首页 > 最新文献

Journal of the ACM最新文献

英文 中文
A New Algorithm for Euclidean Shortest Paths in the Plane 平面上欧氏最短路径的一种新算法
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-03-21 DOI: https://dl.acm.org/doi/10.1145/3580475
Haitao Wang

Given a set of pairwise disjoint polygonal obstacles in the plane, finding an obstacle-avoiding Euclidean shortest path between two points is a classical problem in computational geometry and has been studied extensively. Previously, Hershberger and Suri (in SIAM Journal on Computing, 1999) gave an algorithm of O(n log n) time and O(n log n) space, where n is the total number of vertices of all obstacles. Recently, by modifying Hershberger and Suri’s algorithm, Wang (in SODA’21) reduced the space to O(n) while the runtime of the algorithm is still O(n log n). In this article, we present a new algorithm of O(n+h log h) time and O(n) space, provided that a triangulation of the free space is given, where h is the number of obstacles. The algorithm is better than the previous work when h is relatively small. Our algorithm builds a shortest path map for a source point s so that given any query point t, the shortest path length from s to t can be computed in O(log n) time and a shortest s-t path can be produced in additional time linear in the number of edges of the path.

给定平面上一组两两不相交的多边形障碍物,求两点之间避障的欧氏最短路径是计算几何中的一个经典问题,已经得到了广泛的研究。此前,Hershberger和Suri(在SIAM Journal on Computing, 1999)给出了O(n log n)时间和O(n log n)空间的算法,其中n为所有障碍物顶点的总数。最近,Wang(在SODA ' 21)通过修改Hershberger和Suri的算法,将空间减少到O(n),而算法的运行时间仍然是O(n log n)。在本文中,我们提出了一个O(n+h log h)时间和O(n)空间的新算法,假设给出了自由空间的三角划分,其中h为障碍物的数量。当h相对较小时,算法优于之前的工作。我们的算法为源点s建立了一个最短路径映射,以便给定任何查询点t,从s到t的最短路径长度可以在O(log n)时间内计算出来,并且最短的s-t路径可以在路径边数线性的额外时间内产生。
{"title":"A New Algorithm for Euclidean Shortest Paths in the Plane","authors":"Haitao Wang","doi":"https://dl.acm.org/doi/10.1145/3580475","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3580475","url":null,"abstract":"<p>Given a set of pairwise disjoint polygonal obstacles in the plane, finding an obstacle-avoiding Euclidean shortest path between two points is a classical problem in computational geometry and has been studied extensively. Previously, Hershberger and Suri (in <i>SIAM Journal on Computing</i>, 1999) gave an algorithm of <i>O(n</i> log <i>n</i>) time and <i>O(n</i> log <i>n</i>) space, where <i>n</i> is the total number of vertices of all obstacles. Recently, by modifying Hershberger and Suri’s algorithm, Wang (in SODA’21) reduced the space to <i>O(n)</i> while the runtime of the algorithm is still <i>O(n</i> log <i>n</i>). In this article, we present a new algorithm of <i>O(n+h</i> log <i>h</i>) time and <i>O(n)</i> space, provided that a triangulation of the free space is given, where <i>h</i> is the number of obstacles. The algorithm is better than the previous work when <i>h</i> is relatively small. Our algorithm builds a shortest path map for a source point <i>s</i> so that given any query point <i>t</i>, the shortest path length from <i>s</i> to <i>t</i> can be computed in <i>O</i>(log <i>n</i>) time and a shortest <i>s</i>-<i>t</i> path can be produced in additional time linear in the number of edges of the path.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Price of Anarchy of Strategic Queuing Systems 策略排队系统混乱的代价
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-03-17 DOI: 10.1145/3587250
J. Gaitonde, É. Tardos
Bounding the price of anarchy, which quantifies the damage to social welfare due to selfish behavior of the participants, has been an important area of research in algorithmic game theory. Classical work on such bounds in repeated games makes the strong assumption that the subsequent rounds of the repeated games are independent beyond any influence on play from past history. This work studies such bounds in environments that themselves change due to the actions of the agents. Concretely, we consider this problem in discrete-time queuing systems, where competitive queues try to get their packets served. In this model, a queue gets to send a packet at each step to one of the servers, which will attempt to serve the oldest arriving packet, and unprocessed packets are returned to each queue. We model this as a repeated game where queues compete for the capacity of the servers, but where the state of the game evolves as the length of each queue varies. We analyze this queuing system from multiple perspectives. As a baseline measure, we first establish precise conditions on the queuing arrival rates and service capacities that ensure all packets clear efficiently under centralized coordination. We then show that if queues strategically choose servers according to independent and stationary distributions, the system remains stable provided it would be stable under coordination with arrival rates scaled up by a factor of just (frac{e}{e-1}) . Finally, we extend these results to no-regret learning dynamics: if queues use learning algorithms satisfying the no-regret property to choose servers, then the requisite factor increases to 2, and both of these bounds are tight. Both of these results require new probabilistic techniques compared to the classical price of anarchy literature and show that in such settings, no-regret learning can exhibit efficiency loss due to myopia.
限制无政府状态的代价是量化参与者的自私行为对社会福利的损害,一直是算法博弈论的一个重要研究领域。关于重复博弈中这种界限的经典研究强有力地假设,重复博弈的后续回合是独立的,不受过去历史的任何影响。这项工作研究了环境中的边界,这些边界本身由于代理的行为而改变。具体地说,我们在离散时间排队系统中考虑这个问题,其中竞争队列试图让它们的数据包得到服务。在此模型中,队列在每一步向其中一个服务器发送数据包,该服务器将尝试为最早到达的数据包提供服务,而未处理的数据包将返回给每个队列。我们将其建模为一个重复的游戏,其中队列竞争服务器的容量,但随着每个队列的长度变化,游戏的状态也会发生变化。我们从多个角度来分析这个排队系统。作为基线度量,我们首先建立了精确的排队到达率和服务能力条件,以确保所有数据包在集中协调下有效清除。然后,我们证明,如果队列根据独立和平稳的分布策略性地选择服务器,系统保持稳定,只要它在到达率以(frac{e}{e-1})的比例扩大的协调下保持稳定。最后,我们将这些结果扩展到无遗憾学习动力学:如果队列使用满足无遗憾属性的学习算法来选择服务器,则必要因子增加到2,并且这两个边界都是紧的。这两个结果都需要新的概率技术,而不是经典的无政府主义文献,并表明在这种情况下,无后悔学习可能由于近视而表现出效率损失。
{"title":"The Price of Anarchy of Strategic Queuing Systems","authors":"J. Gaitonde, É. Tardos","doi":"10.1145/3587250","DOIUrl":"https://doi.org/10.1145/3587250","url":null,"abstract":"Bounding the price of anarchy, which quantifies the damage to social welfare due to selfish behavior of the participants, has been an important area of research in algorithmic game theory. Classical work on such bounds in repeated games makes the strong assumption that the subsequent rounds of the repeated games are independent beyond any influence on play from past history. This work studies such bounds in environments that themselves change due to the actions of the agents. Concretely, we consider this problem in discrete-time queuing systems, where competitive queues try to get their packets served. In this model, a queue gets to send a packet at each step to one of the servers, which will attempt to serve the oldest arriving packet, and unprocessed packets are returned to each queue. We model this as a repeated game where queues compete for the capacity of the servers, but where the state of the game evolves as the length of each queue varies. We analyze this queuing system from multiple perspectives. As a baseline measure, we first establish precise conditions on the queuing arrival rates and service capacities that ensure all packets clear efficiently under centralized coordination. We then show that if queues strategically choose servers according to independent and stationary distributions, the system remains stable provided it would be stable under coordination with arrival rates scaled up by a factor of just (frac{e}{e-1}) . Finally, we extend these results to no-regret learning dynamics: if queues use learning algorithms satisfying the no-regret property to choose servers, then the requisite factor increases to 2, and both of these bounds are tight. Both of these results require new probabilistic techniques compared to the classical price of anarchy literature and show that in such settings, no-regret learning can exhibit efficiency loss due to myopia.","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88165109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learning Equilibria in Matching Markets with Bandit Feedback 强盗反馈下匹配市场的学习均衡
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-02-16 DOI: 10.1145/3583681
Meena Jagadeesan, Alexander Wei, Yixin Wang, Michael I. Jordan, Jacob Steinhardt
Large-scale, two-sided matching platforms must find market outcomes that align with user preferences while simultaneously learning these preferences from data. Classical notions of stability (Gale and Shapley, 1962; Shapley and Shubik, 1971) are, unfortunately, of limited value in the learning setting, given that preferences are inherently uncertain and destabilizing while they are being learned. To bridge this gap, we develop a framework and algorithms for learning stable market outcomes under uncertainty. Our primary setting is matching with transferable utilities, where the platform both matches agents and sets monetary transfers between them. We design an incentive-aware learning objective that captures the distance of a market outcome from equilibrium. Using this objective, we analyze the complexity of learning as a function of preference structure, casting learning as a stochastic multi-armed bandit problem. Algorithmically, we show that “optimism in the face of uncertainty,” the principle underlying many bandit algorithms, applies to a primal-dual formulation of matching with transfers and leads to near-optimal regret bounds. Our work takes a first step toward elucidating when and how stable matchings arise in large, data-driven marketplaces.
大规模的双边匹配平台必须找到符合用户偏好的市场结果,同时从数据中学习这些偏好。稳定性的经典概念(Gale and Shapley, 1962;Shapley和Shubik, 1971)不幸的是,在学习环境中价值有限,因为偏好在学习过程中具有固有的不确定性和不稳定性。为了弥补这一差距,我们开发了一个框架和算法来学习不确定性下的稳定市场结果。我们的主要设置是与可转让的公用事业相匹配,平台既匹配代理,又设置他们之间的货币转移。我们设计了一个激励意识学习目标,捕捉市场结果与均衡的距离。基于这一目标,我们分析了学习的复杂性作为偏好结构的函数,将学习作为一个随机的多臂强盗问题。在算法上,我们展示了“面对不确定性的乐观主义”,这是许多强盗算法的基本原则,适用于与转移匹配的原始对偶公式,并导致接近最优的后悔界限。我们的工作向阐明稳定匹配何时以及如何在大型数据驱动的市场中出现迈出了第一步。
{"title":"Learning Equilibria in Matching Markets with Bandit Feedback","authors":"Meena Jagadeesan, Alexander Wei, Yixin Wang, Michael I. Jordan, Jacob Steinhardt","doi":"10.1145/3583681","DOIUrl":"https://doi.org/10.1145/3583681","url":null,"abstract":"Large-scale, two-sided matching platforms must find market outcomes that align with user preferences while simultaneously learning these preferences from data. Classical notions of stability (Gale and Shapley, 1962; Shapley and Shubik, 1971) are, unfortunately, of limited value in the learning setting, given that preferences are inherently uncertain and destabilizing while they are being learned. To bridge this gap, we develop a framework and algorithms for learning stable market outcomes under uncertainty. Our primary setting is matching with transferable utilities, where the platform both matches agents and sets monetary transfers between them. We design an incentive-aware learning objective that captures the distance of a market outcome from equilibrium. Using this objective, we analyze the complexity of learning as a function of preference structure, casting learning as a stochastic multi-armed bandit problem. Algorithmically, we show that “optimism in the face of uncertainty,” the principle underlying many bandit algorithms, applies to a primal-dual formulation of matching with transfers and leads to near-optimal regret bounds. Our work takes a first step toward elucidating when and how stable matchings arise in large, data-driven marketplaces.","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83992234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robustly Learning General Mixtures of Gaussians 鲁棒学习一般高斯混合
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-02-15 DOI: 10.1145/3583680
Allen Liu, Ankur Moitra
This work represents a natural coalescence of two important lines of work — learning mixtures of Gaussians and algorithmic robust statistics. In particular, we give the first provably robust algorithm for learning mixtures of any constant number of Gaussians. We require only mild assumptions on the mixing weights and that the total variation distance between components is bounded away from zero. At the heart of our algorithm is a new method for proving a type of dimension-independent polynomial identifiability — which we call robust identifiability — through applying a carefully chosen sequence of differential operations to certain generating functions that not only encode the parameters we would like to learn but also the system of polynomial equations we would like to solve. We show how the symbolic identities we derive can be directly used to analyze a natural sum-of-squares relaxation.
这项工作代表了两条重要工作线的自然结合-高斯和算法鲁棒统计的学习混合。特别地,我们给出了第一个可证明的鲁棒算法,用于学习任意常数高斯分布的混合物。我们只需要对混合权值进行温和的假设,并且各分量之间的总变化距离有界远离零。我们算法的核心是一种新方法,用于证明一种与维无关的多项式可辨识性——我们称之为鲁棒可辨识性——通过对某些生成函数应用精心选择的微分运算序列,这些函数不仅编码了我们想要学习的参数,而且编码了我们想要求解的多项式方程系统。我们展示了我们推导的符号恒等式如何直接用于分析自然的平方和松弛。
{"title":"Robustly Learning General Mixtures of Gaussians","authors":"Allen Liu, Ankur Moitra","doi":"10.1145/3583680","DOIUrl":"https://doi.org/10.1145/3583680","url":null,"abstract":"This work represents a natural coalescence of two important lines of work — learning mixtures of Gaussians and algorithmic robust statistics. In particular, we give the first provably robust algorithm for learning mixtures of any constant number of Gaussians. We require only mild assumptions on the mixing weights and that the total variation distance between components is bounded away from zero. At the heart of our algorithm is a new method for proving a type of dimension-independent polynomial identifiability — which we call robust identifiability — through applying a carefully chosen sequence of differential operations to certain generating functions that not only encode the parameters we would like to learn but also the system of polynomial equations we would like to solve. We show how the symbolic identities we derive can be directly used to analyze a natural sum-of-squares relaxation.","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79878742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Correctness and Incorrectness Program Logic 正确和不正确的程序逻辑
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-02-06 DOI: 10.1145/3582267
R. Bruni, R. Giacobazzi, R. Gori, Francesco Ranzato
Abstract interpretation is a well-known and extensively used method to extract over-approximate program invariants by a sound program analysis algorithm. Soundness means that no program errors are lost and it is, in principle, guaranteed by construction. Completeness means that the abstract interpreter reports no false alarms for all possible inputs, but this is extremely rare because it needs a very precise analysis. We introduce a weaker notion of completeness, called local completeness, which requires that no false alarms are produced only relatively to some fixed program inputs. Based on this idea, we introduce a program logic, called Local Completeness Logic for an abstract domain A, for proving both the correctness and incorrectness of program specifications. Our proof system, which is parameterized by an abstract domain A, combines over- and under-approximating reasoning. In a provable triple ⊦A [p] 𝖼 [q], 𝖼 is a program, q is an under-approximation of the strongest post-condition of 𝖼 on input p such that their abstractions in A coincide. This means that q is never too coarse, namely, under some mild assumptions, the abstract interpretation of 𝖼 does not yield false alarms for the input p iff q has no alarm. Therefore, proving ⊦A [p] 𝖼 [q] not only ensures that all the alarms raised in q are true ones, but also that if q does not raise alarms, then 𝖼 is correct. We also prove that if A is the straightforward abstraction making all program properties equivalent, then our program logic coincides with O’Hearn’s incorrectness logic, while for any other abstraction, contrary to the case of incorrectness logic, our logic can also establish program correctness.
摘要解释是一种众所周知的、广泛使用的方法,它通过一种完善的程序分析算法来提取过近似的程序不变量。健全性意味着不会丢失任何程序错误,原则上,它是由构造保证的。完整性意味着抽象解释器不会对所有可能的输入报告错误警报,但这种情况极为罕见,因为它需要非常精确的分析。我们引入了一个较弱的完整性概念,称为局部完整性,它要求仅相对于某些固定的程序输入不产生假警报。基于这一思想,我们引入了一种程序逻辑,称为抽象域a的局部完备逻辑,用于证明程序规范的正确性和不正确性。我们的证明系统由抽象域A参数化,结合了过逼近和欠逼近推理。在可证明三重体⊦a [p]𝖼[q]中,𝖼是一个程序,q是输入p上最强后置条件𝖼的一个低近似值,使得它们在a中的抽象重合。这意味着q永远不会太粗糙,也就是说,在一些温和的假设下,如果q没有报警,对𝖼的抽象解释不会对输入p产生假警报。因此,证明⊦A [p]𝖼[q]不仅保证了在q中发出的所有警报都是真实的,而且如果q没有发出警报,则𝖼是正确的。我们还证明,如果A是使所有程序属性相等的直接抽象,那么我们的程序逻辑与O 'Hearn的不正确逻辑是一致的,而对于任何其他抽象,与不正确逻辑的情况相反,我们的逻辑也可以建立程序正确性。
{"title":"A Correctness and Incorrectness Program Logic","authors":"R. Bruni, R. Giacobazzi, R. Gori, Francesco Ranzato","doi":"10.1145/3582267","DOIUrl":"https://doi.org/10.1145/3582267","url":null,"abstract":"Abstract interpretation is a well-known and extensively used method to extract over-approximate program invariants by a sound program analysis algorithm. Soundness means that no program errors are lost and it is, in principle, guaranteed by construction. Completeness means that the abstract interpreter reports no false alarms for all possible inputs, but this is extremely rare because it needs a very precise analysis. We introduce a weaker notion of completeness, called local completeness, which requires that no false alarms are produced only relatively to some fixed program inputs. Based on this idea, we introduce a program logic, called Local Completeness Logic for an abstract domain A, for proving both the correctness and incorrectness of program specifications. Our proof system, which is parameterized by an abstract domain A, combines over- and under-approximating reasoning. In a provable triple ⊦A [p] 𝖼 [q], 𝖼 is a program, q is an under-approximation of the strongest post-condition of 𝖼 on input p such that their abstractions in A coincide. This means that q is never too coarse, namely, under some mild assumptions, the abstract interpretation of 𝖼 does not yield false alarms for the input p iff q has no alarm. Therefore, proving ⊦A [p] 𝖼 [q] not only ensures that all the alarms raised in q are true ones, but also that if q does not raise alarms, then 𝖼 is correct. We also prove that if A is the straightforward abstraction making all program properties equivalent, then our program logic coincides with O’Hearn’s incorrectness logic, while for any other abstraction, contrary to the case of incorrectness logic, our logic can also establish program correctness.","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73583749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Need for Large Quantum Depth 论对大量子深度的需求
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-01-16 DOI: https://dl.acm.org/doi/10.1145/3570637
Nai-Hui Chia, Kai-Min Chung, Ching-Yi Lai

Near-term quantum computers are likely to have small depths due to short coherence time and noisy gates. A natural approach to leverage these quantum computers is interleaving them with classical computers. Understanding the capabilities and limits of this hybrid approach is an essential topic in quantum computation. Most notably, the quantum Fourier transform can be implemented by a hybrid of logarithmic-depth quantum circuits and a classical polynomial-time algorithm. Therefore, it seems possible that quantum polylogarithmic depth is as powerful as quantum polynomial depth in the presence of classical computation. Indeed, Jozsa conjectured that “Any quantum polynomial-time algorithm can be implemented with only O(log n) quantum depth interspersed with polynomial-time classical computations.” This can be formalized as asserting the equivalence of BQP and “BQNCBPP.” However, Aaronson conjectured that “there exists an oracle separation between BQP and BPPBQNC.BQNCBPP and BPPBQNC are two natural and seemingly incomparable ways of hybrid classical-quantum computation.

In this work, we manage to prove Aaronson’s conjecture and in the meantime prove that Jozsa’s conjecture, relative to an oracle, is false. In fact, we prove a stronger statement that for any depth parameter d, there exists an oracle that separates quantum depth d and 2d+1 in the presence of classical computation. Thus, our results show that relative to oracles, doubling the quantum circuit depth does make the hybrid model more powerful, and this cannot be traded by classical computation.

由于相干时间短和噪声门,近期量子计算机可能具有较小的深度。利用这些量子计算机的一种自然方法是将它们与经典计算机交叉使用。理解这种混合方法的能力和局限性是量子计算中的一个重要主题。最值得注意的是,量子傅立叶变换可以通过对数深度量子电路和经典多项式时间算法的混合来实现。因此,在经典计算的存在下,量子多对数深度似乎有可能与量子多项式深度一样强大。事实上,Jozsa推测“任何量子多项式时间算法都可以通过O(log n)量子深度与多项式时间经典计算的穿插来实现。”这可以形式化为断言BQP和“BQNCBPP”的等价性。然而,Aaronson推测“在BQP和BPPBQNC之间存在oracle分离”。BQNCBPP和BPPBQNC是两种自然的、看似无可比拟的混合经典量子计算方式。在这项工作中,我们设法证明了Aaronson的猜想,同时证明了Jozsa的猜想,相对于神谕来说,是错误的。事实上,我们证明了一个更强的命题,即对于任何深度参数d,在经典计算的存在下,存在一个将量子深度d和2d+1分开的预言。因此,我们的结果表明,相对于预言机,加倍量子电路深度确实使混合模型更强大,这是经典计算无法替代的。
{"title":"On the Need for Large Quantum Depth","authors":"Nai-Hui Chia, Kai-Min Chung, Ching-Yi Lai","doi":"https://dl.acm.org/doi/10.1145/3570637","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3570637","url":null,"abstract":"<p>Near-term quantum computers are likely to have small depths due to short coherence time and noisy gates. A natural approach to leverage these quantum computers is interleaving them with classical computers. Understanding the capabilities and limits of this hybrid approach is an essential topic in quantum computation. Most notably, the quantum Fourier transform can be implemented by a hybrid of logarithmic-depth quantum circuits and a classical polynomial-time algorithm. Therefore, it seems possible that quantum polylogarithmic depth is as powerful as quantum polynomial depth in the presence of classical computation. Indeed, Jozsa conjectured that “<i>Any quantum polynomial-time algorithm can be implemented with only <i>O</i>(log <i>n</i>) quantum depth interspersed with polynomial-time classical computations.</i>” This can be formalized as asserting the equivalence of <monospace>BQP</monospace> and “<monospace>BQNC<sup>BPP</sup></monospace>.” However, Aaronson conjectured that “<i>there exists an oracle separation between <monospace>BQP</monospace> and <monospace>BPP<sup>BQNC</sup></monospace>.</i>” <monospace>BQNC<sup>BPP</sup></monospace> and <monospace>BPP<sup>BQNC</sup></monospace> are two natural and seemingly incomparable ways of hybrid classical-quantum computation.</p><p>In this work, we manage to prove Aaronson’s conjecture and in the meantime prove that Jozsa’s conjecture, relative to an oracle, is false. In fact, we prove a stronger statement that for any depth parameter <i>d</i>, there exists an oracle that separates quantum depth <i>d</i> and 2<i>d</i>+1 in the presence of classical computation. Thus, our results show that relative to oracles, doubling the quantum circuit depth does make the hybrid model more powerful, and this cannot be traded by classical computation.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex Hulls of Random Order Types 随机顺序类型的凸包
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-01-16 DOI: https://dl.acm.org/doi/10.1145/3570636
Xavier Goaoc, Emo Welzl

We establish the following two main results on order types of points in general position in the plane (realizable simple planar order types, realizable uniform acyclic oriented matroids of rank 3):

(a)

The number of extreme points in an n-point order type, chosen uniformly at random from all such order types, is on average 4+o(1). For labeled order types, this number has average (4- mbox{$frac{8}{n^2 - n +2}$}) and variance at most 3.

(b)

The (labeled) order types read off a set of n points sampled independently from the uniform measure on a convex planar domain, smooth or polygonal, or from a Gaussian distribution are concentrated, i.e., such sampling typically encounters only a vanishingly small fraction of all order types of the given size.

Result (a) generalizes to arbitrary dimension d for labeled order types with the average number of extreme points 2d+o (1) and constant variance. We also discuss to what extent our methods generalize to the abstract setting of uniform acyclic oriented matroids. Moreover, our methods show the following relative of the Erdős-Szekeres theorem: for any fixed k, as n → ∞, a proportion 1 - O(1/n) of the n-point simple order types contain a triangle enclosing a convex k-chain over an edge.

For the unlabeled case in (a), we prove that for any antipodal, finite subset of the two-dimensional sphere, the group of orientation preserving bijections is cyclic, dihedral, or one of A4, S4, or A5 (and each case is possible). These are the finite subgroups of SO(3) and our proof follows the lines of their characterization by Felix Klein.

我们建立了平面上一般位置点的阶型(可实现的简单平面阶型,可实现的秩为3的一致无环定向阵)的两个主要结果:(a)从所有这些阶型中均匀随机选择的n点阶型的极值点的数目平均为4+o(1)。对于标记的阶型,这个数字的平均值为(4- mbox{$frac{8}{n^2 - n +2}$}),方差最多为3。(b)从凸平面域、光滑或多边形或高斯分布的均匀测量中独立采样的n个点的集合中读取(标记的)阶型是集中的,即,这种采样通常只遇到给定大小的所有阶型的一小部分。结果(a)推广到任意维度d,对于有标记的阶型,极值点的平均个数为2d+o(1),方差为常数。我们还讨论了我们的方法在多大程度上推广到一致无环定向拟阵的抽象集合。此外,我们的方法还证明了Erdős-Szekeres定理的如下关系:对于任意固定k,当n→∞时,n点简单阶型的比例1 - O(1/n)包含一个在边上包有凸k链的三角形。对于(a)中的未标记情况,我们证明了对于二维球面的任何对映有限子集,保向双射群是循环的、二面体的或A4、S4、A5中的一个(每种情况都是可能的)。这些是SO(3)的有限子群,我们的证明遵循了Felix Klein对它们的描述。
{"title":"Convex Hulls of Random Order Types","authors":"Xavier Goaoc, Emo Welzl","doi":"https://dl.acm.org/doi/10.1145/3570636","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3570636","url":null,"abstract":"<p>We establish the following two main results on order types of points in general position in the plane (realizable simple planar order types, realizable uniform acyclic oriented matroids of rank 3):\u0000<p><table border=\"0\" list-type=\"ordered\" width=\"95%\"><tr><td valign=\"top\"><p>(a)</p></td><td colspan=\"5\" valign=\"top\"><p>The number of extreme points in an <i>n</i>-point order type, chosen uniformly at random from all such order types, is on average 4+<i>o</i>(1). For labeled order types, this number has average (4- mbox{$frac{8}{n^2 - n +2}$}) and variance at most 3.</p></td></tr><tr><td valign=\"top\"><p>(b)</p></td><td colspan=\"5\" valign=\"top\"><p>The (labeled) order types read off a set of <i>n</i> points sampled independently from the uniform measure on a convex planar domain, smooth or polygonal, or from a Gaussian distribution are concentrated, i.e., such sampling typically encounters only a vanishingly small fraction of all order types of the given size.</p></td></tr></table></p> Result (a) generalizes to arbitrary dimension <i>d</i> for labeled order types with the average number of extreme points 2<i>d</i>+<i>o</i> (1) and constant variance. We also discuss to what extent our methods generalize to the abstract setting of uniform acyclic oriented matroids. Moreover, our methods show the following relative of the Erdős-Szekeres theorem: for any fixed <i>k</i>, as <i>n</i> → ∞, a proportion 1 - <i>O</i>(1/<i>n</i>) of the <i>n</i>-point simple order types contain a triangle enclosing a convex <i>k</i>-chain over an edge.</p><p>For the unlabeled case in (a), we prove that for any antipodal, finite subset of the two-dimensional sphere, the group of orientation preserving bijections is cyclic, dihedral, or one of <i>A</i><sub>4</sub>, <i>S</i><sub>4</sub>, or <i>A</i><sub>5</sub> (and each case is possible). These are the finite subgroups of <i>SO</i>(3) and our proof follows the lines of their characterization by Felix Klein.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents 在具有理性和恶意代理的异步系统中实现中介的下限
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2023-01-02 DOI: 10.1145/3578579
I. Geffner, Joseph Y. Halpern
Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a (k, t)-robust equilibrium for n players and a trusted mediator can be implemented without the mediator as long as n > 4(k+t), where an equilibrium is (k, t)-robust if, roughly speaking, no coalition of t players can decrease the payoff of any of the other players, and no coalition of k players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if n ≤ 4(k+t) there exist (k, t)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (k, t)-robust mediators seems closely related to implementing asynchronous multiparty (k+t)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (k+t)-secure computation, which we call (k+t)-strict secure computation, to implementing (k, t)-robust mediators. We prove the desired lower bound by showing that there are functions on n variables that cannot be (k+t)-strictly securely computed if n ≤ 4(k+t). This also provides a simple alternative proof for the well-known lower bound of 4t+1 on asynchronous secure computation in the presence of up to t malicious agents [4, 8, 10].
Abraham, Dolev, Geffner, and Halpern[1]证明,在异步系统中,只要n >1,4 (k+t)没有中介,就可以实现n个参与者和可信中介的(k, t)鲁棒均衡,其中均衡为(k, t)鲁棒,粗略地说,如果t个参与者的联盟不会减少任何其他参与者的收益,并且k个参与者的联盟不会通过偏离来增加他们的收益。我们证明了这个界是紧的,即如果n≤4(k+t),存在(k, t)个具有中介的鲁棒均衡,且不能由参与人单独实现。尽管实现(k, t)健壮的中介似乎与实现异步多方(k+t)安全计算[6]密切相关,但据我们所知,目前还没有从一个问题直接简化到另一个问题的方法。然而,我们证明了从稍微弱一点的(k+t)安全计算的概念(我们称之为(k+t)严格安全计算)到实现(k, t)鲁棒中介的非平凡简化。我们通过证明n个变量上的函数不能是(k+t)——当n≤4(k+t)时严格安全计算,证明了期望的下界。这也为异步安全计算中存在多达t个恶意代理时众所周知的4t+1下界提供了一个简单的替代证明[4,8,10]。
{"title":"Lower Bounds on Implementing Mediators in Asynchronous Systems with Rational and Malicious Agents","authors":"I. Geffner, Joseph Y. Halpern","doi":"10.1145/3578579","DOIUrl":"https://doi.org/10.1145/3578579","url":null,"abstract":"Abraham, Dolev, Geffner, and Halpern [1] proved that, in asynchronous systems, a (k, t)-robust equilibrium for n players and a trusted mediator can be implemented without the mediator as long as n > 4(k+t), where an equilibrium is (k, t)-robust if, roughly speaking, no coalition of t players can decrease the payoff of any of the other players, and no coalition of k players can increase their payoff by deviating. We prove that this bound is tight, in the sense that if n ≤ 4(k+t) there exist (k, t)-robust equilibria with a mediator that cannot be implemented by the players alone. Even though implementing (k, t)-robust mediators seems closely related to implementing asynchronous multiparty (k+t)-secure computation [6], to the best of our knowledge there is no known straightforward reduction from one problem to another. Nevertheless, we show that there is a non-trivial reduction from a slightly weaker notion of (k+t)-secure computation, which we call (k+t)-strict secure computation, to implementing (k, t)-robust mediators. We prove the desired lower bound by showing that there are functions on n variables that cannot be (k+t)-strictly securely computed if n ≤ 4(k+t). This also provides a simple alternative proof for the well-known lower bound of 4t+1 on asynchronous secure computation in the presence of up to t malicious agents [4, 8, 10].","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80073995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Complexity of Gradient Descent: CLS = PPAD ∩ PLS 梯度下降的复杂度:CLS = PPAD∩PLS
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2022-12-19 DOI: https://dl.acm.org/doi/10.1145/3568163
John Fearnley, Paul Goldberg, Alexandros Hollender, Rahul Savani

We study search problems that can be solved by performing Gradient Descent on a bounded convex polytopal domain and show that this class is equal to the intersection of two well-known classes: PPAD and PLS. As our main underlying technical contribution, we show that computing a Karush-Kuhn-Tucker (KKT) point of a continuously differentiable function over the domain [0,1]2 is PPAD ∩ PLS-complete. This is the first non-artificial problem to be shown complete for this class. Our results also imply that the class CLS (Continuous Local Search) – which was defined by Daskalakis and Papadimitriou as a more “natural” counterpart to PPAD ∩ PLS and contains many interesting problems – is itself equal to PPAD ∩ PLS.

我们研究了可以通过在有界凸多边形域上执行梯度下降来解决的搜索问题,并证明该类等于两个已知类:PPAD和PLS的交集。作为我们主要的基础技术贡献,我们证明了在域[0,1]2上计算连续可微函数的Karush-Kuhn-Tucker (KKT)点是PPAD∩PLS完备的。这是本课程第一个完整的非人工问题。我们的结果还意味着CLS(连续本地搜索)类——由Daskalakis和Papadimitriou定义为PPAD∩PLS更“自然”的对应,包含许多有趣的问题——本身等于PPAD∩PLS。
{"title":"The Complexity of Gradient Descent: CLS = PPAD ∩ PLS","authors":"John Fearnley, Paul Goldberg, Alexandros Hollender, Rahul Savani","doi":"https://dl.acm.org/doi/10.1145/3568163","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3568163","url":null,"abstract":"<p>We study search problems that can be solved by performing Gradient Descent on a bounded convex polytopal domain and show that this class is equal to the intersection of two well-known classes: PPAD and PLS. As our main underlying technical contribution, we show that computing a Karush-Kuhn-Tucker (KKT) point of a continuously differentiable function over the domain [0,1]<sup>2</sup> is PPAD ∩ PLS-complete. This is the first non-artificial problem to be shown complete for this class. Our results also imply that the class CLS (Continuous Local Search) – which was defined by Daskalakis and Papadimitriou as a more “natural” counterpart to PPAD ∩ PLS and contains many interesting problems – is itself equal to PPAD ∩ PLS.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Descriptive Complexity of Temporal Constraint Satisfaction Problems 论时间约束满足问题的描述复杂性
IF 2.5 2区 计算机科学 Q2 Computer Science Pub Date : 2022-12-19 DOI: https://dl.acm.org/doi/10.1145/3566051
Manuel Bodirsky, Jakub Rydval

Finite-domain constraint satisfaction problems are either solvable by Datalog or not even expressible in fixed-point logic with counting. The border between the two regimes can be described by a universal-algebraic minor condition. For infinite-domain constraint satisfaction problems (CSPs), the situation is more complicated even if the template structure of the CSP is model-theoretically tame. We prove that there is no Maltsev condition that characterizes Datalog already for the CSPs of first-order reducts of (ℚ;<); such CSPs are called temporal CSPs and are of fundamental importance in infinite-domain constraint satisfaction. Our main result is a complete classification of temporal CSPs that can be expressed in one of the following logical formalisms: Datalog, fixed-point logic (with or without counting), or fixed-point logic with the mod-2 rank operator. The classification shows that many of the equivalent conditions in the finite fail to capture expressibility in Datalog or fixed-point logic already for temporal CSPs.

有限域约束满足问题要么是Datalog可解的,要么是在有计数的不动点逻辑中无法表达的。两种状态之间的边界可以用一个泛代数小条件来描述。对于无限域约束满足问题(CSP),即使CSP的模板结构在理论上是模型化的,情况也更为复杂。证明了(π;<)的一阶约的csp不存在表征Datalog的Maltsev条件;这种csp被称为时间csp,在无限域约束满足中具有重要意义。我们的主要结果是时间csp的完整分类,可以用以下逻辑形式之一表示:数据,定点逻辑(带或不带计数)或带mod-2秩算子的定点逻辑。该分类表明,对于时态csp,有限条件中的许多等效条件已经无法捕获Datalog或不动点逻辑中的可表达性。
{"title":"On the Descriptive Complexity of Temporal Constraint Satisfaction Problems","authors":"Manuel Bodirsky, Jakub Rydval","doi":"https://dl.acm.org/doi/10.1145/3566051","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3566051","url":null,"abstract":"<p>Finite-domain constraint satisfaction problems are either solvable by Datalog or not even expressible in fixed-point logic with counting. The border between the two regimes can be described by a universal-algebraic minor condition. For infinite-domain constraint satisfaction problems (CSPs), the situation is more complicated even if the template structure of the CSP is model-theoretically tame. We prove that there is no Maltsev condition that characterizes Datalog already for the CSPs of first-order reducts of (ℚ;&lt;); such CSPs are called <i>temporal CSPs</i> and are of fundamental importance in infinite-domain constraint satisfaction. Our main result is a complete classification of temporal CSPs that can be expressed in one of the following logical formalisms: Datalog, fixed-point logic (with or without counting), or fixed-point logic with the mod-2 rank operator. The classification shows that many of the equivalent conditions in the finite fail to capture expressibility in Datalog or fixed-point logic already for temporal CSPs.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138525667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of the ACM
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1