首页 > 最新文献

Journal of the ACM最新文献

英文 中文
Smoothed Analysis with Adaptive Adversaries 自适应对手的平滑分析
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-04-13 DOI: 10.1145/3656638
Nika Haghtalab, Tim Roughgarden, Abhishek Shetty

We prove novel algorithmic guarantees for several online problems in the smoothed analysis model. In this model, at each time step an adversary chooses an input distribution with density function bounded above pointwise by (tfrac{1}{sigma } ) times that of the uniform distribution; nature then samples an input from this distribution. Here, σ is a parameter that interpolates between the extremes of worst-case and average case analysis. Crucially, our results hold for adaptive adversaries that can base their choice of an input distribution on the decisions of the algorithm and the realizations of the inputs in the previous time steps. An adaptive adversary can nontrivially correlate inputs at different time steps with each other and with the algorithm’s current state; this appears to rule out the standard proof approaches in smoothed analysis.

This paper presents a general technique for proving smoothed algorithmic guarantees against adaptive adversaries, in effect reducing the setting of an adaptive adversary to the much simpler case of an oblivious adversary (i.e., an adversary that commits in advance to the entire sequence of input distributions). We apply this technique to prove strong smoothed guarantees for three different problems:

(1)

Online learning: We consider the online prediction problem, where instances are generated from an adaptive sequence of σ-smooth distributions and the hypothesis class has VC dimension d. We bound the regret by (tilde{O}big (sqrt {T dln (1/sigma)} + dln (T/sigma) big) ) and provide a near-matching lower bound. Our result shows that under smoothed analysis, learnability against adaptive adversaries is characterized by the finiteness of the VC dimension. This is as opposed to the worst-case analysis, where online learnability is characterized by Littlestone dimension (which is infinite even in the extremely restricted case of one-dimensional threshold functions). Our results fully answer an open question of Rakhlin et al. [64].

(2)

Online discrepancy minimization: We consider the setting of the online Komlós problem, where the input is generated from an adaptive sequence of σ-smooth and isotropic distributions on the ℓ2 unit ball. We bound the ℓ norm of the discrepancy vector by (tilde{O}big (ln ^2big (frac{nT}{sigma }big) big) ). This is as opposed to the worst-case analysis, where the tight discrepancy bound is (Theta (sqrt {T/n}) ). We show such polylog(nT/σ) discrepancy guarantees are not achievable for non-isotropic σ-smooth distributions.

(3)

Dispersion in online optimization: We consider online optimization with piecewise Lipschitz functions where fun

我们证明了平滑分析模型中若干在线问题的新算法保证。在该模型中,对手在每个时间步选择一个输入分布,该输入分布的密度函数以 (tfrac{1}{sigma } ) 倍于均匀分布的密度函数为界。这里,σ 是一个介于最坏情况分析和平均情况分析两个极端之间的参数。最重要的是,我们的结果适用于自适应对手,它们可以根据算法的决策和之前时间步骤中输入的实现情况来选择输入分布。自适应对手可以将不同时间步骤的输入与算法的当前状态非难地联系起来;这似乎排除了平滑分析中的标准证明方法。本文提出了一种证明针对自适应对手的平滑算法保证的通用技术,实际上是将自适应对手的设置简化为更简单的遗忘对手(即事先承诺整个输入分布序列的对手)。我们运用这一技术证明了三个不同问题的强平滑保证:(1) 在线学习:我们用 (tilde{O}big (sqrt {T dln (1/sigma)} + dln (T/sigma) big) )来约束遗憾,并提供了一个接近匹配的下限。我们的结果表明,在平滑分析下,针对自适应对手的可学习性是以 VC 维度的有限性为特征的。这与最坏情况分析相反,在最坏情况分析下,在线可学性的特征是利特尔斯通维度(即使在一维阈值函数这种极其有限的情况下,利特尔斯通维度也是无限的)。我们的结果完全回答了 Rakhlin 等人[64]提出的一个开放问题。(2) 在线差异最小化:我们考虑的是在线 Komlós 问题,输入由 ℓ2 单位球上的σ 平滑各向同性分布的自适应序列生成。我们用 (tilde{O}big (ln ^2big (frac{nT}{sigma }big) big) 约束差异向量的 ℓ∞ norm。)这与最坏情况分析相反,在最坏情况分析中,严格的差异约束是 (Theta (sqrt {T/n}) )。我们证明,对于非各向异性的σ光滑分布,这种polylog(nT/σ)差异保证是无法实现的。(3) 在线优化中的离散性:我们考虑了具有片状 Lipschitz 函数的在线优化,其中具有 ℓ 不连续性的函数是由平滑自适应对手选择的,并且证明了所得到的序列是 (бig ({sigma }/{sqrt {Tell }}, tilde{O}бig (sqrt {Tell } бig)бig) 分散的。也就是说,每个半径为 ({sigma }/{sqrt {Tell }}) 的球都被这些函数所做的分割的 (tilde{O}big (sqrt {Tell } big) ) 分割。这一结果与 Balcan 等人[13]针对遗忘平滑对手的分散参数相匹配,达到对数因子。另一方面,最坏情况序列的离散度是(0, T)。
{"title":"Smoothed Analysis with Adaptive Adversaries","authors":"Nika Haghtalab, Tim Roughgarden, Abhishek Shetty","doi":"10.1145/3656638","DOIUrl":"https://doi.org/10.1145/3656638","url":null,"abstract":"<p>We prove novel algorithmic guarantees for several online problems in the smoothed analysis model. In this model, at each time step an adversary chooses an input distribution with density function bounded above pointwise by (tfrac{1}{sigma } ) times that of the uniform distribution; nature then samples an input from this distribution. Here, <i>σ</i> is a parameter that interpolates between the extremes of worst-case and average case analysis. Crucially, our results hold for <i>adaptive</i> adversaries that can base their choice of an input distribution on the decisions of the algorithm and the realizations of the inputs in the previous time steps. An adaptive adversary can nontrivially correlate inputs at different time steps with each other and with the algorithm’s current state; this appears to rule out the standard proof approaches in smoothed analysis. </p><p>This paper presents a general technique for proving smoothed algorithmic guarantees against adaptive adversaries, in effect reducing the setting of an adaptive adversary to the much simpler case of an oblivious adversary (i.e., an adversary that commits in advance to the entire sequence of input distributions). We apply this technique to prove strong smoothed guarantees for three different problems: <p><table border=\"0\" list-type=\"ordered\" width=\"95%\"><tr><td valign=\"top\"><p>(1)</p></td><td colspan=\"5\" valign=\"top\"><p>Online learning: We consider the online prediction problem, where instances are generated from an adaptive sequence of <i>σ</i>-smooth distributions and the hypothesis class has VC dimension <i>d</i>. We bound the regret by (tilde{O}big (sqrt {T dln (1/sigma)} + dln (T/sigma) big) ) and provide a near-matching lower bound. Our result shows that under smoothed analysis, learnability against adaptive adversaries is characterized by the finiteness of the VC dimension. This is as opposed to the worst-case analysis, where online learnability is characterized by Littlestone dimension (which is infinite even in the extremely restricted case of one-dimensional threshold functions). Our results fully answer an open question of Rakhlin et al. [64]. </p></td></tr><tr><td valign=\"top\"><p>(2)</p></td><td colspan=\"5\" valign=\"top\"><p>Online discrepancy minimization: We consider the setting of the online Komlós problem, where the input is generated from an adaptive sequence of <i>σ</i>-smooth and isotropic distributions on the ℓ<sub>2</sub> unit ball. We bound the ℓ<sub>∞</sub> norm of the discrepancy vector by (tilde{O}big (ln ^2big (frac{nT}{sigma }big) big) ). This is as opposed to the worst-case analysis, where the tight discrepancy bound is (Theta (sqrt {T/n}) ). We show such polylog(<i>nT</i>/<i>σ</i>) discrepancy guarantees are not achievable for non-isotropic <i>σ</i>-smooth distributions. </p></td></tr><tr><td valign=\"top\"><p>(3)</p></td><td colspan=\"5\" valign=\"top\"><p>Dispersion in online optimization: We consider online optimization with piecewise Lipschitz functions where fun","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140600098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Multivariate Multipoint Evaluation Over All Finite Fields 在所有有限域上快速进行多变量多点评估
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-03-21 DOI: 10.1145/3652025
Vishwas Bhargava, Sumanta Ghosh, Zeyu Guo, Mrinal Kumar, Chris Umans

Multivariate multipoint evaluation is the problem of evaluating a multivariate polynomial, given as a coefficient vector, simultaneously at multiple evaluation points. In this work, we show that there exists a deterministic algorithm for multivariate multipoint evaluation over any finite field (mathbb {F} ) that outputs the evaluations of an m-variate polynomial of degree less than d in each variable at N points in time [ (d^m+N)^{1+o(1)}cdot {rm poly}(m,d,log |mathbb {F}|) ]for all (min mathbb {N} ) and all sufficiently large (din mathbb {N} ).

A previous work of Kedlaya and Umans (FOCS 2008, SICOMP 2011) achieved the same time complexity when the number of variables m is at most do(1) and had left the problem of removing this condition as an open problem. A recent work of Bhargava, Ghosh, Kumar and Mohapatra (STOC 2022) answered this question when the underlying field is not too large and has characteristic less than do(1). In this work, we remove this constraint on the number of variables over all finite fields, thereby answering the question of Kedlaya and Umans over all finite fields.

Our algorithm relies on a non-trivial combination of ideas from three seemingly different previously known algorithms for multivariate multipoint evaluation, namely the algorithms of Kedlaya and Umans, that of Björklund, Kaski and Williams (IPEC 2017, Algorithmica 2019), and that of Bhargava, Ghosh, Kumar and Mohapatra, together with a result of Bombieri and Vinogradov from analytic number theory about the distribution of primes in an arithmetic progression.

We also present a second algorithm for multivariate multipoint evaluation that is completely elementary and in particular, avoids the use of the Bombieri–Vinogradov Theorem. However, it requires a mild assumption that the field size is bounded by an exponential tower in d of bounded height. More specifically, our second algorithm solves the multivariate multipoint evaluation problem over a finite field (mathbb {F} ) in time [ (d^m+N)^{1+o(1)}cdot {rm poly}(m,d,log |mathbb {F}|) ]for all (min mathbb {N} ) and all sufficiently large (din mathbb {N} ), provided that the size of the finite field (mathbb {F} ) is at most (exp(exp(exp(⋅⋅⋅(exp(d))))), where the height of this tower of exponentials is fixed.

多变量多点求值是在多个求值点同时求一个多变量多项式的问题,该多项式以系数向量的形式给出。在这项工作中,我们证明了在任意有限域 (mathbb {F} )上存在一种多变量多点求值的确定性算法,它能在 N 个时间点上输出每个变量中阶数小于 d 的 m 变量多项式的求值结果 [ (d^m+N)^{1+o(1)}cdot {rm poly}(m. d,log |mathbb {F} )、d,(log |mathbb {F}|) ]对于所有的(m在 mathbb {N} )和所有足够大的(d在 mathbb {N} )。Kedlaya 和 Umans 之前的工作(FOCS 2008, SICOMP 2011)在变量数 m 最多为 do(1) 时达到了相同的时间复杂度,并将消除这一条件的问题作为一个未决问题。最近,Bhargava、Ghosh、Kumar 和 Mohapatra(STOC 2022)的一项研究回答了这个问题,即当底层字段不是太大且特征小于 do(1)时。在这项研究中,我们在所有有限域中取消了对变量数量的限制,从而在所有有限域中回答了 Kedlaya 和 Umans 的问题。我们的算法依赖于三种看似不同的先前已知多元多点求值算法的思想的非难结合,即 Kedlaya 和 Umans 的算法,Björklund、Kaski 和 Williams 的算法(IPEC 2017,Algorithmica 2019),以及 Bhargava、Ghosh、Kumar 和 Mohapatra 的算法,再加上 Bombieri 和 Vinogradov 从解析数论中得出的关于算术级数中素数分布的结果。我们还提出了多元多点求值的第二种算法,这种算法完全是基本算法,特别是避免了使用邦比利-维诺格拉多夫定理。不过,它需要一个温和的假设,即场的大小由一个高度有界的 d 指数塔来限定。更具体地说,我们的第二种算法求解有限域 (mathbb {F} )上的多元多点求值问题所需的时间是 [ (d^m+N)^{1+o(1)}cdot {rm poly}(m,d.) log |mathbb {F} )、log |mathbb {F}|) ]对于所有 (min mathbb {N} )和所有足够大的(din mathbb {N} ),只要有限域 (mathbb {F} )的大小最多为(exp(exp(exp(⋅⋅⋅⋅(exp(d))))),其中这个指数塔的高度是固定的。
{"title":"Fast Multivariate Multipoint Evaluation Over All Finite Fields","authors":"Vishwas Bhargava, Sumanta Ghosh, Zeyu Guo, Mrinal Kumar, Chris Umans","doi":"10.1145/3652025","DOIUrl":"https://doi.org/10.1145/3652025","url":null,"abstract":"<p>Multivariate multipoint evaluation is the problem of evaluating a multivariate polynomial, given as a coefficient vector, simultaneously at multiple evaluation points. In this work, we show that there exists a deterministic algorithm for multivariate multipoint evaluation over any finite field (mathbb {F} ) that outputs the evaluations of an <i>m</i>-variate polynomial of degree less than <i>d</i> in each variable at <i>N</i> points in time <span>[ (d^m+N)^{1+o(1)}cdot {rm poly}(m,d,log |mathbb {F}|) ]</span>\u0000for all (min mathbb {N} ) and all sufficiently large (din mathbb {N} ). </p><p>A previous work of Kedlaya and Umans (FOCS 2008, SICOMP 2011) achieved the same time complexity when the number of variables <i>m</i> is at most <i>d</i><sup><i>o</i>(1)</sup> and had left the problem of removing this condition as an open problem. A recent work of Bhargava, Ghosh, Kumar and Mohapatra (STOC 2022) answered this question when the underlying field is not <i>too</i> large and has characteristic less than <i>d</i><sup><i>o</i>(1)</sup>. In this work, we remove this constraint on the number of variables over all finite fields, thereby answering the question of Kedlaya and Umans over all finite fields. </p><p>Our algorithm relies on a non-trivial combination of ideas from three seemingly different previously known algorithms for multivariate multipoint evaluation, namely the algorithms of Kedlaya and Umans, that of Björklund, Kaski and Williams (IPEC 2017, Algorithmica 2019), and that of Bhargava, Ghosh, Kumar and Mohapatra, together with a result of Bombieri and Vinogradov from analytic number theory about the distribution of primes in an arithmetic progression. </p><p>We also present a second algorithm for multivariate multipoint evaluation that is completely elementary and in particular, avoids the use of the Bombieri–Vinogradov Theorem. However, it requires a mild assumption that the field size is bounded by an exponential tower in <i>d</i> of bounded <i>height</i>. More specifically, our second algorithm solves the multivariate multipoint evaluation problem over a finite field (mathbb {F} ) in time <span>[ (d^m+N)^{1+o(1)}cdot {rm poly}(m,d,log |mathbb {F}|) ]</span>\u0000for all (min mathbb {N} ) and all sufficiently large (din mathbb {N} ), provided that the size of the finite field (mathbb {F} ) is at most (exp(exp(exp(⋅⋅⋅(exp(<i>d</i>))))), where the height of this tower of exponentials is fixed.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140203269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Faster high-accuracy log-concave sampling via algorithmic warm starts 通过热启动算法实现更快的高精度对数凹采样
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-03-20 DOI: 10.1145/3653446
Jason M. Altschuler, Sinho Chewi

It is a fundamental problem to understand the complexity of high-accuracy sampling from a strongly log-concave density π on (mathbb {R}^d ). Indeed, in practice, high-accuracy samplers such as the Metropolis-adjusted Langevin algorithm (MALA) remain the de facto gold standard; and in theory, via the proximal sampler reduction, it is understood that such samplers are key for sampling even beyond log-concavity (in particular, for sampling under isoperimetric assumptions). This paper improves the dimension dependence of this sampling problem to (widetilde{O}(d^{1/2}) ). The previous best result for MALA was (widetilde{O}(d) ). This closes the long line of work on the complexity of MALA, and moreover leads to state-of-the-art guarantees for high-accuracy sampling under strong log-concavity and beyond (thanks to the aforementioned reduction). Our starting point is that the complexity of MALA improves to (widetilde{O}(d^{1/2}) ), but only under a warm start (an initialization with constant Rényi divergence w.r.t. π). Previous algorithms for finding a warm start took O(d) time and thus dominated the computational effort of sampling. Our main technical contribution resolves this gap by establishing the first (widetilde{O}(d^{1/2}) ) Rényi mixing rates for the discretized underdamped Langevin diffusion. For this, we develop new differential-privacy-inspired techniques based on Rényi divergences with Orlicz–Wasserstein shifts, which allow us to sidestep longstanding challenges for proving fast convergence of hypocoercive differential equations.

要理解从 (mathbb {R}^d )上的强对数凹密度π进行高精度采样的复杂性,是一个基本问题。事实上,在实践中,诸如 Metropolis-adjusted Langevin 算法(MALA)这样的高精度采样器仍然是事实上的黄金标准;而在理论上,通过近端采样器还原,我们可以理解这种采样器是甚至超越对数凹陷采样的关键(尤其是在等运算假设下的采样)。本文将这个采样问题的维度依赖性提高到了(widetilde{O}(d^{1/2}) )。之前 MALA 的最佳结果是(widetilde{O}(d) )。这结束了关于 MALA 复杂性的长期研究,而且为强对数凹性及更高精度的采样提供了最先进的保证(这要归功于前面提到的缩减)。我们的出发点是,MALA 的复杂度提高到了(widetilde{O}(d^{1/2}) ),但仅限于热启动(具有恒定雷尼发散的π初始化)。以前的暖起点算法需要花费 O(d) 时间,因此在采样的计算量上占优势。我们的主要技术贡献是解决了这一问题,首次建立了 (widetilde{O}(d^{1/2}) )Rényi 混合率。为此,我们开发了新的微分私有性启发技术,该技术基于具有奥立兹-瓦瑟斯坦偏移的雷尼发散,使我们能够避开长期以来证明低胁迫微分方程快速收敛的难题。
{"title":"Faster high-accuracy log-concave sampling via algorithmic warm starts","authors":"Jason M. Altschuler, Sinho Chewi","doi":"10.1145/3653446","DOIUrl":"https://doi.org/10.1145/3653446","url":null,"abstract":"<p>It is a fundamental problem to understand the complexity of high-accuracy sampling from a strongly log-concave density <i>π</i> on (mathbb {R}^d ). Indeed, in practice, high-accuracy samplers such as the Metropolis-adjusted Langevin algorithm (MALA) remain the de facto gold standard; and in theory, via the proximal sampler reduction, it is understood that such samplers are key for sampling even beyond log-concavity (in particular, for sampling under isoperimetric assumptions). This paper improves the dimension dependence of this sampling problem to (widetilde{O}(d^{1/2}) ). The previous best result for MALA was (widetilde{O}(d) ). This closes the long line of work on the complexity of MALA, and moreover leads to state-of-the-art guarantees for high-accuracy sampling under strong log-concavity and beyond (thanks to the aforementioned reduction). Our starting point is that the complexity of MALA improves to (widetilde{O}(d^{1/2}) ), but only under a <i>warm start</i> (an initialization with constant Rényi divergence w.r.t. <i>π</i>). Previous algorithms for finding a warm start took <i>O</i>(<i>d</i>) time and thus dominated the computational effort of sampling. Our main technical contribution resolves this gap by establishing the first (widetilde{O}(d^{1/2}) ) Rényi mixing rates for the discretized underdamped Langevin diffusion. For this, we develop new differential-privacy-inspired techniques based on Rényi divergences with Orlicz–Wasserstein shifts, which allow us to sidestep longstanding challenges for proving fast convergence of hypocoercive differential equations.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR 精细密码分析:密集 k-SUM 和 k-XOR 的严格条件约束
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-03-17 DOI: 10.1145/3653014
Itai Dinur, Nathan Keller, Ohad Klein

An average-case variant of the k-SUM conjecture asserts that finding k numbers that sum to 0 in a list of r random numbers, each of the order rk, cannot be done in much less than rk/2⌉ time. On the other hand, in the dense regime of parameters, where the list contains more numbers and many solutions exist, the complexity of finding one of them can be significantly improved by Wagner’s k-tree algorithm. Such algorithms for k-SUM in the dense regime have many applications, notably in cryptanalysis.

In this paper, assuming the average-case k-SUM conjecture, we prove that known algorithms are essentially optimal for k = 3, 4, 5. For k > 5, we prove the optimality of the k-tree algorithm for a limited range of parameters. We also prove similar results for k-XOR, where the sum is replaced with exclusive or.

Our results are obtained by a self-reduction that, given an instance of k-SUM which has a few solutions, produces from it many instances in the dense regime. We solve each of these instances using the dense k-SUM oracle, and hope that a solution to a dense instance also solves the original problem. We deal with potentially malicious oracles (that repeatedly output correlated useless solutions) by an obfuscation process that adds noise to the dense instances. Using discrete Fourier analysis, we show that the obfuscation eliminates correlations among the oracle’s solutions, even though its inputs are highly correlated.

k-SUM 猜想的一个平均情况变体断言,在一个由 r 个随机数(每个随机数的阶数为 rk)组成的列表中,找到总和为 0 的 k 个数所需的时间不可能少于 r⌈k/2⌉。另一方面,在参数密集的情况下,即列表包含更多数字且存在许多解时,利用瓦格纳的 k 树算法可以显著提高找到其中一个解的复杂度。这种密集机制下的 k-SUM 算法有很多应用,特别是在密码分析中。在本文中,假设存在平均情况下的 k-SUM 猜想,我们证明已知算法在 k = 3、4、5 时基本上是最优的。对于 k > 5,我们证明了 k 树算法在有限参数范围内的最优性。对于 k-XOR,我们也证明了类似的结果,其中的和用排他或代替。我们的结果是通过自还原法获得的,给定一个有少量解的 k-SUM 实例,就能从中产生许多密集机制中的实例。我们使用密集 k-SUM 算法求解每个实例,并希望密集实例的解也能解决原始问题。我们通过在密集实例中添加噪音的混淆过程来处理潜在的恶意神谕(重复输出相关的无用解)。通过离散傅立叶分析,我们证明了混淆过程可以消除神谕解之间的相关性,即使其输入是高度相关的。
{"title":"Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR","authors":"Itai Dinur, Nathan Keller, Ohad Klein","doi":"10.1145/3653014","DOIUrl":"https://doi.org/10.1145/3653014","url":null,"abstract":"<p>An average-case variant of the <i>k</i>-SUM conjecture asserts that finding <i>k</i> numbers that sum to 0 in a list of <i>r</i> random numbers, each of the order <i>r<sup>k</sup></i>, cannot be done in much less than <i>r</i><sup>⌈<i>k</i>/2⌉</sup> time. On the other hand, in the <i>dense regime</i> of parameters, where the list contains more numbers and many solutions exist, the complexity of finding one of them can be significantly improved by Wagner’s <i>k</i>-tree algorithm. Such algorithms for <i>k</i>-SUM in the dense regime have many applications, notably in cryptanalysis. </p><p>In this paper, assuming the average-case <i>k</i>-SUM conjecture, we prove that known algorithms are essentially optimal for <i>k</i> = 3, 4, 5. For <i>k</i> &gt; 5, we prove the optimality of the <i>k</i>-tree algorithm for a limited range of parameters. We also prove similar results for <i>k</i>-XOR, where the sum is replaced with exclusive or. </p><p>Our results are obtained by a self-reduction that, given an instance of <i>k</i>-SUM which has a few solutions, produces from it many instances in the dense regime. We solve each of these instances using the dense <i>k</i>-SUM oracle, and hope that a solution to a dense instance also solves the original problem. We deal with potentially malicious oracles (that repeatedly output correlated useless solutions) by an obfuscation process that adds noise to the dense instances. Using discrete Fourier analysis, we show that the obfuscation eliminates correlations among the oracle’s solutions, even though its inputs are highly correlated.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140147826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twin-width IV: ordered graphs and matrices 双宽 IV:有序图和矩阵
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-03-11 DOI: 10.1145/3651151
Édouard Bonnet, Ugo Giocanti, Patrice Ossona de Mendez, Pierre Simon, Stéphan Thomassé, Szymon Toruńczyk

We establish a list of characterizations of bounded twin-width for hereditary classes of totally ordered graphs: as classes of at most exponential growth studied in enumerative combinatorics, as monadically NIP classes studied in model theory, as classes that do not transduce the class of all graphs studied in finite model theory, and as classes for which model checking first-order logic is fixed-parameter tractable studied in algorithmic graph theory.

This has several consequences. First, it allows us to show that every hereditary class of ordered graphs either has at most exponential growth, or has at least factorial growth. This settles a question first asked by Balogh, Bollobás, and Morris [Eur. J. Comb. ’06] on the growth of hereditary classes of ordered graphs, generalizing the Stanley-Wilf conjecture/Marcus-Tardos theorem. Second, it gives a fixed-parameter approximation algorithm for twin-width on ordered graphs. Third, it yields a full classification of fixed-parameter tractable first-order model checking on hereditary classes of ordered binary structures. Fourth, it provides a model-theoretic characterization of classes with bounded twin-width. Finally, it settles the small conjecture [SODA ’21] in the case of ordered graphs.

我们为完全有序图的遗传类建立了一系列有界孪宽的特征:枚举组合论中研究的指数增长类、模型论中研究的一元 NIP 类、有限模型论中研究的不传递所有图的类,以及算法图论中研究的模型检查一阶逻辑是固定参数可处理的类。这有几个后果。首先,它使我们能够证明,每一类有序图的遗传类要么最多具有指数增长,要么至少具有阶乘增长。这解决了 Balogh、Bollobás 和 Morris [Eur. J. Comb. '06]首次提出的关于有序图遗传类增长的问题,概括了 Stanley-Wilf 猜想/Marcus-Tardos 定理。其次,它给出了有序图上孪宽的固定参数近似算法。第三,它给出了有序二元结构遗传类上固定参数可控一阶模型检查的完整分类。第四,它提供了具有有界孪宽的类的模型理论特征。最后,它解决了有序图情况下的小猜想[SODA '21]。
{"title":"Twin-width IV: ordered graphs and matrices","authors":"Édouard Bonnet, Ugo Giocanti, Patrice Ossona de Mendez, Pierre Simon, Stéphan Thomassé, Szymon Toruńczyk","doi":"10.1145/3651151","DOIUrl":"https://doi.org/10.1145/3651151","url":null,"abstract":"<p>We establish a list of characterizations of bounded twin-width for hereditary classes of totally ordered graphs: as classes of at most exponential growth studied in enumerative combinatorics, as monadically NIP classes studied in model theory, as classes that do not transduce the class of all graphs studied in finite model theory, and as classes for which model checking first-order logic is fixed-parameter tractable studied in algorithmic graph theory. </p><p>This has several consequences. First, it allows us to show that every hereditary class of ordered graphs either has at most exponential growth, or has at least factorial growth. This settles a question first asked by Balogh, Bollobás, and Morris [Eur. J. Comb. ’06] on the growth of hereditary classes of ordered graphs, generalizing the Stanley-Wilf conjecture/Marcus-Tardos theorem. Second, it gives a fixed-parameter approximation algorithm for twin-width on ordered graphs. Third, it yields a full classification of fixed-parameter tractable first-order model checking on hereditary classes of ordered binary structures. Fourth, it provides a model-theoretic characterization of classes with bounded twin-width. Finally, it settles the small conjecture [SODA ’21] in the case of ordered graphs.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140106050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Normalization of Linear Temporal Logic 线性时态逻辑的高效归一化
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-03-06 DOI: 10.1145/3651152
Javier Esparza, Rubén Rubio, Salomon Sickert

In the mid 80s, Lichtenstein, Pnueli, and Zuck proved a classical theorem stating that every formula of Past LTL (the extension of LTL with past operators) is equivalent to a formula of the form (bigwedge _{i=1}^n mathbf {G}mathbf {F} varphi _i vee mathbf {F}mathbf {G} psi _i ), where φi and ψi contain only past operators. Some years later, Chang, Manna, and Pnueli built on this result to derive a similar normal form for LTL. Both normalization procedures have a non-elementary worst-case blow-up, and follow an involved path from formulas to counter-free automata to star-free regular expressions and back to formulas. We improve on both points. We present direct and purely syntactic normalization procedures for LTL, yielding a normal form very similar to the one by Chang, Manna, and Pnueli, that exhibit only a single exponential blow-up. As an application, we derive a simple algorithm to translate LTL into deterministic Rabin automata. The algorithm normalizes the formula, translates it into a special very weak alternating automaton, and applies a simple determinization procedure, valid only for these special automata.

在 80 年代中期,利希滕斯坦、普努埃利和扎克证明了一个经典定理,即过去式 LTL(带有过去算子的 LTL 扩展)的每一个公式都等价于一个形式为 (bigwedge _{i=1}^n mathbf {G}mathbf {F} 的公式。varphi _i (vee) (mathbf {F}mathbf {G}psi _i ),其中 φi 和 ψi 只包含过去算子。几年后,Chang、Manna 和 Pnueli 在此基础上为 LTL 推导出了类似的正则表达式。这两种正则化程序都有非元素的最坏情况爆炸,并遵循从公式到无反自动机到无星正则表达式再回到公式的复杂路径。我们在这两点上都有所改进。我们提出了 LTL 的直接和纯语法规范化程序,产生了与 Chang、Manna 和 Pnueli 的规范化形式非常相似的规范化形式,它只表现出单次指数膨胀。作为一种应用,我们推导出了一种将 LTL 转化为确定性拉宾自动机的简单算法。该算法将公式规范化,将其转化为特殊的极弱交替自动机,并应用仅对这些特殊自动机有效的简单确定化过程。
{"title":"Efficient Normalization of Linear Temporal Logic","authors":"Javier Esparza, Rubén Rubio, Salomon Sickert","doi":"10.1145/3651152","DOIUrl":"https://doi.org/10.1145/3651152","url":null,"abstract":"<p>In the mid 80s, Lichtenstein, Pnueli, and Zuck proved a classical theorem stating that every formula of Past LTL (the extension of LTL with past operators) is equivalent to a formula of the form (bigwedge _{i=1}^n mathbf {G}mathbf {F} varphi _i vee mathbf {F}mathbf {G} psi _i ), where φ<sub><i>i</i></sub> and <i>ψ<sub>i</sub></i> contain only past operators. Some years later, Chang, Manna, and Pnueli built on this result to derive a similar normal form for LTL. Both normalization procedures have a non-elementary worst-case blow-up, and follow an involved path from formulas to counter-free automata to star-free regular expressions and back to formulas. We improve on both points. We present direct and purely syntactic normalization procedures for LTL, yielding a normal form very similar to the one by Chang, Manna, and Pnueli, that exhibit only a single exponential blow-up. As an application, we derive a simple algorithm to translate LTL into deterministic Rabin automata. The algorithm normalizes the formula, translates it into a special very weak alternating automaton, and applies a simple determinization procedure, valid only for these special automata.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140044322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sketching approximability of all finite CSPs 所有有限 CSP 的草图近似性
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-02-29 DOI: 10.1145/3649435
Chi-Ning Chou, Alexander Golovnev, Madhu Sudan, Santhoshini Velusamy

A constraint satisfaction problem (CSP), (mathsf {Max-CSP}(mathcal {F}) ), is specified by a finite set of constraints (mathcal {F} subseteq lbrace [q]^k rightarrow lbrace 0,1rbrace rbrace ) for positive integers q and k. An instance of the problem on n variables is given by m applications of constraints from (mathcal {F} ) to subsequences of the n variables, and the goal is to find an assignment to the variables that satisfies the maximum number of constraints. In the (γ, β)-approximation version of the problem for parameters 0 ≤ β < γ ≤ 1, the goal is to distinguish instances where at least γ fraction of the constraints can be satisfied from instances where at most β fraction of the constraints can be satisfied.

In this work, we consider the approximability of this problem in the context of sketching algorithms and give a dichotomy result. Specifically, for every family (mathcal {F} ) and every β < γ, we show that either a linear sketching algorithm solves the problem in polylogarithmic space, or the problem is not solvable by any sketching algorithm in (o(sqrt {n}) ) space. In particular, we give non-trivial approximation algorithms using polylogarithmic space for infinitely many constraint satisfaction problems.

We also extend previously known lower bounds for general streaming algorithms to a wide variety of problems, and in particular the case of q = k = 2, where we get a dichotomy, and the case when the satisfying assignments of the constraints of (mathcal {F} ) support a distribution on [q]k with uniform marginals.

Prior to this work, other than sporadic examples, the only systematic classes of CSPs that were analyzed considered the setting of Boolean variables q = 2, binary constraints k = 2, singleton families (|mathcal {F}|=1 ) and only considered the setting where constraints are placed on literals rather than variables.

Our positive results show wide applicability of bias-based algorithms used previously by [47] and [41], which we extend to include richer norm estimation algorithms, by giving a systematic way to discover biases. Our negative results combine the Fourier analytic methods of [56], which we extend to a wider class of CSPs, with a rich collection of reductions among communication complexity problems that lie at the heart of the negative results. In particular, previous works used Fourier analysis over the Boolean cube to initiate their results and the results seemed particularly tailored to functions on Boolean literals (i.e., with negations). Our techniques surprisingly allow us to get to general q-ary CSPs without negations by appealing to the same Fourier analytic starting point over Boolean hypercubes.

一个约束满足问题(CSP),((mathsf {Max-CSP}(mathcal {F}) ),是由一个有限的约束集合(((mathcal {F} subseteq lbrace [q]^k rightarrow lbrace 0,1 rbrace )指定的。关于 n 个变量的问题实例是由(mathcal {F} )中的 m 个约束应用到 n 个变量的子序列上给出的,目标是找到一个满足最大约束数的变量赋值。在参数为 0 ≤ β < γ ≤ 1 的 (γ, β)-近似版本问题中,目标是区分至少有 γ 部分约束条件可以满足的实例和最多有β 部分约束条件可以满足的实例。在这项工作中,我们在草图算法的背景下考虑了这个问题的近似性,并给出了一个二分法结果。具体来说,对于每一个族 (mathcal {F} )和每一个 β < γ,我们证明了要么线性草图算法可以在多对数空间中解决这个问题,要么这个问题在 (o(sqrt {n}) )空间中无法被任何草图算法解决。特别是,我们给出了使用多对数空间解决无限多约束满足问题的非难近似算法。我们还将之前已知的一般流算法的下界扩展到各种问题,特别是 q = k = 2 的情况,在这种情况下我们得到了二分法,以及当 (mathcal {F}) 约束的满足赋值支持[q]k 上具有均匀边际的分布时的情况。在这项工作之前,除了零星的例子之外,所分析的 CSP 系统类只考虑了布尔变量 q = 2、二元约束 k = 2、单子族 (|mathcal {F}|=1 )的情况,而且只考虑了约束放在字面而不是变量上的情况。我们的正面结果表明,[47] 和 [41] 以前使用的基于偏差的算法具有广泛的适用性,我们通过给出发现偏差的系统方法,将其扩展到包括更丰富的规范估计算法。我们的负面结果结合了 [56] 的傅立叶分析方法(我们将其扩展到了更广泛的 CSP 类别)和丰富的通信复杂性问题还原集合,这正是负面结果的核心所在。特别是,以前的研究使用布尔立方上的傅立叶分析来启动他们的结果,而且这些结果似乎特别适合布尔字面(即带否定)上的函数。令人惊奇的是,我们的技术让我们可以通过对布尔超立方的相同傅里叶分析起点,得到不带否定词的一般 qary CSP。
{"title":"Sketching approximability of all finite CSPs","authors":"Chi-Ning Chou, Alexander Golovnev, Madhu Sudan, Santhoshini Velusamy","doi":"10.1145/3649435","DOIUrl":"https://doi.org/10.1145/3649435","url":null,"abstract":"<p>A constraint satisfaction problem (CSP), (mathsf {Max-CSP}(mathcal {F}) ), is specified by a finite set of constraints (mathcal {F} subseteq lbrace [q]^k rightarrow lbrace 0,1rbrace rbrace ) for positive integers <i>q</i> and <i>k</i>. An instance of the problem on <i>n</i> variables is given by <i>m</i> applications of constraints from (mathcal {F} ) to subsequences of the <i>n</i> variables, and the goal is to find an assignment to the variables that satisfies the maximum number of constraints. In the (<i>γ</i>, <i>β</i>)-approximation version of the problem for parameters 0 ≤ <i>β</i> &lt; <i>γ</i> ≤ 1, the goal is to distinguish instances where at least <i>γ</i> fraction of the constraints can be satisfied from instances where at most <i>β</i> fraction of the constraints can be satisfied. </p><p>In this work, we consider the approximability of this problem in the context of sketching algorithms and give a dichotomy result. Specifically, for every family (mathcal {F} ) and every <i>β</i> &lt; <i>γ</i>, we show that either a linear sketching algorithm solves the problem in polylogarithmic space, or the problem is not solvable by any sketching algorithm in (o(sqrt {n}) ) space. In particular, we give non-trivial approximation algorithms using polylogarithmic space for infinitely many constraint satisfaction problems. </p><p>We also extend previously known lower bounds for general streaming algorithms to a wide variety of problems, and in particular the case of <i>q</i> = <i>k</i> = 2, where we get a dichotomy, and the case when the satisfying assignments of the constraints of (mathcal {F} ) support a distribution on [<i>q</i>]<sup><i>k</i></sup> with uniform marginals. </p><p>Prior to this work, other than sporadic examples, the only systematic classes of CSPs that were analyzed considered the setting of Boolean variables <i>q</i> = 2, binary constraints <i>k</i> = 2, singleton families (|mathcal {F}|=1 ) and only considered the setting where constraints are placed on literals rather than variables. </p><p>Our positive results show wide applicability of bias-based algorithms used previously by [47] and [41], which we extend to include richer norm estimation algorithms, by giving a systematic way to discover biases. Our negative results combine the Fourier analytic methods of [56], which we extend to a wider class of CSPs, with a rich collection of reductions among communication complexity problems that lie at the heart of the negative results. In particular, previous works used Fourier analysis over the Boolean cube to initiate their results and the results seemed particularly tailored to functions on Boolean literals (i.e., with negations). Our techniques surprisingly allow us to get to general <i>q</i>-ary CSPs without negations by appealing to the same Fourier analytic starting point over Boolean hypercubes.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140003885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Choiceless Polynomial Time with Witnessed Symmetric Choice 带见证对称选择的无选择多项式时间
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-02-13 DOI: 10.1145/3648104
Moritz Lichter, Pascal Schweitzer

We extend Choiceless Polynomial Time (CPT), the currently only remaining promising candidate in the quest for a logic capturing Ptime, so that this extended logic has the following property: for every class of structures for which isomorphism is definable, the logic automatically captures Ptime.

For the construction of this logic we extend CPT by a witnessed symmetric choice operator. This operator allows for choices from definable orbits. But, to ensure polynomial-time evaluation, automorphisms have to be provided to certify that the choice set is indeed an orbit.

We argue that, in this logic, definable isomorphism implies definable canonization. Thereby, our construction removes the non-trivial step of extending isomorphism definability results to canonization. This step was a part of proofs that show that CPT or other logics capture Ptime on a particular class of structures. The step typically required substantial extra effort.

我们扩展了无选择多项式时间(CPT),它是目前唯一有望捕捉 Ptime 的逻辑,因此这个扩展逻辑具有以下特性:对于每一类可定义同构的结构,该逻辑都能自动捕捉 Ptime。为了构建这个逻辑,我们通过一个有见证的对称选择算子来扩展 CPT。这个算子允许从可定义的轨道中进行选择。但是,为了确保多项式时间评估,必须提供自动形态来证明选择集确实是一个轨道。我们认为,在这种逻辑中,可定义同构意味着可定义规范化。因此,我们的构造消除了将同构可定义性结果扩展到规范化的非难步骤。这一步是证明 CPT 或其他逻辑捕捉特定结构类别的 Ptime 的一部分。这一步骤通常需要大量的额外工作。
{"title":"Choiceless Polynomial Time with Witnessed Symmetric Choice","authors":"Moritz Lichter, Pascal Schweitzer","doi":"10.1145/3648104","DOIUrl":"https://doi.org/10.1145/3648104","url":null,"abstract":"<p>We extend Choiceless Polynomial Time (CPT), the currently only remaining promising candidate in the quest for a logic capturing <span>Ptime</span>, so that this extended logic has the following property: for every class of structures for which isomorphism is definable, the logic automatically captures <span>Ptime</span>. </p><p>For the construction of this logic we extend CPT by a witnessed symmetric choice operator. This operator allows for choices from definable orbits. But, to ensure polynomial-time evaluation, automorphisms have to be provided to certify that the choice set is indeed an orbit. </p><p>We argue that, in this logic, definable isomorphism implies definable canonization. Thereby, our construction removes the non-trivial step of extending isomorphism definability results to canonization. This step was a part of proofs that show that CPT or other logics capture <span>Ptime</span> on a particular class of structures. The step typically required substantial extra effort.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139771267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convergence of Datalog over (Pre-) Semirings 数据模型在(前)语义上的收敛性
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-01-30 DOI: 10.1145/3643027
Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu, Yisu Remy Wang

Recursive queries have been traditionally studied in the framework of datalog, a language that restricts recursion to monotone queries over sets, which is guaranteed to converge in polynomial time in the size of the input. But modern big data systems require recursive computations beyond the Boolean space. In this paper we study the convergence of datalog when it is interpreted over an arbitrary semiring. We consider an ordered semiring, define the semantics of a datalog program as a least fixpoint in this semiring, and study the number of steps required to reach that fixpoint, if ever. We identify algebraic properties of the semiring that correspond to certain convergence properties of datalog programs. Finally, we describe a class of ordered semirings on which one can use the semi-naïve evaluation algorithm on any datalog program.

递归查询传统上是在 datalog 框架下研究的,这种语言将递归限制在对集合的单调查询上,保证在输入大小的多项式时间内收敛。但现代大数据系统需要超越布尔空间的递归计算。在本文中,我们研究了在任意语义上解释数据模型时的收敛性。我们考虑一个有序配系,将 datalog 程序的语义定义为该配系中的一个最小定点,并研究达到该定点所需的步骤数(如果有的话)。我们确定了与 datalog 程序的某些收敛特性相对应的语义的代数特性。最后,我们描述了一类有序语义,在这类语义上,我们可以对任何 datalog 程序使用半幼稚求值算法。
{"title":"Convergence of Datalog over (Pre-) Semirings","authors":"Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu, Yisu Remy Wang","doi":"10.1145/3643027","DOIUrl":"https://doi.org/10.1145/3643027","url":null,"abstract":"<p>Recursive queries have been traditionally studied in the framework of datalog, a language that restricts recursion to monotone queries over sets, which is guaranteed to converge in polynomial time in the size of the input. But modern big data systems require recursive computations beyond the Boolean space. In this paper we study the convergence of datalog when it is interpreted over an arbitrary semiring. We consider an ordered semiring, define the semantics of a datalog program as a least fixpoint in this semiring, and study the number of steps required to reach that fixpoint, if ever. We identify algebraic properties of the semiring that correspond to certain convergence properties of datalog programs. Finally, we describe a class of ordered semirings on which one can use the semi-naïve evaluation algorithm on any datalog program.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compositional Theory of Linearizability 线性化组合理论
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2024-01-27 DOI: 10.1145/3643668
Arthur Oliveira Vale, Zhong Shao, Yixuan Chen

Compositionality is at the core of programming languages research and has become an important goal toward scalable verification of large systems. Despite that, there is no compositional account of linearizability, the gold standard of correctness for concurrent objects.

In this paper, we develop a compositional semantics for linearizable concurrent objects. We start by showcasing a common issue, which is independent of linearizability, in the construction of compositional models of concurrent computation: interaction with the neutral element for composition can lead to emergent behaviors, a hindrance to compositionality. Category theory provides a solution for the issue in the form of the Karoubi envelope. Surprisingly, and this is the main discovery of our work, this abstract construction is deeply related to linearizability and leads to a novel formulation of it. Notably, this new formulation neither relies on atomicity nor directly upon happens-before ordering and is only possible because of compositionality, revealing that linearizability and compositionality are intrinsically related to each other.

We use this new, and compositional, understanding of linearizability to revisit much of the theory of linearizability, providing novel, simple, algebraic proofs of the locality property and of an analogue of the equivalence with observational refinement. We show our techniques can be used in practice by connecting our semantics with a simple program logic that is nonetheless sound concerning this generalized linearizability.

可组合性是编程语言研究的核心,也是大型系统可扩展验证的重要目标。尽管如此,目前还没有关于可线性化(并发对象正确性的黄金标准)的组合解释。在本文中,我们为可线性化并发对象开发了一种组合语义。在构建并发计算的组合模型时,我们首先展示了一个与线性化无关的常见问题:与用于组合的中性元素的交互会导致突发行为,从而阻碍组合性的实现。范畴理论以卡鲁比包络的形式为这一问题提供了解决方案。令人惊奇的是,这也是我们工作的主要发现,这种抽象结构与线性化有着深刻的联系,并导致了对线性化的一种新表述。值得注意的是,这种新表述既不依赖于原子性,也不直接依赖于 "发生在先 "排序,而只是因为组成性才成为可能,这揭示了线性化和组成性之间的内在联系。我们利用这种对可线性化的新的和组成性的理解,重新审视了可线性化的大部分理论,提供了新颖、简单和代数证明,证明了局域性属性和观察细化等价性的类似物。我们将我们的语义与一个简单的程序逻辑连接起来,证明我们的技术可以用于实践,而这个简单的程序逻辑在这种广义线性化方面仍然是合理的。
{"title":"A Compositional Theory of Linearizability","authors":"Arthur Oliveira Vale, Zhong Shao, Yixuan Chen","doi":"10.1145/3643668","DOIUrl":"https://doi.org/10.1145/3643668","url":null,"abstract":"<p>Compositionality is at the core of programming languages research and has become an important goal toward scalable verification of large systems. Despite that, there is no compositional account of <i>linearizability</i>, the gold standard of correctness for concurrent objects. </p><p>In this paper, we develop a compositional semantics for linearizable concurrent objects. We start by showcasing a common issue, which is independent of linearizability, in the construction of compositional models of concurrent computation: interaction with the neutral element for composition can lead to emergent behaviors, a hindrance to compositionality. Category theory provides a solution for the issue in the form of the Karoubi envelope. Surprisingly, and this is the main discovery of our work, this abstract construction is deeply related to linearizability and leads to a novel formulation of it. Notably, this new formulation neither relies on atomicity nor directly upon happens-before ordering and is only possible <i>because</i> of compositionality, revealing that linearizability and compositionality are intrinsically related to each other. </p><p>We use this new, and compositional, understanding of linearizability to revisit much of the theory of linearizability, providing novel, simple, algebraic proofs of the <i>locality</i> property and of an analogue of the equivalence with <i>observational refinement</i>. We show our techniques can be used in practice by connecting our semantics with a simple program logic that is nonetheless sound concerning this generalized linearizability.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of the ACM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1