lipton, Anastasios Viglas
We show that non-deterministic time NTIME(n) is not contained in deterministic time n/sup 2-/spl epsiv// and polylogarithmic space, for any /spl epsiv/>0. This implies that (infinitely often), satisfiability cannot be solved in time O(n/sup 2-/spl epsiv//) and polylogarithmic space. A similar result is presented for uniform circuits; a log-space uniform circuit of polylogarithmic width computing satisfiability requires infinitely often almost quadratic size.
我们证明了非确定性时间NTIME(n)不包含在确定性时间n/sup 2-/spl epsiv//和多对数空间中,对于任何/spl epsiv/>0。这意味着(无限经常),可满足性不能在时间O(n/sup 2-/spl epsiv//)和多对数空间中求解。对于均匀电路也有类似的结果;一个具有多对数宽度计算满足性的对数空间均匀电路需要无限常接近二次的大小。
{"title":"On the complexity of SAT","authors":"R. Lipton, Anastasios Viglas","doi":"10.1109/SFFCS.1999.814618","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814618","url":null,"abstract":"We show that non-deterministic time NTIME(n) is not contained in deterministic time n/sup 2-/spl epsiv// and polylogarithmic space, for any /spl epsiv/>0. This implies that (infinitely often), satisfiability cannot be solved in time O(n/sup 2-/spl epsiv//) and polylogarithmic space. A similar result is presented for uniform circuits; a log-space uniform circuit of polylogarithmic width computing satisfiability requires infinitely often almost quadratic size.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128761849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Algorithmic aspects of protein structure similarity 蛋白质结构相似性的算法方面
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814624
Deborah Goldman, S. Istrail, C. Papadimitriou
We show that calculating contact map overlap (a measure of similarity of protein structures) is NP-hard, but can be solved in polynomial time for several interesting and relevant special cases. We identify an important special case of this problem corresponding to self-avoiding walks, and prove a decomposition theorem and a corollary approximation result for this special case. These are the first approximation algorithms with guaranteed error bounds, and NP-completeness results in the literature in the area of protein structure alignment/fold recognition for measures of structure similarity of practical interest.
我们表明,计算接触图重叠(蛋白质结构相似性的度量)是np困难的,但可以在多项式时间内解决几个有趣的和相关的特殊情况。我们确定了该问题的一个重要特例,即自避行走,并证明了该特例的一个分解定理和一个推论近似结果。这些是具有保证误差范围的第一个近似算法,并且在蛋白质结构比对/折叠识别领域的文献中,np完备性结果用于实际感兴趣的结构相似性度量。
{"title":"Algorithmic aspects of protein structure similarity","authors":"Deborah Goldman, S. Istrail, C. Papadimitriou","doi":"10.1109/SFFCS.1999.814624","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814624","url":null,"abstract":"We show that calculating contact map overlap (a measure of similarity of protein structures) is NP-hard, but can be solved in polynomial time for several interesting and relevant special cases. We identify an important special case of this problem corresponding to self-avoiding walks, and prove a decomposition theorem and a corollary approximation result for this special case. These are the first approximation algorithms with guaranteed error bounds, and NP-completeness results in the literature in the area of protein structure alignment/fold recognition for measures of structure similarity of practical interest.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132788480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 177
Approximation algorithms for classification problems with pairwise relationships: metric labeling and Markov random fields 两两关系分类问题的近似算法:度量标记和马尔可夫随机场
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814572
J. Kleinberg, É. Tardos
In a traditional classification problem, we wish to assign one of k labels (or classes) to each of n objects, in a way that is consistent with some observed data that we have about the problem. An active line of research in this area is concerned with classification when one has information about pairwise relationships among the objects to be classified; this issue is one of the principal motivations for the framework of Markov random fields, and it arises in areas such as image processing, biometry: and document analysis. In its most basic form, this style of analysis seeks a classification that optimizes a combinatorial function consisting of assignment costs-based on the individual choice of label we make for each object-and separation costs-based on the pair of choices we make for two "related" objects. We formulate a general classification problem of this type, the metric labeling problem; we show that it contains as special cases a number of standard classification frameworks, including several arising from the theory of Markov random fields. From the perspective of combinatorial optimization, our problem can be viewed as a substantial generalization of the multiway cut problem, and equivalent to a type of uncapacitated quadratic assignment problem. We provide the first non-trivial polynomial-time approximation algorithms for a general family of classification problems of this type. Our main result is an O(log k log log k)-approximation algorithm for the metric labeling problem, with respect to an arbitrary metric on a set of k labels, and an arbitrary weighted graph of relationships on a set of objects. For the special case in which the labels are endowed with the uniform metric-all distances are the same-our methods provide a 2-approximation.
在传统的分类问题中,我们希望为n个对象中的每个对象分配k个标签(或类)中的一个,其方式与我们对问题的一些观察数据一致。这一领域的一个活跃的研究方向是当一个人有关于被分类对象之间的成对关系的信息时进行分类;这个问题是马尔可夫随机场框架的主要动机之一,它出现在图像处理、生物计量和文档分析等领域。在其最基本的形式中,这种风格的分析寻求一种优化组合函数的分类,该组合函数由分配成本(基于我们为每个对象所做的单独标签选择)和分离成本(基于我们为两个“相关”对象所做的成对选择)组成。我们提出了这种类型的一般分类问题,度量标记问题;我们证明了它包含作为特例的一些标准分类框架,其中包括一些由马尔可夫随机场理论产生的分类框架。从组合优化的角度来看,我们的问题可以看作是多路切割问题的一个实质推广,相当于一类无能力二次分配问题。我们提供了第一个非平凡的多项式时间逼近算法,用于这类分类问题的一般族。我们的主要结果是一个O(log k log log k)近似算法,用于度量标记问题,关于k个标记集上的任意度量,以及一组对象上的任意加权关系图。对于标签被赋予一致度量的特殊情况——所有距离都相同——我们的方法提供了一个2近似。
{"title":"Approximation algorithms for classification problems with pairwise relationships: metric labeling and Markov random fields","authors":"J. Kleinberg, É. Tardos","doi":"10.1109/SFFCS.1999.814572","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814572","url":null,"abstract":"In a traditional classification problem, we wish to assign one of k labels (or classes) to each of n objects, in a way that is consistent with some observed data that we have about the problem. An active line of research in this area is concerned with classification when one has information about pairwise relationships among the objects to be classified; this issue is one of the principal motivations for the framework of Markov random fields, and it arises in areas such as image processing, biometry: and document analysis. In its most basic form, this style of analysis seeks a classification that optimizes a combinatorial function consisting of assignment costs-based on the individual choice of label we make for each object-and separation costs-based on the pair of choices we make for two \"related\" objects. We formulate a general classification problem of this type, the metric labeling problem; we show that it contains as special cases a number of standard classification frameworks, including several arising from the theory of Markov random fields. From the perspective of combinatorial optimization, our problem can be viewed as a substantial generalization of the multiway cut problem, and equivalent to a type of uncapacitated quadratic assignment problem. We provide the first non-trivial polynomial-time approximation algorithms for a general family of classification problems of this type. Our main result is an O(log k log log k)-approximation algorithm for the metric labeling problem, with respect to an arbitrary metric on a set of k labels, and an arbitrary weighted graph of relationships on a set of objects. For the special case in which the labels are endowed with the uniform metric-all distances are the same-our methods provide a 2-approximation.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132677418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 550
Improved combinatorial algorithms for the facility location and k-median problems 设施定位和k-中值问题的改进组合算法
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814609
M. Charikar, S. Guha
We present improved combinatorial approximation algorithms for the uncapacitated facility location and k-median problems. Two central ideas in most of our results are cost scaling and greedy improvement. We present a simple greedy local search algorithm which achieves an approximation ratio of 2.414+/spl epsiv/ in O/spl tilde/(n/sup 2///spl epsiv/) time. This also yields a bicriteria approximation tradeoff of (1+/spl gamma/, 1+2//spl gamma/) for facility cost versus service cost which is better than previously known tradeoffs and close to the best possible. Combining greedy improvement and cost scaling with a recent primal dual algorithm for facility location due to K. Jain and V. Vazirani (1999), we get an approximation ratio of 1.853 in O/spl tilde/(n/sup 3/) time. This is already very close to the approximation guarantee of the best known algorithm which is LP-based. Further combined with the best known LP-based algorithm for facility location, we get a very slight improvement in the approximation factor for facility location, achieving 1.728. We present improved approximation algorithms for capacitated facility location and a variant. We also present a 4-approximation for the k-median problem, using similar ideas, building on the 6-approximation of Jain and Vazirani. The algorithm runs in O/spl tilde/(n/sup 3/) time.
提出了一种改进的组合逼近算法,用于无能力设施定位和k-中值问题。我们大多数研究结果的两个中心思想是成本缩放和贪婪改进。我们提出了一种简单的贪婪局部搜索算法,在O/spl波浪/(n/sup 2///spl epsiv/)时间内实现了2.414+/spl epsiv/的逼近比。这也产生了设施成本与服务成本的双标准近似权衡(1+/spl gamma/, 1+2//spl gamma/),这比以前已知的权衡更好,接近最佳可能。将贪婪改进和成本缩放与最近由K. Jain和V. Vazirani(1999)提出的设施位置的原始对偶算法相结合,我们在O/spl波浪/(n/sup /)时间内得到了1.853的近似值。这已经非常接近于最著名的基于lp的算法的近似保证。进一步结合最著名的基于lp的设施位置算法,我们在设施位置的近似因子上得到了非常轻微的改进,达到了1.728。我们提出了改进的近似算法的容量设施的位置和一个变体。在Jain和Vazirani的6近似的基础上,我们还提出了k中值问题的4近似,使用类似的思想。算法运行时间为O/spl /(n/sup /)。
{"title":"Improved combinatorial algorithms for the facility location and k-median problems","authors":"M. Charikar, S. Guha","doi":"10.1109/SFFCS.1999.814609","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814609","url":null,"abstract":"We present improved combinatorial approximation algorithms for the uncapacitated facility location and k-median problems. Two central ideas in most of our results are cost scaling and greedy improvement. We present a simple greedy local search algorithm which achieves an approximation ratio of 2.414+/spl epsiv/ in O/spl tilde/(n/sup 2///spl epsiv/) time. This also yields a bicriteria approximation tradeoff of (1+/spl gamma/, 1+2//spl gamma/) for facility cost versus service cost which is better than previously known tradeoffs and close to the best possible. Combining greedy improvement and cost scaling with a recent primal dual algorithm for facility location due to K. Jain and V. Vazirani (1999), we get an approximation ratio of 1.853 in O/spl tilde/(n/sup 3/) time. This is already very close to the approximation guarantee of the best known algorithm which is LP-based. Further combined with the best known LP-based algorithm for facility location, we get a very slight improvement in the approximation factor for facility location, achieving 1.728. We present improved approximation algorithms for capacitated facility location and a variant. We also present a 4-approximation for the k-median problem, using similar ideas, building on the 6-approximation of Jain and Vazirani. The algorithm runs in O/spl tilde/(n/sup 3/) time.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131691781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 457
期刊
40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1