首页 > 最新文献

Information and Computation最新文献

英文 中文
Asymptotically optimal synthesis of reversible circuits 可逆电路的渐进优化合成
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-08 DOI: 10.1016/j.ic.2024.105235
Xian Wu, Lvzhou Li
Reversible circuits have been studied extensively and intensively, and have plenty of applications in various areas, such as digital signal processing, cryptography, and especially quantum computing. In 2003, the lower bound Ω(2nn/logn) for the synthesis of n-wire reversible circuits was proved. Whether this lower bound has a matching upper bound was listed as one of the future challenging open problems in the survey (Saeedi and Markov (2013) [1]). In this paper we propose an algorithm to implement an arbitrary n-wire reversible circuit with no more than O(2nn/logn) elementary gates, and thus close the open problem.
人们对可逆电路进行了广泛而深入的研究,在数字信号处理、密码学,特别是量子计算等各个领域都有大量应用。2003 年,人们证明了 n 线可逆电路合成的下界 Ω(2nn/logn)。这一下界是否有匹配的上界被列为调查报告中未来具有挑战性的开放问题之一(Saeedi 和 Markov (2013) [1])。在本文中,我们提出了一种用不超过 O(2nn/logn) 的基本门实现任意 n 线可逆电路的算法,从而解决了这个开放问题。
{"title":"Asymptotically optimal synthesis of reversible circuits","authors":"Xian Wu,&nbsp;Lvzhou Li","doi":"10.1016/j.ic.2024.105235","DOIUrl":"10.1016/j.ic.2024.105235","url":null,"abstract":"<div><div>Reversible circuits have been studied extensively and intensively, and have plenty of applications in various areas, such as digital signal processing, cryptography, and especially quantum computing. In 2003, the lower bound <span><math><mi>Ω</mi><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup><mi>n</mi><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> for the synthesis of <em>n</em>-wire reversible circuits was proved. Whether this lower bound has a matching upper bound was listed as one of the future challenging open problems in the survey (Saeedi and Markov (2013) <span><span>[1]</span></span>). In this paper we propose an algorithm to implement an arbitrary <em>n</em>-wire reversible circuit with no more than <span><math><mi>O</mi><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup><mi>n</mi><mo>/</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> elementary gates, and thus close the open problem.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105235"},"PeriodicalIF":0.8,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142655748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-linear communication via graded modal session types 通过分级模式会话类型进行非线性交流
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-11-04 DOI: 10.1016/j.ic.2024.105234
Danielle Marshall , Dominic Orchard
Session types provide guarantees about concurrent behaviour and can be understood through their correspondence with linear logic, with propositions as sessions and proofs as processes. However, strict linearity is limiting since there exist useful communication patterns that rely on non-linear behaviours. For example, shared channels can repeatedly spawn a process with binary communication along a fresh linear channel. Non-linearity can be introduced in a controlled way through the concept of graded modal types, which are a framework encompassing various kinds of coeffect (describing how computations make demands on their context). This paper shows how graded modalities can work alongside session types, enabling various non-linear concurrency behaviours to be re-introduced precisely. The ideas are demonstrated using Granule, a functional language with linear, indexed, and graded modal types. We define a core calculus capturing the requisite features and our new graded primitives, then present an operational model and establish various key properties.
会话类型为并发行为提供了保证,可以通过它们与线性逻辑的对应关系来理解,将命题作为会话,将证明作为过程。然而,严格的线性是有局限性的,因为存在依赖于非线性行为的有用通信模式。例如,共享信道可以沿着新的线性信道重复产生一个二进制通信进程。分级模态类型是一个包含各种协效(描述计算如何对其上下文提出要求)的框架,可以通过分级模态类型的概念以可控的方式引入非线性。本文展示了分级模态如何与会话类型一起工作,从而精确地重新引入各种非线性并发行为。我们使用 Granule(一种具有线性、索引和分级模态类型的函数式语言)来演示这些想法。我们定义了一个核心微积分,它捕获了必要的特征和我们新的分级基元,然后提出了一个操作模型,并建立了各种关键属性。
{"title":"Non-linear communication via graded modal session types","authors":"Danielle Marshall ,&nbsp;Dominic Orchard","doi":"10.1016/j.ic.2024.105234","DOIUrl":"10.1016/j.ic.2024.105234","url":null,"abstract":"<div><div>Session types provide guarantees about concurrent behaviour and can be understood through their correspondence with linear logic, with propositions as sessions and proofs as processes. However, strict linearity is limiting since there exist useful communication patterns that rely on non-linear behaviours. For example, shared channels can repeatedly spawn a process with binary communication along a fresh linear channel. Non-linearity can be introduced in a controlled way through the concept of <em>graded modal types</em>, which are a framework encompassing various kinds of <em>coeffect</em> (describing how computations make demands on their context). This paper shows how graded modalities can work alongside session types, enabling various non-linear concurrency behaviours to be re-introduced precisely. The ideas are demonstrated using Granule, a functional language with linear, indexed, and graded modal types. We define a core calculus capturing the requisite features and our new graded primitives, then present an operational model and establish various key properties.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105234"},"PeriodicalIF":0.8,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142655749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systems of fixpoint equations: Abstraction, games, up-to techniques and local algorithms 定点方程系统:抽象、博弈、向上技术和局部算法
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1016/j.ic.2024.105233
Paolo Baldan , Barbara König , Tommaso Padoan
Systems of fixpoint equations over complete lattices, which combine least and greatest fixpoints, often arise from verification tasks such as model checking and behavioural equivalence checking. In this paper we develop a theory of approximation in the style of abstract interpretation, where a system over some concrete domain is abstracted into a system on a suitable abstract domain, ensuring sound and possibly complete over-approximations of the solutions. We also show how up-to techniques, commonly used to simplify coinductive proofs, fit into this framework, interpreted as abstractions. Additionally, we characterise the solution of fixpoint equation systems through parity games, extending prior work limited to continuous lattices. This game-based approach allows for local algorithms that verify system properties, such as determining whether a state satisfies a formula or two states are behaviourally equivalent. We describe a local algorithm, that can be combined with abstraction and up-to techniques to speed up the computation.
完整网格上的定点方程系统结合了最小定点和最大定点,经常出现在模型检查和行为等价性检查等验证任务中。在本文中,我们以抽象解释的方式发展了一种近似理论,即把某个具体域上的系统抽象成一个合适的抽象域上的系统,从而确保对解进行合理且可能完整的过度近似。我们还展示了常用于简化共推证明的向上技术如何适合这一抽象解释框架。此外,我们还通过奇偶性博弈来描述定点方程系统的解,从而扩展了之前仅限于连续网格的工作。这种基于博弈的方法允许使用局部算法来验证系统属性,例如确定一个状态是否满足公式或两个状态在行为上是否等价。我们描述了一种局部算法,该算法可与抽象和向上技术相结合,以加快计算速度。
{"title":"Systems of fixpoint equations: Abstraction, games, up-to techniques and local algorithms","authors":"Paolo Baldan ,&nbsp;Barbara König ,&nbsp;Tommaso Padoan","doi":"10.1016/j.ic.2024.105233","DOIUrl":"10.1016/j.ic.2024.105233","url":null,"abstract":"<div><div>Systems of fixpoint equations over complete lattices, which combine least and greatest fixpoints, often arise from verification tasks such as model checking and behavioural equivalence checking. In this paper we develop a theory of approximation in the style of abstract interpretation, where a system over some concrete domain is abstracted into a system on a suitable abstract domain, ensuring sound and possibly complete over-approximations of the solutions. We also show how up-to techniques, commonly used to simplify coinductive proofs, fit into this framework, interpreted as abstractions. Additionally, we characterise the solution of fixpoint equation systems through parity games, extending prior work limited to continuous lattices. This game-based approach allows for local algorithms that verify system properties, such as determining whether a state satisfies a formula or two states are behaviourally equivalent. We describe a local algorithm, that can be combined with abstraction and up-to techniques to speed up the computation.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105233"},"PeriodicalIF":0.8,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142561288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unifying lower bounds for algebraic machines, semantically 代数机器的统一下界,语义上
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-21 DOI: 10.1016/j.ic.2024.105232
Thomas Seiller , Luc Pellissier , Ulysse Léchine
We present a new abstract method for proving lower bounds in computational complexity based on the notion of topological and measurable entropy for dynamical systems. It is shown to generalise several previous lower bounds results from the literature in algebraic complexity, thus providing a unifying framework for “topological” proofs of lower bounds. We further use this method to prove that maxflow, a
complete problem, is not computable in polylogarithmic time on parallel random access machines (prams) working with real numbers. This improves on a result of Mulmuley since the class of machines considered extends the class “prams without bit operations”, making more precise the relationship between Mulmuley's result and similar lower bounds on real prams.
我们基于动态系统的拓扑和可测熵概念,提出了一种证明计算复杂性下界的新抽象方法。研究表明,这种方法概括了代数复杂性文献中之前的几个下界结果,从而为下界的 "拓扑 "证明提供了一个统一的框架。我们进一步用这种方法证明,在处理实数的并行随机存取机(prams)上,无法在多对数时间内计算 maxflow 这个完整问题。这改进了 Mulmuley 的一个结果,因为所考虑的机器类别扩展了 "无位运算的 prams "类别,使得 Mulmuley 的结果与实数 prams 上的类似下界之间的关系更加精确。
{"title":"Unifying lower bounds for algebraic machines, semantically","authors":"Thomas Seiller ,&nbsp;Luc Pellissier ,&nbsp;Ulysse Léchine","doi":"10.1016/j.ic.2024.105232","DOIUrl":"10.1016/j.ic.2024.105232","url":null,"abstract":"<div><div>We present a new abstract method for proving lower bounds in computational complexity based on the notion of topological and measurable entropy for dynamical systems. It is shown to generalise several previous lower bounds results from the literature in algebraic complexity, thus providing a unifying framework for “topological” proofs of lower bounds. We further use this method to prove that <span>maxflow</span>, a <figure><img></figure> complete problem, is not computable in polylogarithmic time on parallel random access machines (<span>pram</span>s) working with real numbers. This improves on a result of Mulmuley since the class of machines considered extends the class “<span>pram</span>s without bit operations”, making more precise the relationship between Mulmuley's result and similar lower bounds on real <span>pram</span>s.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105232"},"PeriodicalIF":0.8,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142530572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing variables in the evolution rules of P systems 在 P 系统的进化规则中引入变量
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-16 DOI: 10.1016/j.ic.2024.105231
Bogdan Aman
In membrane systems evolution rules are constructed using only objects from a finite alphabet. In this paper we investigate rules in which variables are used. Namely, we define Variable P systems in which the rules containing variables need to be instantiated at the start of each computational step with values from some predefined sets of sets of objects.
The modelling power of variable P systems is described by simulating some basic arithmetic operations over a (multi)set of positive numbers (addition, multiplication, or a combination of them). The main advantage of using variable P systems consists in the small number of used rules regardless how many numbers are involved in the operation: e.g., the addition requires only 3 rules, while the multiplication only 27 rules.
在膜系统中,进化规则仅使用有限字母表中的对象来构建。本文将研究使用变量的规则。也就是说,我们定义了可变 P 系统,在该系统中,包含变量的规则需要在每个计算步骤开始时用一些预定义的对象集中的值实例化。可变 P 系统的建模能力通过模拟正数(多)集的一些基本算术运算(加法、乘法或它们的组合)来描述。使用变量 P 系统的主要优势在于,无论运算涉及多少个数字,所使用的规则数量都很少:例如,加法运算只需 3 条规则,而乘法运算只需 27 条规则。
{"title":"Introducing variables in the evolution rules of P systems","authors":"Bogdan Aman","doi":"10.1016/j.ic.2024.105231","DOIUrl":"10.1016/j.ic.2024.105231","url":null,"abstract":"<div><div>In membrane systems evolution rules are constructed using only objects from a finite alphabet. In this paper we investigate rules in which variables are used. Namely, we define Variable P systems in which the rules containing variables need to be instantiated at the start of each computational step with values from some predefined sets of sets of objects.</div><div>The modelling power of variable P systems is described by simulating some basic arithmetic operations over a (multi)set of positive numbers (addition, multiplication, or a combination of them). The main advantage of using variable P systems consists in the small number of used rules regardless how many numbers are involved in the operation: e.g., the addition requires only 3 rules, while the multiplication only 27 rules.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105231"},"PeriodicalIF":0.8,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142530570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspective on complexity measures targeting read-once branching programs 以只读分支程序为目标的复杂性测量透视
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-15 DOI: 10.1016/j.ic.2024.105230
Yaqiao Li , Pierre McKenzie
A model of computation for which reasonable yet still incomplete lower bounds are known is the read-once branching program. Here variants of complexity measures successful in the study of read-once branching programs are defined and studied. Some new or simpler proofs of known bounds are uncovered. Branching program resources and the new measures are compared extensively. The new variants are developed in part in the hope of tackling read-k branching programs for the tree evaluation problem. Other computation problems are studied as well. In particular, a common view of a function studied by Gál and a function studied by Bollig and Wegener leads to the general combinatorics of blocking sets. Technical combinatorial results of independent interest are obtained. New leads towards further progress are discussed. An exponential lower bound for non-deterministic read-k branching programs for the GEN function is also derived, independently from the new measures.
只读分支程序是一个已知合理下限但仍不完整的计算模型。这里定义并研究了在研究一次读取分支程序中成功的复杂性度量的变体。此外,还揭示了已知边界的一些新的或更简单的证明。对分支程序资源和新度量方法进行了广泛比较。新变体的开发部分是希望解决树评估问题中的读k分支程序。我们还研究了其他计算问题。特别是,对加尔所研究的函数以及博利格和韦格纳所研究的函数的共同看法,引出了阻塞集的一般组合学。我们还获得了具有独立意义的技术组合结果。讨论了取得进一步进展的新线索。此外,还得出了 GEN 函数的非确定读 k 分支程序的指数下限,这与新措施无关。
{"title":"Perspective on complexity measures targeting read-once branching programs","authors":"Yaqiao Li ,&nbsp;Pierre McKenzie","doi":"10.1016/j.ic.2024.105230","DOIUrl":"10.1016/j.ic.2024.105230","url":null,"abstract":"<div><div>A model of computation for which reasonable yet still incomplete lower bounds are known is the read-once branching program. Here variants of complexity measures successful in the study of read-once branching programs are defined and studied. Some new or simpler proofs of known bounds are uncovered. Branching program resources and the new measures are compared extensively. The new variants are developed in part in the hope of tackling read-<em>k</em> branching programs for the tree evaluation problem. Other computation problems are studied as well. In particular, a common view of a function studied by Gál and a function studied by Bollig and Wegener leads to the general combinatorics of blocking sets. Technical combinatorial results of independent interest are obtained. New leads towards further progress are discussed. An exponential lower bound for non-deterministic read-<em>k</em> branching programs for the GEN function is also derived, independently from the new measures.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105230"},"PeriodicalIF":0.8,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142530571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Different strokes in randomised strategies: Revisiting Kuhn's theorem under finite-memory assumptions 随机策略中的不同招数:在有限记忆假设下重温库恩定理
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-10 DOI: 10.1016/j.ic.2024.105229
James C.A. Main , Mickael Randour
Two-player (antagonistic) games on (possibly stochastic) graphs are a prevalent model in theoretical computer science, notably as a framework for reactive synthesis.
Optimal strategies may require randomisation when dealing with inherently probabilistic goals, balancing multiple objectives, or in contexts of partial information. There is no unique way to define randomised strategies. For instance, one can use so-called mixed strategies or behavioural ones. In the most general setting, these two classes do not share the same expressiveness. A seminal result in game theory — Kuhn's theorem — asserts their equivalence in games of perfect recall.
This result crucially relies on the possibility for strategies to use infinite memory, i.e., unlimited knowledge of all past observations. However, computer systems are finite in practice. Hence it is pertinent to restrict our attention to finite-memory strategies, defined as automata with outputs. Randomisation can be implemented in these in different ways: the initialisation, outputs or transitions can be randomised or deterministic respectively. Depending on which aspects are randomised, the expressiveness of the corresponding class of finite-memory strategies differs.
In this work, we study two-player concurrent stochastic games and provide a complete taxonomy of the classes of finite-memory strategies obtained by varying which of the three aforementioned components are randomised. Our taxonomy holds in games of perfect and imperfect information with perfect recall, and in games with more than two players. We also provide an adapted taxonomy for games with imperfect recall.
在(可能是随机的)图上的双人(对抗)博弈是理论计算机科学中的一个普遍模型,尤其是作为反应式合成的一个框架。当处理固有的概率目标、平衡多个目标或在部分信息的情况下,最佳策略可能需要随机化。定义随机化策略并没有唯一的方法。例如,我们可以使用所谓的混合策略或行为策略。在最一般的情况下,这两类策略的表达能力并不相同。博弈论中的一个开创性结果--库恩定理--断言了它们在完全回忆博弈中的等价性。这个结果的关键依赖于策略使用无限记忆的可能性,即对过去所有观察结果的无限了解。然而,计算机系统实际上是有限的。因此,我们有必要将注意力限制在有限记忆策略上,将其定义为有输出的自动机。随机化可以通过不同的方式实现:初始化、输出或转换可以分别随机化或确定化。在这项研究中,我们研究了双人并发随机博弈,并提供了通过改变上述三个部分中的哪一个随机化而获得的有限记忆策略类的完整分类法。我们的分类法适用于具有完全召回能力的完全信息博弈和不完全信息博弈,也适用于有两个以上参与者的博弈。我们还为不完全召回博弈提供了一种经过调整的分类法。
{"title":"Different strokes in randomised strategies: Revisiting Kuhn's theorem under finite-memory assumptions","authors":"James C.A. Main ,&nbsp;Mickael Randour","doi":"10.1016/j.ic.2024.105229","DOIUrl":"10.1016/j.ic.2024.105229","url":null,"abstract":"<div><div>Two-player (antagonistic) games on (possibly stochastic) graphs are a prevalent model in theoretical computer science, notably as a framework for reactive synthesis.</div><div>Optimal strategies may require randomisation when dealing with inherently probabilistic goals, balancing multiple objectives, or in contexts of partial information. There is no unique way to define randomised strategies. For instance, one can use so-called <em>mixed</em> strategies or <em>behavioural</em> ones. In the most general setting, these two classes do not share the same expressiveness. A seminal result in game theory — <em>Kuhn's theorem</em> — asserts their equivalence in games of perfect recall.</div><div>This result crucially relies on the possibility for strategies to use <em>infinite memory</em>, i.e., unlimited knowledge of all past observations. However, computer systems are finite in practice. Hence it is pertinent to restrict our attention to <em>finite-memory</em> strategies, defined as automata with outputs. Randomisation can be implemented in these in different ways: the <em>initialisation</em>, <em>outputs</em> or <em>transitions</em> can be randomised or deterministic respectively. Depending on which aspects are randomised, the expressiveness of the corresponding class of finite-memory strategies differs.</div><div>In this work, we study two-player concurrent stochastic games and provide a complete taxonomy of the classes of finite-memory strategies obtained by varying which of the three aforementioned components are randomised. Our taxonomy holds in games of perfect and imperfect information with perfect recall, and in games with more than two players. We also provide an adapted taxonomy for games with imperfect recall.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105229"},"PeriodicalIF":0.8,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive mining of multi-temporal relations 多时空关系的预测性挖掘
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1016/j.ic.2024.105228
Beatrice Amico, Carlo Combi, Romeo Rizzi, Pietro Sala
In this paper, we propose a methodology for deriving a new kind of approximate temporal functional dependencies, called Approximate Predictive Functional Dependencies (APFDs), based on a three-window framework and on a multi-temporal relational model. Different features are proposed for the Observation Window (OW), where we observe predictive data, for the Waiting Window (WW), and for the Prediction Window (PW), where the predicted event occurs. We then consider the concept of approximation for such APFDs, introduce new error measures, and discuss different strategies for deriving APFDs. We discuss the quality, i.e., the informative content, of the derived AFDs by considering their entropy and information gain. Moreover, we outline the results in deriving APFDs focusing on the Acute Kidney Injury (AKI). We use real clinical data contained in the MIMIC III dataset related to patients from Intensive Care Units to show the applicability of our approach to real-world data.
本文基于三窗口框架和多时空关系模型,提出了一种推导新型近似时空函数依赖关系的方法,称为近似预测函数依赖关系(Approximate Predictive Functional Dependencies,APFDs)。我们针对观察预测数据的观察窗口(OW)、等待窗口(WW)和预测事件发生的预测窗口(PW)提出了不同的特征。然后,我们考虑了此类 APFD 的近似概念,引入了新的误差测量方法,并讨论了得出 APFD 的不同策略。通过考虑熵和信息增益,我们讨论了推导出的 AFD 的质量,即信息内容。此外,我们还概述了以急性肾损伤(AKI)为重点推导 APFD 的结果。我们使用了 MIMIC III 数据集中与重症监护病房患者相关的真实临床数据,以展示我们的方法在真实世界数据中的适用性。
{"title":"Predictive mining of multi-temporal relations","authors":"Beatrice Amico,&nbsp;Carlo Combi,&nbsp;Romeo Rizzi,&nbsp;Pietro Sala","doi":"10.1016/j.ic.2024.105228","DOIUrl":"10.1016/j.ic.2024.105228","url":null,"abstract":"<div><div>In this paper, we propose a methodology for deriving a new kind of approximate temporal functional dependencies, called Approximate Predictive Functional Dependencies (APFDs), based on a three-window framework and on a multi-temporal relational model. Different features are proposed for the Observation Window (OW), where we observe predictive data, for the Waiting Window (WW), and for the Prediction Window (PW), where the predicted event occurs. We then consider the concept of approximation for such APFDs, introduce new error measures, and discuss different strategies for deriving APFDs. We discuss the quality, i.e., the informative content, of the derived AFDs by considering their entropy and information gain. Moreover, we outline the results in deriving APFDs focusing on the Acute Kidney Injury (AKI). We use real clinical data contained in the MIMIC III dataset related to patients from Intensive Care Units to show the applicability of our approach to real-world data.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105228"},"PeriodicalIF":0.8,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142422711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blazing a trail via matrix multiplications: A faster algorithm for non-shortest induced paths 通过矩阵乘法开辟道路:非最短诱导路径的更快算法
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-27 DOI: 10.1016/j.ic.2024.105227
Yung-Chung Chiu, Hsueh-I Lu
For vertices u and v of an n-vertex graph G, a uv-trail of G is an induced uv-path of G that is not a shortest uv-path of G. Berger, Seymour, and Spirkl [Discrete Mathematics 2021] gave the previously only known polynomial-time algorithm, running in O(n18) time, to either output a uv-trail of G or ensure that G admits no uv-trail. We reduce the complexity to the time required to perform a poly-logarithmic number of multiplications of n2×n2 Boolean matrices, leading to a largely improved O(n4.75)-time algorithm. Our result improves the previous O(n21)-time algorithm by Cook, Horsfield, Preissmann, Robin, Seymour, Sintiari, Trotignon, and Vušković [Journal of Combinatorial Theory, Series B, 2024] for recognizing graphs with all holes the same length, and reduces the running time to O(n7.75).
对于 n 个顶点图 G 的顶点 u 和 v,G 的 uv 轨迹是 G 的诱导 uv 路径,它不是 G 的最短 uv 路径。Berger、Seymour 和 Spirkl [Discrete Mathematics 2021]给出了以前已知的唯一多项式时间算法,运行时间为 O(n18),可以输出 G 的 uv 轨迹或确保 G 不允许 uv 轨迹。我们将复杂度降低到执行 n2×n2 布尔矩阵多对数乘法所需的时间,从而大大改进了 O(n4.75)-time 算法。我们的结果改进了库克、霍斯菲尔德、普雷斯曼、罗宾、西摩、辛蒂亚里、特罗蒂尼翁和武什科维奇[《组合理论学报》,B 辑,2024 年]先前的 O(n21)-time 算法,用于识别所有孔长度相同的图,并将运行时间减少到 O(n7.75)。
{"title":"Blazing a trail via matrix multiplications: A faster algorithm for non-shortest induced paths","authors":"Yung-Chung Chiu,&nbsp;Hsueh-I Lu","doi":"10.1016/j.ic.2024.105227","DOIUrl":"10.1016/j.ic.2024.105227","url":null,"abstract":"<div><div>For vertices <em>u</em> and <em>v</em> of an <em>n</em>-vertex graph <em>G</em>, a <em>uv-trail</em> of <em>G</em> is an induced <em>uv</em>-path of <em>G</em> that is not a shortest <em>uv</em>-path of <em>G</em>. Berger, Seymour, and Spirkl [<em>Discrete Mathematics</em> 2021] gave the previously only known polynomial-time algorithm, running in <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>18</mn></mrow></msup><mo>)</mo></math></span> time, to either output a <em>uv</em>-trail of <em>G</em> or ensure that <em>G</em> admits no <em>uv</em>-trail. We reduce the complexity to the time required to perform a poly-logarithmic number of multiplications of <span><math><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>×</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> Boolean matrices, leading to a largely improved <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>4.75</mn></mrow></msup><mo>)</mo></math></span>-time algorithm. Our result improves the previous <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>21</mn></mrow></msup><mo>)</mo></math></span>-time algorithm by Cook, Horsfield, Preissmann, Robin, Seymour, Sintiari, Trotignon, and Vušković [<em>Journal of Combinatorial Theory, Series B</em>, 2024] for recognizing graphs with all holes the same length, and reduces the running time to <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>7.75</mn></mrow></msup><mo>)</mo></math></span>.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105227"},"PeriodicalIF":0.8,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truthful and privacy-preserving generalized linear models 真实和保护隐私的广义线性模型
IF 0.8 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-12 DOI: 10.1016/j.ic.2024.105225
Yuan Qiu , Jinyan Liu , Di Wang

This paper explores estimating Generalized Linear Models (GLMs) when agents are strategic and privacy-conscious. We aim to design mechanisms that encourage truthful reporting, protect privacy, and ensure outputs are close to the true parameters. Initially, we address models with sub-Gaussian covariates and heavy-tailed responses with finite fourth moments, proposing a novel private, closed-form estimator. Our mechanism features: (1) o(1)-joint differential privacy with high probability; (2) o(1n)-approximate Bayes Nash equilibrium for (1o(1))-fraction of agents; (3) o(1) error in parameter estimation; (4) individual rationality for (1o(1)) of agents; (5) o(1) payment budget. We then extend our approach to linear regression with heavy-tailed data, using an 4-norm shrinkage operator to propose a similar estimator and payment scheme.

本文探讨了在代理具有策略性和隐私意识的情况下估计广义线性模型(GLM)的问题。我们旨在设计鼓励真实报告、保护隐私并确保输出接近真实参数的机制。首先,我们讨论了具有亚高斯协变量和具有有限第四矩的重尾响应的模型,并提出了一种新颖的私有闭式估计器。我们的机制具有以下特点(1) o(1)-高概率联合差分隐私;(2) (1-o(1))-部分代理人的 o(1n)- 近似贝叶斯纳什均衡;(3) o(1) 参数估计误差;(4) (1-o(1)) 代理人的个体理性;(5) o(1) 支付预算。然后,我们将方法扩展到重尾数据的线性回归,使用 ℓ4 规范收缩算子提出类似的估计和支付方案。
{"title":"Truthful and privacy-preserving generalized linear models","authors":"Yuan Qiu ,&nbsp;Jinyan Liu ,&nbsp;Di Wang","doi":"10.1016/j.ic.2024.105225","DOIUrl":"10.1016/j.ic.2024.105225","url":null,"abstract":"<div><p>This paper explores estimating Generalized Linear Models (GLMs) when agents are strategic and privacy-conscious. We aim to design mechanisms that encourage truthful reporting, protect privacy, and ensure outputs are close to the true parameters. Initially, we address models with sub-Gaussian covariates and heavy-tailed responses with finite fourth moments, proposing a novel private, closed-form estimator. Our mechanism features: (1) <span><math><mi>o</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>-joint differential privacy with high probability; (2) <span><math><mi>o</mi><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>n</mi></mrow></mfrac><mo>)</mo></math></span>-approximate Bayes Nash equilibrium for <span><math><mo>(</mo><mn>1</mn><mo>−</mo><mi>o</mi><mo>(</mo><mn>1</mn><mo>)</mo><mo>)</mo></math></span>-fraction of agents; (3) <span><math><mi>o</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span> error in parameter estimation; (4) individual rationality for <span><math><mo>(</mo><mn>1</mn><mo>−</mo><mi>o</mi><mo>(</mo><mn>1</mn><mo>)</mo><mo>)</mo></math></span> of agents; (5) <span><math><mi>o</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span> payment budget. We then extend our approach to linear regression with heavy-tailed data, using an <span><math><msub><mrow><mi>ℓ</mi></mrow><mrow><mn>4</mn></mrow></msub></math></span>-norm shrinkage operator to propose a similar estimator and payment scheme.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"301 ","pages":"Article 105225"},"PeriodicalIF":0.8,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information and Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1