首页 > 最新文献

40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)最新文献

英文 中文
Learning mixtures of Gaussians 学习高斯函数的混合
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814639
S. Dasgupta
Mixtures of Gaussians are among the most fundamental and widely used statistical models. Current techniques for learning such mixtures from data are local search heuristics with weak performance guarantees. We present the first provably correct algorithm for learning a mixture of Gaussians. This algorithm is very simple and returns the true centers of the Gaussians to within the precision specified by the user with high probability. It runs in time only linear in the dimension of the data and polynomial in the number of Gaussians.
混合高斯是最基本和最广泛使用的统计模型之一。目前从数据中学习这种混合物的技术是性能保证较弱的局部搜索启发式。我们提出了第一个可证明正确的高斯混合学习算法。该算法非常简单,并以高概率在用户指定的精度范围内返回高斯分布的真中心。它在时间上只在数据维数上呈线性,在高斯数上呈多项式。
{"title":"Learning mixtures of Gaussians","authors":"S. Dasgupta","doi":"10.1109/SFFCS.1999.814639","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814639","url":null,"abstract":"Mixtures of Gaussians are among the most fundamental and widely used statistical models. Current techniques for learning such mixtures from data are local search heuristics with weak performance guarantees. We present the first provably correct algorithm for learning a mixture of Gaussians. This algorithm is very simple and returns the true centers of the Gaussians to within the precision specified by the user with high probability. It runs in time only linear in the dimension of the data and polynomial in the number of Gaussians.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131717397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 708
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security 非延展性非交互零知识和自适应选择密文安全
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814628
A. Sahai
We introduce the notion of non-malleable non-interactive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-malleability properties. We then show that the elegant encryption scheme of Naor and Yung (1990) can be made secure against the strongest form of chosen-ciphertext attack by using a non-malleable NIZK proof instead of a standard NIZK proof. Our encryption scheme is simple to describe and works in the standard cryptographic model under, general assumptions. The encryption scheme can be realized assuming the existence of trapdoor permutations.
我们引入了不可延展性非交互零知识证明系统的概念。我们展示了如何将任何普通的NIZK证明系统转化为具有强非延展性的证明系统。然后,我们证明了Naor和Yung(1990)的优雅加密方案可以通过使用不可延展性的NIZK证明而不是标准的NIZK证明来防止最强形式的选择密文攻击。我们的加密方案易于描述,并在一般假设下的标准加密模型中工作。该加密方案可以在存在活板门排列的前提下实现。
{"title":"Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security","authors":"A. Sahai","doi":"10.1109/SFFCS.1999.814628","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814628","url":null,"abstract":"We introduce the notion of non-malleable non-interactive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary NIZK proof system into one that has strong non-malleability properties. We then show that the elegant encryption scheme of Naor and Yung (1990) can be made secure against the strongest form of chosen-ciphertext attack by using a non-malleable NIZK proof instead of a standard NIZK proof. Our encryption scheme is simple to describe and works in the standard cryptographic model under, general assumptions. The encryption scheme can be realized assuming the existence of trapdoor permutations.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132455666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 573
Hardness of approximating the minimum distance of a linear code 近似线性代码最小距离的硬度
Pub Date : 1999-10-17 DOI: 10.1109/SFFCS.1999.814620
I. Dumer, Daniele Micciancio, M. Sudan
We show that the minimum distance of a linear code (or equivalently, the weight of the lightest codeword) is not approximable to within any constant factor in random polynomial time (RP), unless NP equals RP. Under the stronger assumption that NP is not contained in RQP (random quasi-polynomial time), we show that the minimum distance is not approximable to within the factor 2/sup log(1-/spl epsiv/)n/, for any /spl epsiv/>0, where n denotes the block length of the code. Our results hold for codes over every finite field, including the special case of binary codes. In the process we show that the nearest codeword problem is hard to solve even under the promise that the number of errors is (a constant factor) smaller than the distance of the code. This is a particularly meaningful version of the nearest codeword problem. Our results strengthen (though using stronger assumptions) a previous result of A. Vardy (1997) who showed that the minimum distance is NP-hard to compute exactly. Our results are obtained by adapting proofs of analogous results for integer lattices due to M. Ajtai (1998) and D. Micciancio (1998). A critical component in the adaptation is our use of linear codes that perform better than random (linear) codes.
我们证明了线性码的最小距离(或等价地,最轻码字的权重)在随机多项式时间(RP)内不能近似于任何常数因子,除非NP等于RP。在RQP(随机拟多项式时间)中不包含NP的更强假设下,我们证明了对于任意/spl epsiv/>0,最小距离不接近于因子2/sup log(1-/spl epsiv/)n/,其中n表示代码的块长度。我们的结果适用于所有有限域上的码,包括二进制码的特殊情况。在此过程中,我们证明了即使在承诺错误数(常数因子)小于代码距离的情况下,最接近码字问题也很难解决。这是最近码字问题的一个特别有意义的版本。我们的结果加强了a . Vardy(1997)之前的一个结果(尽管使用了更强的假设),他表明最小距离是np难以精确计算的。我们的结果是通过改编M. Ajtai(1998)和D. Micciancio(1998)对整数格的类似结果的证明而得到的。适应性的一个关键组成部分是我们使用比随机(线性)代码性能更好的线性代码。
{"title":"Hardness of approximating the minimum distance of a linear code","authors":"I. Dumer, Daniele Micciancio, M. Sudan","doi":"10.1109/SFFCS.1999.814620","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814620","url":null,"abstract":"We show that the minimum distance of a linear code (or equivalently, the weight of the lightest codeword) is not approximable to within any constant factor in random polynomial time (RP), unless NP equals RP. Under the stronger assumption that NP is not contained in RQP (random quasi-polynomial time), we show that the minimum distance is not approximable to within the factor 2/sup log(1-/spl epsiv/)n/, for any /spl epsiv/>0, where n denotes the block length of the code. Our results hold for codes over every finite field, including the special case of binary codes. In the process we show that the nearest codeword problem is hard to solve even under the promise that the number of errors is (a constant factor) smaller than the distance of the code. This is a particularly meaningful version of the nearest codeword problem. Our results strengthen (though using stronger assumptions) a previous result of A. Vardy (1997) who showed that the minimum distance is NP-hard to compute exactly. Our results are obtained by adapting proofs of analogous results for integer lattices due to M. Ajtai (1998) and D. Micciancio (1998). A critical component in the adaptation is our use of linear codes that perform better than random (linear) codes.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 150
Hardness of approximating /spl Sigma//sub 2//sup p/ minimization problems 硬度近似/spl σ //sub //sup //最小化问题
Pub Date : 1999-10-01 DOI: 10.1109/SFFCS.1999.814619
C. Umans
We show that a number of natural optimization problems in the second level of the Polynomial Hierarchy are /spl Sigma//sub 2//sup p/-hard to approximate to within n/sup /spl epsiv// factors, for specific /spl epsiv/>0. The main technical tool is the use of explicit dispersers to achieve strong, direct inapproximability results. The problems we consider include Succinct Set Cover, Minimum Equivalent DNF, and other problems relating to DNF minimization. Under a slightly stronger complexity assumption, our method gives optimal n/sup 1-/spl epsiv// inapproximability results for some of these problems. We also prove inapproximability of a variant of an NP optimization problem, Monotone Minimum Satisfying Assignment, to within an n/sup /spl epsiv// factor using the same technique.
我们证明了多项式层次第二层的一些自然优化问题是/spl Sigma// sub2 //sup p/-难以近似到n/sup /spl epsiv//因子内,对于特定的/spl epsiv/>0。主要的技术工具是使用显式分散剂来实现强的、直接的非近似结果。我们考虑的问题包括简洁集覆盖,最小等效DNF,以及与DNF最小化相关的其他问题。在稍强的复杂性假设下,我们的方法对其中一些问题给出了最优的n/sup -/spl epsiv// inapproximation结果。我们还证明了NP优化问题的一个变体,单调最小满足分配,在n/sup /spl epsiv//因子内的不逼近性。
{"title":"Hardness of approximating /spl Sigma//sub 2//sup p/ minimization problems","authors":"C. Umans","doi":"10.1109/SFFCS.1999.814619","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814619","url":null,"abstract":"We show that a number of natural optimization problems in the second level of the Polynomial Hierarchy are /spl Sigma//sub 2//sup p/-hard to approximate to within n/sup /spl epsiv// factors, for specific /spl epsiv/>0. The main technical tool is the use of explicit dispersers to achieve strong, direct inapproximability results. The problems we consider include Succinct Set Cover, Minimum Equivalent DNF, and other problems relating to DNF minimization. Under a slightly stronger complexity assumption, our method gives optimal n/sup 1-/spl epsiv// inapproximability results for some of these problems. We also prove inapproximability of a variant of an NP optimization problem, Monotone Minimum Satisfying Assignment, to within an n/sup /spl epsiv// factor using the same technique.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128031785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Setting parameters by example 举例设置参数
Pub Date : 1999-07-02 DOI: 10.1137/S0097539700370084
D. Eppstein
We introduce a class of "inverse parametric optimization" problems, in which one is given both a parametric optimization problem and a desired optimal solution; the task is to determine parameter values that lead to the given solution. We describe algorithms for solving such problems for minimum spanning trees, shortest paths, and other "optimal subgraph" problems, and discuss applications in multicast routing, vehicle path planning, resource allocation, and board game programming.
我们引入了一类“逆参数优化”问题,在这类问题中,既有一个参数优化问题又有一个期望最优解;任务是确定导致给定解决方案的参数值。我们描述了解决最小生成树、最短路径和其他“最优子图”问题的算法,并讨论了在多播路由、车辆路径规划、资源分配和棋盘游戏编程中的应用。
{"title":"Setting parameters by example","authors":"D. Eppstein","doi":"10.1137/S0097539700370084","DOIUrl":"https://doi.org/10.1137/S0097539700370084","url":null,"abstract":"We introduce a class of \"inverse parametric optimization\" problems, in which one is given both a parametric optimization problem and a desired optimal solution; the task is to determine parameter values that lead to the given solution. We describe algorithms for solving such problems for minimum spanning trees, shortest paths, and other \"optimal subgraph\" problems, and discuss applications in multicast routing, vehicle path planning, resource allocation, and board game programming.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133567964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Optimal lower bounds for quantum automata and random access codes 量子自动机和随机存取码的最优下界
Pub Date : 1999-04-27 DOI: 10.1109/SFFCS.1999.814608
A. Nayak
Consider the finite regular language L/sub n/={w0|w/spl isin/{0,1}*,|w|/spl les/n}. A. Ambainis et al. (1999) showed that while this language is accepted by a deterministic finite automaton of size O(n), any one-way quantum finite automaton (QFA) for it has size 2/sup /spl Omega/(n/logn)/. This was based on the fact that the evolution of a QFA is required to be reversible. When arbitrary intermediate measurements are allowed, this intuition breaks down. Nonetheless, we show a 2/sup /spl Omega/(n)/ lower bound for such QFA for L/sub n/, thus also improving the previous bound. The improved bound is obtained from simple entropy arguments based on A.S. Holevo's (1973) theorem. This method also allows us to obtain an asymptotically optimal (1-H(p))n bound for the dense quantum codes (random access codes) introduced by A. Ambainis et al. We then turn to Holevo's theorem, and show that in typical situations, it may be replaced by a tighter and more transparent in-probability bound.
考虑有限正则语言L/sub n/={w0|w/spl isin/{0,1}*,|w|/spl les/n}。a . Ambainis等人(1999)表明,虽然这种语言被大小为O(n)的确定性有限自动机所接受,但任何单向量子有限自动机(QFA)的大小为2/sup /spl Omega/(n/logn)/。这是基于这样一个事实,即QFA的演变需要是可逆的。当允许任意的中间测量时,这种直觉就失效了。尽管如此,我们为L/sub / n/的QFA给出了2/sup /spl Omega/(n)/下界,从而也改进了之前的下界。改进界是根据Holevo(1973)定理从简单熵参数得到的。该方法还允许我们获得A. Ambainis等人引入的密集量子码(随机接入码)的渐近最优(1-H(p))n界。然后我们转向Holevo定理,并表明在典型情况下,它可以被更紧密和更透明的概率内界所取代。
{"title":"Optimal lower bounds for quantum automata and random access codes","authors":"A. Nayak","doi":"10.1109/SFFCS.1999.814608","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814608","url":null,"abstract":"Consider the finite regular language L/sub n/={w0|w/spl isin/{0,1}*,|w|/spl les/n}. A. Ambainis et al. (1999) showed that while this language is accepted by a deterministic finite automaton of size O(n), any one-way quantum finite automaton (QFA) for it has size 2/sup /spl Omega/(n/logn)/. This was based on the fact that the evolution of a QFA is required to be reversible. When arbitrary intermediate measurements are allowed, this intuition breaks down. Nonetheless, we show a 2/sup /spl Omega/(n)/ lower bound for such QFA for L/sub n/, thus also improving the previous bound. The improved bound is obtained from simple entropy arguments based on A.S. Holevo's (1973) theorem. This method also allows us to obtain an asymptotically optimal (1-H(p))n bound for the dense quantum codes (random access codes) introduced by A. Ambainis et al. We then turn to Holevo's theorem, and show that in typical situations, it may be replaced by a tighter and more transparent in-probability bound.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 294
Bounds for small-error and zero-error quantum algorithms 小误差和零误差量子算法的边界
Pub Date : 1999-04-26 DOI: 10.1109/SFFCS.1999.814607
H. Buhrman, R. Cleve, R. D. Wolf, Christof Zalka
We present a number of results related to quantum algorithms with small error probability and quantum algorithms that are zero-error. First, we give a tight analysis of the trade-offs between the number of queries of quantum search algorithms, their error probability, the size of the search space, and the number of solutions in this space. Using this, we deduce new lower and upper bounds for quantum versions of amplification problems. Next, we establish nearly optimal quantum-classical separations for the query complexity of monotone functions in the zero-error model (where our quantum zero-error model is defined so as to be robust when the quantum gates are noisy). Also, we present a communication complexity problem related to a total function for which there is a quantum-classical communication complexity gap in the zero-error model. Finally, we prove separations for monotone graph properties in the zero-error and other error models which imply that the evasiveness conjecture for such properties does not hold for quantum computers.
我们提出了一些与小误差概率量子算法和零误差量子算法相关的结果。首先,我们对量子搜索算法的查询次数、错误概率、搜索空间的大小以及该空间中的解的数量之间的权衡进行了严格的分析。利用这一点,我们推导出了量子版本放大问题的新的下界和上界。接下来,我们为零误差模型中单调函数的查询复杂度建立了近乎最优的量子经典分离(我们的量子零误差模型被定义为在量子门有噪声时具有鲁棒性)。此外,我们还提出了一个与零误差模型中存在量子经典通信复杂度差距的总函数相关的通信复杂性问题。最后,我们证明了零误差和其他误差模型中单调图性质的分离,这意味着这些性质的逃避性猜想在量子计算机中不成立。
{"title":"Bounds for small-error and zero-error quantum algorithms","authors":"H. Buhrman, R. Cleve, R. D. Wolf, Christof Zalka","doi":"10.1109/SFFCS.1999.814607","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814607","url":null,"abstract":"We present a number of results related to quantum algorithms with small error probability and quantum algorithms that are zero-error. First, we give a tight analysis of the trade-offs between the number of queries of quantum search algorithms, their error probability, the size of the search space, and the number of solutions in this space. Using this, we deduce new lower and upper bounds for quantum versions of amplification problems. Next, we establish nearly optimal quantum-classical separations for the query complexity of monotone functions in the zero-error model (where our quantum zero-error model is defined so as to be robust when the quantum gates are noisy). Also, we present a communication complexity problem related to a total function for which there is a quantum-classical communication complexity gap in the zero-error model. Finally, we prove separations for monotone graph properties in the zero-error and other error models which imply that the evasiveness conjecture for such properties does not hold for quantum computers.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114970708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 153
A better lower bound for quantum algorithms searching an ordered list 搜索有序列表的量子算法的更好下界
Pub Date : 1999-02-13 DOI: 10.1109/SFFCS.1999.814606
A. Ambainis
We show that any quantum algorithm searching an ordered list of n elements needs to examine at least (log,n)/12-O(1) of them. Classically, log/sub 2/ n queries are both necessary and sufficient. This shows that quantum algorithms can achieve only a constant speedup for this problem.
我们证明了任何量子算法搜索n个元素的有序列表都需要检查至少(log,n)/12-O(1)个元素。通常,log/sub 2/ n查询是必要且充分的。这表明,量子算法只能实现一个恒定的加速问题。
{"title":"A better lower bound for quantum algorithms searching an ordered list","authors":"A. Ambainis","doi":"10.1109/SFFCS.1999.814606","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814606","url":null,"abstract":"We show that any quantum algorithm searching an ordered list of n elements needs to examine at least (log,n)/12-O(1) of them. Classically, log/sub 2/ n queries are both necessary and sufficient. This shows that quantum algorithms can achieve only a constant speedup for this problem.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1999-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128121947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
An approximate L/sup 1/-difference algorithm for massive data streams 海量数据流的近似L/sup 1/差分算法
Pub Date : 1900-01-01 DOI: 10.1109/SFFCS.1999.814623
J. Feigenbaum, Sampath Kannan, M. Strauss, Mahesh Viswanathan
We give a space-efficient, one-pass algorithm for approximating the L/sup 1/ difference /spl Sigma//sub i/|a/sub i/-b/sub i/| between two functions, when the function values a/sub i/ and b/sub i/ are given as data streams, and their order is chosen by an adversary. Our main technical innovation is a method of constructing families {V/sub j/} of limited independence random variables that are range summable by which we mean that /spl Sigma//sub j=0//sup c-1/ V/sub j/(s) is computable in time polylog(c), for all seeds s. These random variable families may be of interest outside our current application domain, i.e., massive data streams generated by communication networks. Our L/sup 1/-difference algorithm can be viewed as a "sketching" algorithm, in the sense of (A. Broder et al., 1998), and our algorithm performs better than that of Broder et al., when used to approximate the symmetric difference of two sets with small symmetric difference.
当函数值a/下标i/和b/下标i/作为数据流给出时,它们的顺序由对手选择,我们给出了一个节省空间的,一次通过的算法来近似两个函数之间的L/下标1/差分/spl Sigma//下标i/|a/下标i/-b/下标i/|。我们的主要技术创新是一种构造家族{V/sub j/}的有限独立随机变量的方法,这些随机变量是范围可求和的,我们的意思是/spl Sigma//sub j=0//sup c-1/ V/sub j/(s)在时间多元log(c)中是可计算的,对于所有种子s。这些随机变量家族可能在我们当前的应用领域之外感兴趣,即由通信网络生成的大量数据流。从(a . Broder et al., 1998)的意义上讲,我们的L/sup 1/-差分算法可以看作是一种“素描”算法,当用于近似两个对称差分较小的集合的对称差分时,我们的算法比Broder et al.的算法表现得更好。
{"title":"An approximate L/sup 1/-difference algorithm for massive data streams","authors":"J. Feigenbaum, Sampath Kannan, M. Strauss, Mahesh Viswanathan","doi":"10.1109/SFFCS.1999.814623","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814623","url":null,"abstract":"We give a space-efficient, one-pass algorithm for approximating the L/sup 1/ difference /spl Sigma//sub i/|a/sub i/-b/sub i/| between two functions, when the function values a/sub i/ and b/sub i/ are given as data streams, and their order is chosen by an adversary. Our main technical innovation is a method of constructing families {V/sub j/} of limited independence random variables that are range summable by which we mean that /spl Sigma//sub j=0//sup c-1/ V/sub j/(s) is computable in time polylog(c), for all seeds s. These random variable families may be of interest outside our current application domain, i.e., massive data streams generated by communication networks. Our L/sup 1/-difference algorithm can be viewed as a \"sketching\" algorithm, in the sense of (A. Broder et al., 1998), and our algorithm performs better than that of Broder et al., when used to approximate the symmetric difference of two sets with small symmetric difference.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116327850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
How asymmetry helps load balancing 不对称如何帮助负载平衡
Pub Date : 1900-01-01 DOI: 10.1109/SFFCS.1999.814585
B. Vocking
This paper deals with balls and bins processes related to randomized load balancing, dynamic resource allocation and hashing. Suppose n balls have to be assigned to n bins, where each ball has to be placed without knowledge about the distribution of previously placed balls. The goal is to achieve an allocation that is as even as possible so that no bin gets much more balls than the average. A well known and good solution for this problem is to choose d possible locations for each ball at random, to look into each of these bins, and to place the ball into the least full among these bins. This class of algorithms has been investigated intensively in the past but almost all previous analyses assume that the d locations for each ball are chosen uniform and independently at random from the set of all bins. We investigate whether a non-uniform and possibly dependent choice of the d locations for a ball can improve the load balancing. Three types of selections are distinguished: 1) uniform and independent 2) non-uniform and independent 3) non-uniform and dependent. Our first result shows that choosing the locations in a non-uniform way (type 2) results in a better load balancing than choosing the locations uniformly (type 1). Surprising, this smooth load balancing is obtained by an algorithm called "Always-Go-Left" which creates an asymmetric assignment of the balls to the bins. Our second result is a lower bound on the smallest-possible maximum load that can be achieved by any allocation algorithm of type 1, 2, or 3.
本文研究了与随机负载均衡、动态资源分配和哈希相关的球箱过程。假设n个球被分配到n个箱子中,每个球都被放置在不知道之前放置的球的分布的情况下。我们的目标是实现尽可能均匀的分配,这样每个箱子得到的球就不会比平均值多很多。对于这个问题,一个众所周知的解决方案是随机为每个球选择d个可能的位置,查看每个箱子,并将球放入这些箱子中最少的箱子中。这类算法在过去已经进行了深入的研究,但几乎所有先前的分析都假设每个球的d个位置是均匀的,并且从所有箱子的集合中随机独立地选择。我们研究了球的非均匀和可能依赖的d位置选择是否可以改善负载平衡。选择分为三种类型:1)均匀和独立;2)非均匀和独立;3)非均匀和依赖。我们的第一个结果表明,以非均匀方式选择位置(类型2)比均匀选择位置(类型1)产生更好的负载平衡。令人惊讶的是,这种平滑的负载平衡是通过一种称为“永远向左”的算法获得的,该算法将球分配给垃圾箱。我们的第二个结果是任何类型1、2或3的分配算法所能达到的最小可能最大负载的下界。
{"title":"How asymmetry helps load balancing","authors":"B. Vocking","doi":"10.1109/SFFCS.1999.814585","DOIUrl":"https://doi.org/10.1109/SFFCS.1999.814585","url":null,"abstract":"This paper deals with balls and bins processes related to randomized load balancing, dynamic resource allocation and hashing. Suppose n balls have to be assigned to n bins, where each ball has to be placed without knowledge about the distribution of previously placed balls. The goal is to achieve an allocation that is as even as possible so that no bin gets much more balls than the average. A well known and good solution for this problem is to choose d possible locations for each ball at random, to look into each of these bins, and to place the ball into the least full among these bins. This class of algorithms has been investigated intensively in the past but almost all previous analyses assume that the d locations for each ball are chosen uniform and independently at random from the set of all bins. We investigate whether a non-uniform and possibly dependent choice of the d locations for a ball can improve the load balancing. Three types of selections are distinguished: 1) uniform and independent 2) non-uniform and independent 3) non-uniform and dependent. Our first result shows that choosing the locations in a non-uniform way (type 2) results in a better load balancing than choosing the locations uniformly (type 1). Surprising, this smooth load balancing is obtained by an algorithm called \"Always-Go-Left\" which creates an asymmetric assignment of the balls to the bins. Our second result is a lower bound on the smallest-possible maximum load that can be achieved by any allocation algorithm of type 1, 2, or 3.","PeriodicalId":385047,"journal":{"name":"40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124929401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1