首页 > 最新文献

ACM Transactions on Computation Theory最新文献

英文 中文
On Protocols for Monotone Feasible Interpolation 关于单调可行插值的协议
IF 0.7 Q3 Computer Science Pub Date : 2022-01-14 DOI: 10.1145/3583754
Lukáš Folwarczný
Dag-like communication protocols, a generalization of the classical tree-like communication protocols, are useful objects in the realm of proof complexity (most importantly for monotone feasible interpolation) and circuit complexity. We consider three kinds of protocols in this article (d is the degree of a protocol): — IEQ-d-dags: feasible sets of these protocols are described by inequality which means that the feasible sets are combinatorial triangles; these protocols are also called triangle-dags in the literature, — EQ-d-dags: feasible sets are described by equality, and — c-IEQ-d-dags: feasible sets are described by a conjunction of c inequalities.Garg, Göös, Kamath, and Sokolov (Theory of Computing, 2020) mentioned all these protocols, and they noted that EQ-d-dags are a special case of c-IEQ-d-dags. The exact relationship between these types of protocols is unclear. As our main contribution, we prove the following statement: EQ-2-dags can efficiently simulate c-IEQ-d-dags when c and d are constants. This implies that EQ-2-dags are at least as strong as IEQ-d-dags and that EQ-2-dags have the same strength as c-IEQ-d-dags for c ≥ 2 (because 2-IEQ-2-dags can trivially simulate EQ-2-dags). Hrubeš and Pudlák (Information Processing Letters, 2018) proved that IEQ-d-dags over the monotone Karchmer-Wigderson relation are equivalent to monotone real circuits which implies that we have exponential lower bounds for these protocols. Lower bounds for EQ-2-dags would directly imply lower bounds for the proof system R(LIN).
Dag类通信协议是经典树状通信协议的推广,在证明复杂性(最重要的是对于单调可行插值)和电路复杂性领域是有用的对象。本文考虑了三种协议(d是协议的度):——IEQ-d-dags:这些协议的可行集用不等式来描述,这意味着可行集是组合三角形;这些协议在文献中也被称为三角dags,--EQ-d-d-dags:可行集由等式描述,--c-IEQ-d-dags:可行集用c不等式的联合描述。Garg、Gös、Kamath和Sokolov(计算理论,2020)提到了所有这些协议,他们指出EQ-d-d-dag是c-IEQ-d-dags的特例。这些类型的协议之间的确切关系尚不清楚。作为我们的主要贡献,我们证明了以下陈述:当c和d为常数时,EQ-2-dags可以有效地模拟c-IEQ-d-dags。这意味着EQ-2-dags至少与IEQ-d-dags一样强,并且对于c≥2,EQ-2-dag具有与c-IEQ-d-dags相同的强度(因为2-IEQ-2-dags可以简单地模拟EQ-2-dads)。Hrubeš和Pudlák(Information Processing Letters,2018)证明了单调Karchmer-Wigderson关系上的IEQ-d-dags等价于单调实电路,这意味着我们对这些协议有指数下界。EQ-2-dags的下界将直接意味着证明系统R(LIN)的下界。
{"title":"On Protocols for Monotone Feasible Interpolation","authors":"Lukáš Folwarczný","doi":"10.1145/3583754","DOIUrl":"https://doi.org/10.1145/3583754","url":null,"abstract":"Dag-like communication protocols, a generalization of the classical tree-like communication protocols, are useful objects in the realm of proof complexity (most importantly for monotone feasible interpolation) and circuit complexity. We consider three kinds of protocols in this article (d is the degree of a protocol): — IEQ-d-dags: feasible sets of these protocols are described by inequality which means that the feasible sets are combinatorial triangles; these protocols are also called triangle-dags in the literature, — EQ-d-dags: feasible sets are described by equality, and — c-IEQ-d-dags: feasible sets are described by a conjunction of c inequalities.Garg, Göös, Kamath, and Sokolov (Theory of Computing, 2020) mentioned all these protocols, and they noted that EQ-d-dags are a special case of c-IEQ-d-dags. The exact relationship between these types of protocols is unclear. As our main contribution, we prove the following statement: EQ-2-dags can efficiently simulate c-IEQ-d-dags when c and d are constants. This implies that EQ-2-dags are at least as strong as IEQ-d-dags and that EQ-2-dags have the same strength as c-IEQ-d-dags for c ≥ 2 (because 2-IEQ-2-dags can trivially simulate EQ-2-dags). Hrubeš and Pudlák (Information Processing Letters, 2018) proved that IEQ-d-dags over the monotone Karchmer-Wigderson relation are equivalent to monotone real circuits which implies that we have exponential lower bounds for these protocols. Lower bounds for EQ-2-dags would directly imply lower bounds for the proof system R(LIN).","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46075631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Can a Skywalker Localize the Midpoint of a Rope? 天行者能定位绳子的中点吗?
IF 0.7 Q3 Computer Science Pub Date : 2021-07-18 DOI: 10.1145/3460954
Akihiro Monde, Yukiko Yamauchi, S. Kijima, M. Yamashita
This article poses a question about a simple localization problem. The question is if an oblivious walker on a line segment can localize the midpoint of the line segment in a finite number of steps observing the direction (i.e., Left or Right) and the distance to the nearest end point. This problem arises from self-stabilizing location problems by autonomous mobile robots with limited visibility, which is an abstract model attracting a wide interest in distributed computing. Contrary to appearances, it is far from trivial whether this simple problem is solvable, and it is not settled yet. This article is concerned with three variants of the problem with a minimal relaxation and presents self-stabilizing algorithms for them. We also show an easy impossibility theorem for bilaterally symmetric algorithms.
本文提出了一个关于简单的本地化问题的问题。问题是,线段上的遗忘步行者是否可以在观察方向(即向左或向右)和到最近终点的距离的有限步数中定位线段的中点。该问题是由具有有限可见性的自主移动机器人的自稳定定位问题引起的,它是分布式计算中引起广泛关注的一个抽象模型。与表面现象相反,这个简单的问题是否可以解决远非微不足道,而且还没有解决。本文讨论了具有最小松弛的三种问题变体,并给出了它们的自稳定算法。我们还给出了双边对称算法的一个简单的不可能定理。
{"title":"Can a Skywalker Localize the Midpoint of a Rope?","authors":"Akihiro Monde, Yukiko Yamauchi, S. Kijima, M. Yamashita","doi":"10.1145/3460954","DOIUrl":"https://doi.org/10.1145/3460954","url":null,"abstract":"This article poses a question about a simple localization problem. The question is if an oblivious walker on a line segment can localize the midpoint of the line segment in a finite number of steps observing the direction (i.e., Left or Right) and the distance to the nearest end point. This problem arises from self-stabilizing location problems by autonomous mobile robots with limited visibility, which is an abstract model attracting a wide interest in distributed computing. Contrary to appearances, it is far from trivial whether this simple problem is solvable, and it is not settled yet. This article is concerned with three variants of the problem with a minimal relaxation and presents self-stabilizing algorithms for them. We also show an easy impossibility theorem for bilaterally symmetric algorithms.","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64042163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inapproximability of Counting Hypergraph Colourings 超图着色计数的不可逼近性
IF 0.7 Q3 Computer Science Pub Date : 2021-07-12 DOI: 10.1145/3558554
Andreas Galanis, Heng Guo, Jiaheng Wang
Recent developments in approximate counting have made startling progress in developing fast algorithmic methods for approximating the number of solutions to constraint satisfaction problems (CSPs) with large arities, using connections to the Lovász Local Lemma. Nevertheless, the boundaries of these methods for CSPs with non-Boolean domain are not well-understood. Our goal in this article is to fill in this gap and obtain strong inapproximability results by studying the prototypical problem in this class of CSPs, hypergraph colourings. More precisely, we focus on the problem of approximately counting q-colourings on K-uniform hypergraphs with bounded degree Δ. An efficient algorithm exists if ({{Delta lesssim frac{q^{K/3-1}}{4^KK^2}}}) [Jain et al. 25; He et al. 23]. Somewhat surprisingly however, a hardness bound is not known even for the easier problem of finding colourings. For the counting problem, the situation is even less clear and there is no evidence of the right constant controlling the growth of the exponent in terms of K. To this end, we first establish that for general q computational hardness for finding a colouring on simple/linear hypergraphs occurs at Δ ≳ KqK, almost matching the algorithm from the Lovász Local Lemma. Our second and main contribution is to obtain a far more refined bound for the counting problem that goes well beyond the hardness of finding a colouring and which we conjecture is asymptotically tight (up to constant factors). We show in particular that for all even q ≥ 4 it is NP-hard to approximate the number of colourings when Δ ≳ qK/2. Our approach is based on considering an auxiliary weighted binary CSP model on graphs, which is obtained by “halving” the K-ary hypergraph constraints. This allows us to utilise reduction techniques available for the graph case, which hinge upon understanding the behaviour of random regular bipartite graphs that serve as gadgets in the reduction. The major challenge in our setting is to analyse the induced matrix norm of the interaction matrix of the new CSP which captures the most likely solutions of the system. In contrast to previous analyses in the literature, the auxiliary CSP demonstrates both symmetry and asymmetry, making the analysis of the optimisation problem severely more complicated and demanding the combination of delicate perturbation arguments and careful asymptotic estimates.
近似计数的最新发展在开发快速算法方法方面取得了惊人的进展,该方法使用与Lovász局部引理的连接来近似具有大arities的约束满足问题(CSP)的解的数量。然而,对于具有非布尔域的CSP,这些方法的边界还没有很好地理解。我们在本文中的目标是通过研究这类CSP中的原型问题,超图着色,来填补这一空白,并获得强的不可逼近性结果。更准确地说,我们关注的是具有有界度Δ的K一致超图上的q染色的近似计数问题。如果({{Deltalesssimfrac{q^{K/3-1}}{4^KK^2}}}}),则存在有效的算法[Jain等人25;He等人23]。然而,有点令人惊讶的是,即使是更容易找到颜色的问题,硬度界限也不为人所知。对于计数问题,情况甚至不太清楚,并且没有证据表明正确的常数控制了K指数的增长。为此,我们首先确定,对于一般的q,在简单/线性超图上寻找着色的计算硬度发生在Δ≳KqK,几乎与Lovász局部引理的算法相匹配。我们的第二个也是主要贡献是获得了计数问题的一个更精确的界,该界远远超出了寻找着色的难度,并且我们推测它是渐近紧的(直到常数因子)。我们特别指出,对于所有偶数q≥4,当ΔqK/2时,很难近似着色的数量。我们的方法是基于考虑图上的辅助加权二进制CSP模型,该模型是通过将K-ary超图约束“减半”而获得的。这使我们能够利用可用于图情况的约简技术,这取决于理解在约简中充当小工具的随机正则二分图的行为。我们设置中的主要挑战是分析新CSP的交互矩阵的诱导矩阵范数,该矩阵范数捕获系统的最可能解。与文献中先前的分析相比,辅助CSP表现出对称性和非对称性,使优化问题的分析变得更加复杂,并要求将精细的扰动自变量和谨慎的渐近估计相结合。
{"title":"Inapproximability of Counting Hypergraph Colourings","authors":"Andreas Galanis, Heng Guo, Jiaheng Wang","doi":"10.1145/3558554","DOIUrl":"https://doi.org/10.1145/3558554","url":null,"abstract":"Recent developments in approximate counting have made startling progress in developing fast algorithmic methods for approximating the number of solutions to constraint satisfaction problems (CSPs) with large arities, using connections to the Lovász Local Lemma. Nevertheless, the boundaries of these methods for CSPs with non-Boolean domain are not well-understood. Our goal in this article is to fill in this gap and obtain strong inapproximability results by studying the prototypical problem in this class of CSPs, hypergraph colourings. More precisely, we focus on the problem of approximately counting q-colourings on K-uniform hypergraphs with bounded degree Δ. An efficient algorithm exists if ({{Delta lesssim frac{q^{K/3-1}}{4^KK^2}}}) [Jain et al. 25; He et al. 23]. Somewhat surprisingly however, a hardness bound is not known even for the easier problem of finding colourings. For the counting problem, the situation is even less clear and there is no evidence of the right constant controlling the growth of the exponent in terms of K. To this end, we first establish that for general q computational hardness for finding a colouring on simple/linear hypergraphs occurs at Δ ≳ KqK, almost matching the algorithm from the Lovász Local Lemma. Our second and main contribution is to obtain a far more refined bound for the counting problem that goes well beyond the hardness of finding a colouring and which we conjecture is asymptotically tight (up to constant factors). We show in particular that for all even q ≥ 4 it is NP-hard to approximate the number of colourings when Δ ≳ qK/2. Our approach is based on considering an auxiliary weighted binary CSP model on graphs, which is obtained by “halving” the K-ary hypergraph constraints. This allows us to utilise reduction techniques available for the graph case, which hinge upon understanding the behaviour of random regular bipartite graphs that serve as gadgets in the reduction. The major challenge in our setting is to analyse the induced matrix norm of the interaction matrix of the new CSP which captures the most likely solutions of the system. In contrast to previous analyses in the literature, the auxiliary CSP demonstrates both symmetry and asymmetry, making the analysis of the optimisation problem severely more complicated and demanding the combination of delicate perturbation arguments and careful asymptotic estimates.","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49631299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Parameterized Complexity of Feature Selection for Categorical Data Clustering 范畴数据聚类特征选择的参数化复杂性
IF 0.7 Q3 Computer Science Pub Date : 2021-05-08 DOI: 10.1145/3604797
Sayan Bandyapadhyay, F. Fomin, P. Golovach, Kirill Simonov
We develop new algorithmic methods with provable guarantees for feature selection in regard to categorical data clustering. While feature selection is one of the most common approaches to reduce dimensionality in practice, most of the known feature selection methods are heuristics. We study the following mathematical model. We assume that there are some inadvertent (or undesirable) features of the input data that unnecessarily increase the cost of clustering. Consequently, we want to select a subset of the original features from the data such that there is a small-cost clustering on the selected features. More precisely, for given integers ℓ (the number of irrelevant features) and k (the number of clusters), budget B, and a set of n categorical data points (represented by m-dimensional vectors whose elements belong to a finite set of values Σ), we want to select m − ℓ relevant features such that the cost of any optimal k-clustering on these features does not exceed B. Here the cost of a cluster is the sum of Hamming distances (ℓ0-distances) between the selected features of the elements of the cluster and its center. The clustering cost is the total sum of the costs of the clusters. We use the framework of parameterized complexity to identify how the complexity of the problem depends on parameters k, B, and |Σ|. Our main result is an algorithm that solves the Feature Selection problem in time f(k, B, |Σ|) · mg(k, |Σ|) · n2 for some functions f and g. In other words, the problem is fixed-parameter tractable parameterized by B when |Σ| and k are constants. Our algorithm for Feature Selection is based on a solution to a more general problem, Constrained Clustering with Outliers. In this problem, we want to delete a certain number of outliers such that the remaining points could be clustered around centers satisfying specific constraints. One interesting fact about Constrained Clustering with Outliers is that besides Feature Selection, it encompasses many other fundamental problems regarding categorical data such as Robust Clustering, and Binary and Boolean Low-rank Matrix Approximation with Outliers. Thus as a byproduct of our theorem, we obtain algorithms for all these problems. We also complement our algorithmic findings with complexity lower bounds.
我们开发了新的算法方法,具有可证明的保证,用于分类数据聚类的特征选择。虽然特征选择是实践中最常见的降维方法之一,但大多数已知的特征选择方法都是启发式的。我们研究下面的数学模型。我们假设输入数据中存在一些无意的(或不希望的)特征,这些特征会不必要地增加聚类的成本。因此,我们希望从数据中选择原始特征的一个子集,以便在所选特征上有一个小成本聚类。更准确地说,对于给定的整数,即n(不相关特征的数量)和k(聚类的数量),预算B和n个分类数据点的集合(由m维向量表示,其元素属于一个有限值集合Σ),我们想要选择m−n个相关特征,使得在这些特征上的任何最优k聚类的代价不超过b。这里,聚类的代价是聚类元素的选定特征与其中心之间的汉明距离(0-距离)的和。聚类成本是聚类成本的总和。我们使用参数化复杂性的框架来确定问题的复杂性如何依赖于参数k, B和|Σ|。我们的主要成果是在f(k, B, |Σ|)·mg(k, |Σ|)·n2时间内解决某些函数f和g的Feature Selection问题的算法。换句话说,当|Σ|和k为常数时,问题是固定参数可处理的,由B参数化。我们的特征选择算法是基于一个更普遍的问题的解决方案,即具有异常值的约束聚类。在这个问题中,我们想要删除一定数量的异常点,这样剩下的点就可以聚集在满足特定约束的中心周围。关于带离群点的约束聚类的一个有趣的事实是,除了特征选择之外,它还包含了许多关于分类数据的其他基本问题,如鲁棒聚类,带离群点的二进制和布尔低秩矩阵逼近。因此,作为我们定理的副产品,我们得到了所有这些问题的算法。我们还用复杂度下界来补充我们的算法发现。
{"title":"Parameterized Complexity of Feature Selection for Categorical Data Clustering","authors":"Sayan Bandyapadhyay, F. Fomin, P. Golovach, Kirill Simonov","doi":"10.1145/3604797","DOIUrl":"https://doi.org/10.1145/3604797","url":null,"abstract":"We develop new algorithmic methods with provable guarantees for feature selection in regard to categorical data clustering. While feature selection is one of the most common approaches to reduce dimensionality in practice, most of the known feature selection methods are heuristics. We study the following mathematical model. We assume that there are some inadvertent (or undesirable) features of the input data that unnecessarily increase the cost of clustering. Consequently, we want to select a subset of the original features from the data such that there is a small-cost clustering on the selected features. More precisely, for given integers ℓ (the number of irrelevant features) and k (the number of clusters), budget B, and a set of n categorical data points (represented by m-dimensional vectors whose elements belong to a finite set of values Σ), we want to select m − ℓ relevant features such that the cost of any optimal k-clustering on these features does not exceed B. Here the cost of a cluster is the sum of Hamming distances (ℓ0-distances) between the selected features of the elements of the cluster and its center. The clustering cost is the total sum of the costs of the clusters. We use the framework of parameterized complexity to identify how the complexity of the problem depends on parameters k, B, and |Σ|. Our main result is an algorithm that solves the Feature Selection problem in time f(k, B, |Σ|) · mg(k, |Σ|) · n2 for some functions f and g. In other words, the problem is fixed-parameter tractable parameterized by B when |Σ| and k are constants. Our algorithm for Feature Selection is based on a solution to a more general problem, Constrained Clustering with Outliers. In this problem, we want to delete a certain number of outliers such that the remaining points could be clustered around centers satisfying specific constraints. One interesting fact about Constrained Clustering with Outliers is that besides Feature Selection, it encompasses many other fundamental problems regarding categorical data such as Robust Clustering, and Binary and Boolean Low-rank Matrix Approximation with Outliers. Thus as a byproduct of our theorem, we obtain algorithms for all these problems. We also complement our algorithmic findings with complexity lower bounds.","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2021-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43512867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decoding Variants of Reed-Muller Codes over Finite Grids 有限网格上Reed-Muller码的译码变体
IF 0.7 Q3 Computer Science Pub Date : 2020-11-08 DOI: 10.1145/3417754
SrinivasanSrikanth, TripathiUtkarsh, VenkiteshS.
In a recent article, Kim and Kopparty (2017) gave a deterministic algorithm for the unique decoding problem for polynomials of bounded total degree over a general grid S1 Sm. We show that their alg...
在最近的一篇文章中,Kim和Kopparty(2017)给出了一种确定性算法,用于一般网格S1 Sm上有界总度多项式的唯一解码问题。我们展示了他们的…
{"title":"Decoding Variants of Reed-Muller Codes over Finite Grids","authors":"SrinivasanSrikanth, TripathiUtkarsh, VenkiteshS.","doi":"10.1145/3417754","DOIUrl":"https://doi.org/10.1145/3417754","url":null,"abstract":"In a recent article, Kim and Kopparty (2017) gave a deterministic algorithm for the unique decoding problem for polynomials of bounded total degree over a general grid S1 Sm. We show that their alg...","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3417754","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64033791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Subgraph Testing Model 子图测试模型
IF 0.7 Q3 Computer Science Pub Date : 2020-11-08 DOI: 10.1145/3428675
GoldreichOded, RonDana
Following Newman (2010), we initiate a study of testing properties of graphs that are presented as subgraphs of a fixed (or an explicitly given) graph. The tester is given free access to a base gra...
继Newman(2010)之后,我们开始研究作为固定(或显式给定)图的子图呈现的图的测试属性。测试者可以自由使用一个基本的gra。
{"title":"The Subgraph Testing Model","authors":"GoldreichOded, RonDana","doi":"10.1145/3428675","DOIUrl":"https://doi.org/10.1145/3428675","url":null,"abstract":"Following Newman (2010), we initiate a study of testing properties of graphs that are presented as subgraphs of a fixed (or an explicitly given) graph. The tester is given free access to a base gra...","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78098130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Power of Amortization in Secret Sharing: d -Uniform Secret Sharing and CDS with Constant Information Rate 论秘密共享中的摊销力:d -恒定信息率下的一致秘密共享和CDS
IF 0.7 Q3 Computer Science Pub Date : 2020-09-30 DOI: 10.1145/3417756
ApplebaumBenny, ArkisBarak
Consider the following secret-sharing problem: A file s should be distributed between n servers such that (d-1)-subsets cannot recover the file, (d+1)-subsets can recover the file, and d-subsets sh...
考虑下面的秘密共享问题:一个文件s应该分布在n个服务器之间,使得(d-1)-subsets不能恢复文件,(d+1)-subsets可以恢复文件,并且d-subsets sh…
{"title":"On the Power of Amortization in Secret Sharing: d -Uniform Secret Sharing and CDS with Constant Information Rate","authors":"ApplebaumBenny, ArkisBarak","doi":"10.1145/3417756","DOIUrl":"https://doi.org/10.1145/3417756","url":null,"abstract":"Consider the following secret-sharing problem: A file s should be distributed between n servers such that (d-1)-subsets cannot recover the file, (d+1)-subsets can recover the file, and d-subsets sh...","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76957129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Algorithmic Meta-Theorem for Graph Modification to Planarity and FOL 图对平面性和FOL修改的一个算法元定理
IF 0.7 Q3 Computer Science Pub Date : 2020-09-07 DOI: 10.1145/3571278
F. Fomin, P. Golovach, Giannos Stamoulis, D. Thilikos
In general, a graph modification problem is defined by a graph modification operation ⊠ and a target graph property 𝒫. Typically, the modification operation ⊠ may be vertex deletion, edge deletion, edge contraction, or edge addition and the question is, given a graph G and an integer k, whether it is possible to transform G to a graph in 𝒫 after applying the operation ⊠ k times on G. This problem has been extensively studied for particular instantiations of ⊠ and 𝒫. In this article, we consider the general property 𝒫𝛗 of being planar and, additionally, being a model of some First-Order Logic (FOL) sentence 𝛗 (an FOL-sentence). We call the corresponding meta-problem Graph ⊠-Modification to Planarity and 𝛗 and prove the following algorithmic meta-theorem: there exists a function f : ℕ2 → ℕ such that, for every ⊠ and every FOL-sentence 𝛗, the Graph ⊠-Modification to Planarity and 𝛗 is solvable in f(k,|𝛗|)⋅ n2 time. The proof constitutes a hybrid of two different classic techniques in graph algorithms. The first is the irrelevant vertex technique that is typically used in the context of Graph Minors and deals with properties such as planarity or surface-embeddability (that are not FOL-expressible) and the second is the use of Gaifman’s locality theorem that is the theoretical base for the meta-algorithmic study of FOL-expressible problems.
一般来说,图的修改问题是由图的修改操作⊠和一个目标图的属性p来定义的。通常,修改操作⊠可能是顶点删除、边删除、边收缩或边添加,问题是,给定一个图G和一个整数k,对G进行⊠k次操作后,是否有可能将G转换为一个在∈中的图。对于⊠和∈的特定实例,这个问题已经得到了广泛的研究。在本文中,我们考虑平面性的一般性质,并且考虑平面性是一些一阶逻辑(FOL)句子(foll -sentence)的模型。我们将相应的元问题命名为图⊠-修改平面性和,并证明了以下算法元定理:存在一个函数f: _ 2→_使得对于每一个⊠和每一个foll句子,图⊠-修改平面性和在f(k,| |)⋅n2时间内可解。这个证明是图算法中两种不同的经典技术的混合。第一个是不相关顶点技术,通常用于图小的上下文中,并处理诸如平面性或表面嵌入性(不可folo表达)等属性,第二个是使用Gaifman的局部性定理,这是folo可表达问题的元算法研究的理论基础。
{"title":"An Algorithmic Meta-Theorem for Graph Modification to Planarity and FOL","authors":"F. Fomin, P. Golovach, Giannos Stamoulis, D. Thilikos","doi":"10.1145/3571278","DOIUrl":"https://doi.org/10.1145/3571278","url":null,"abstract":"In general, a graph modification problem is defined by a graph modification operation ⊠ and a target graph property 𝒫. Typically, the modification operation ⊠ may be vertex deletion, edge deletion, edge contraction, or edge addition and the question is, given a graph G and an integer k, whether it is possible to transform G to a graph in 𝒫 after applying the operation ⊠ k times on G. This problem has been extensively studied for particular instantiations of ⊠ and 𝒫. In this article, we consider the general property 𝒫𝛗 of being planar and, additionally, being a model of some First-Order Logic (FOL) sentence 𝛗 (an FOL-sentence). We call the corresponding meta-problem Graph ⊠-Modification to Planarity and 𝛗 and prove the following algorithmic meta-theorem: there exists a function f : ℕ2 → ℕ such that, for every ⊠ and every FOL-sentence 𝛗, the Graph ⊠-Modification to Planarity and 𝛗 is solvable in f(k,|𝛗|)⋅ n2 time. The proof constitutes a hybrid of two different classic techniques in graph algorithms. The first is the irrelevant vertex technique that is typically used in the context of Graph Minors and deals with properties such as planarity or surface-embeddability (that are not FOL-expressible) and the second is the use of Gaifman’s locality theorem that is the theoretical base for the meta-algorithmic study of FOL-expressible problems.","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45963136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Computing Multilinear Polynomials Using Multi-r-ic Depth Four Circuits 用多ic深度四电路计算多线性多项式
IF 0.7 Q3 Computer Science Pub Date : 2020-03-10 DOI: 10.1145/3460952
S. Chillara
In this article, we are interested in understanding the complexity of computing multilinear polynomials using depth four circuits in which the polynomial computed at every node has a bound on the individual degree of r≥ 1 with respect to all its variables (referred to as multi-r-ic circuits). The goal of this study is to make progress towards proving superpolynomial lower bounds for general depth four circuits computing multilinear polynomials, by proving better bounds as the value of r increases. Recently, Kayal, Saha and Tavenas (Theory of Computing, 2018) showed that any depth four arithmetic circuit of bounded individual degree r computing an explicit multilinear polynomial on nO(1) variables and degree d must have size at least (n/r1.1)Ω(√d/r). This bound, however, deteriorates as the value of r increases. It is a natural question to ask if we can prove a bound that does not deteriorate as the value of r increases, or a bound that holds for a larger regime of r. In this article, we prove a lower bound that does not deteriorate with increasing values of r, albeit for a specific instance of d = d(n) but for a wider range of r. Formally, for all large enough integers n and a small constant η, we show that there exists an explicit polynomial on nO(1) variables and degree Θ (log2 n) such that any depth four circuit of bounded individual degree r ≤ nη must have size at least exp(Ω(log2 n)). This improvement is obtained by suitably adapting the complexity measure of Kayal et al. (Theory of Computing, 2018). This adaptation of the measure is inspired by the complexity measure used by Kayal et al. (SIAM J. Computing, 2017).
在本文中,我们感兴趣的是理解使用深度四电路计算多线性多项式的复杂性,其中在每个节点计算的多项式相对于其所有变量(称为多r-ic电路)的单个度r≥1有一个界。本研究的目标是通过证明r值增加时更好的边界,在证明一般深度四电路计算多线性多项式的超多项式下界方面取得进展。最近,Kayal, Saha和Tavenas (Theory of Computing, 2018)表明,在nO(1)个变量和d次上计算显式多线性多项式的任何有限个体度r的深度四算术电路必须具有至少(n/r1.1)Ω(√d/r)的大小。然而,随着r值的增加,这个界限会变差。一个自然的问题是,我们是否能证明一个不随r值的增加而恶化的边界,或者一个适用于更大范围r的边界。在本文中,我们证明了一个不随r值的增加而恶化的下界,尽管是针对d = d(n)的特定实例,但适用于更广泛的r范围。形式上,对于所有足够大的整数n和一个小的常数η,我们证明了在nO(1)个变量和阶次Θ (log2 n)上存在一个显式多项式,使得任何有界的单个阶次r≤nη的深度四回路必须至少具有exp(Ω(log2 n))的大小。这种改进是通过适当地采用Kayal等人的复杂性度量来获得的(Theory of Computing, 2018)。这种对度量的适应受到Kayal等人使用的复杂性度量的启发(SIAM J. Computing, 2017)。
{"title":"On Computing Multilinear Polynomials Using Multi-r-ic Depth Four Circuits","authors":"S. Chillara","doi":"10.1145/3460952","DOIUrl":"https://doi.org/10.1145/3460952","url":null,"abstract":"In this article, we are interested in understanding the complexity of computing multilinear polynomials using depth four circuits in which the polynomial computed at every node has a bound on the individual degree of r≥ 1 with respect to all its variables (referred to as multi-r-ic circuits). The goal of this study is to make progress towards proving superpolynomial lower bounds for general depth four circuits computing multilinear polynomials, by proving better bounds as the value of r increases. Recently, Kayal, Saha and Tavenas (Theory of Computing, 2018) showed that any depth four arithmetic circuit of bounded individual degree r computing an explicit multilinear polynomial on nO(1) variables and degree d must have size at least (n/r1.1)Ω(√d/r). This bound, however, deteriorates as the value of r increases. It is a natural question to ask if we can prove a bound that does not deteriorate as the value of r increases, or a bound that holds for a larger regime of r. In this article, we prove a lower bound that does not deteriorate with increasing values of r, albeit for a specific instance of d = d(n) but for a wider range of r. Formally, for all large enough integers n and a small constant η, we show that there exists an explicit polynomial on nO(1) variables and degree Θ (log2 n) such that any depth four circuit of bounded individual degree r ≤ nη must have size at least exp(Ω(log2 n)). This improvement is obtained by suitably adapting the complexity measure of Kayal et al. (Theory of Computing, 2018). This adaptation of the measure is inspired by the complexity measure used by Kayal et al. (SIAM J. Computing, 2017).","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3460952","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"64042116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quantum Time–Space Tradeoff for Finding Multiple Collision Pairs 寻找多个碰撞对的量子时空权衡
IF 0.7 Q3 Computer Science Pub Date : 2020-02-20 DOI: 10.1145/3589986
Yassine Hamoudi, F. Magniez
We study the problem of finding K collision pairs in a random function f : [N] → [N] by using a quantum computer. We prove that the number of queries to the function in the quantum random oracle model must increase significantly when the size of the available memory is limited. Namely, we demonstrate that any algorithm using S qubits of memory must perform a number T of queries that satisfies the tradeoff T3 S ≥ Ω (K3 N). Classically, the same question has only been settled recently by Dinur [22], who showed that the Parallel Collision Search algorithm of van Oorschot and Wiener [36] achieves the optimal time–space tradeoff of T2 S = Θ (K2 N). Our result limits the extent to which quantum computing may decrease this tradeoff. Our method is based on a novel application of Zhandry’s recording query technique [42] for proving lower bounds in the exponentially small success probability regime. As a second application, we give a simpler proof of the time–space tradeoff T2 S ≥ Ω (N3) for sorting N numbers on a quantum computer, which was first obtained by Klauck, Špalek, and de Wolf [30].
我们研究了在随机函数f:[N]中寻找K个碰撞对的问题→ [N] 通过使用量子计算机。我们证明,当可用内存的大小有限时,对量子随机预言机模型中函数的查询数量必须显著增加。也就是说,我们证明了任何使用存储器的S个量子位的算法都必须执行满足折衷T3 S≥Ω(K3 N)的T个查询。传统上,Dinur[22]最近才解决了同样的问题,他表明van Oorshot和Wiener[36]的并行碰撞搜索算法实现了T2 S=θ(K2 N)的最佳时间-空间折衷。我们的结果限制了量子计算可以在多大程度上减少这种权衡。我们的方法基于Zhandry的记录查询技术[42]的一个新应用,用于证明指数小成功概率情况下的下界。作为第二个应用,我们给出了在量子计算机上排序N个数的时间-空间折衷T2 S≥Ω(N3)的一个更简单的证明,这是Klauck、Špalek和de Wolf[30]首次获得的。
{"title":"Quantum Time–Space Tradeoff for Finding Multiple Collision Pairs","authors":"Yassine Hamoudi, F. Magniez","doi":"10.1145/3589986","DOIUrl":"https://doi.org/10.1145/3589986","url":null,"abstract":"We study the problem of finding K collision pairs in a random function f : [N] → [N] by using a quantum computer. We prove that the number of queries to the function in the quantum random oracle model must increase significantly when the size of the available memory is limited. Namely, we demonstrate that any algorithm using S qubits of memory must perform a number T of queries that satisfies the tradeoff T3 S ≥ Ω (K3 N). Classically, the same question has only been settled recently by Dinur [22], who showed that the Parallel Collision Search algorithm of van Oorschot and Wiener [36] achieves the optimal time–space tradeoff of T2 S = Θ (K2 N). Our result limits the extent to which quantum computing may decrease this tradeoff. Our method is based on a novel application of Zhandry’s recording query technique [42] for proving lower bounds in the exponentially small success probability regime. As a second application, we give a simpler proof of the time–space tradeoff T2 S ≥ Ω (N3) for sorting N numbers on a quantum computer, which was first obtained by Klauck, Špalek, and de Wolf [30].","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2020-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49280626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
ACM Transactions on Computation Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1