首页 > 最新文献

Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing最新文献

英文 中文
Multiple matching of rectangular patterns 矩形图案的多重匹配
Pub Date : 1993-06-01 DOI: 10.1145/167088.167116
R. M. Idury, A. Schäffer
We describe the first worst-case efficient algorithm for simultaneously matching multiple rectangular patterns of varying sizes and aspect ratios in a rectangular text. Efficient means significantly more efficient asymptotically than applying known algorithms that handle one height (or width or aspect ratio) at a time for each height. Our algorithm features an interesting use of multidimensional range searching, as well as new adaptations of several known techniques for two-dimensional string matching. We also extend our algorithm to a dynamic setting where the set of patterns can change over time.
我们描述了在矩形文本中同时匹配不同大小和纵横比的多个矩形图案的第一个最坏情况有效算法。高效意味着比应用已知算法在每个高度一次处理一个高度(或宽度或长宽比)的渐进效率要高得多。我们的算法的特点是对多维范围搜索的有趣使用,以及对几种已知的二维字符串匹配技术的新适应。我们还将算法扩展到动态设置,其中模式集可以随时间变化。
{"title":"Multiple matching of rectangular patterns","authors":"R. M. Idury, A. Schäffer","doi":"10.1145/167088.167116","DOIUrl":"https://doi.org/10.1145/167088.167116","url":null,"abstract":"We describe the first worst-case efficient algorithm for simultaneously matching multiple rectangular patterns of varying sizes and aspect ratios in a rectangular text. Efficient means significantly more efficient asymptotically than applying known algorithms that handle one height (or width or aspect ratio) at a time for each height. Our algorithm features an interesting use of multidimensional range searching, as well as new adaptations of several known techniques for two-dimensional string matching. We also extend our algorithm to a dynamic setting where the set of patterns can change over time.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125231862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Contention in shared memory algorithms 共享内存算法中的争用
Pub Date : 1993-06-01 DOI: 10.1145/167088.167145
C. Dwork, M. Herlihy, Orli Waarts
Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of multiprocessor algorithms is heavily influenced by contention , the extent to which processess access the same location at the same time. Nevertheless, even though contention is one of the principal considerations affecting the performance of real algorithms on real multiprocessors, there are no formal tools for analyzing the contention of asynchronous shared-memory algorithms. This paper introduces the first formal complexity model for contention in shared-memory multiprocessors. We focus on the standard multiprocessor architecture in which n asynchronous processes communicate by applying read, write, and read-modify-write operations to a shared memory. To illustrate the utility of our model, we use it to derive two kinds of results: (1) lower bounds on contention for well-known basic problems such as agreement and mutual exclusion, and (2) trade-offs between the length of the critical path (maximal number of accesses to shared variables performed by a single process in executing the algorithm) and contention for these algorithms. Furthermore, we give the first formal contention analysis of a variety of counting networks, a class of concurrent data structures inplementing shared counters. Experiments indicate that certain counting networks outperform conventional single-variable counters at high levels of contention. Our analysis provides the first formal model explaining this phenomenon.
异步共享内存架构的并发算法的大多数复杂性度量都集中在进程步骤和内存消耗上。然而,在实践中,多处理器算法的性能受到争用的严重影响,争用指的是进程同时访问同一位置的程度。然而,尽管争用是影响真实多处理器上真实算法性能的主要考虑因素之一,但是没有正式的工具来分析异步共享内存算法的争用。本文介绍了共享内存多处理器争用的第一个形式化复杂性模型。我们关注标准的多处理器体系结构,其中n个异步进程通过对共享内存应用读、写和读-修改-写操作进行通信。为了说明我们的模型的效用,我们用它来得出两种结果:(1)众所周知的基本问题(如协议和互斥)争用的下界,以及(2)关键路径长度(在执行算法时单个进程对共享变量的最大访问次数)和这些算法争用之间的权衡。此外,我们首次给出了各种计数网络的正式争用分析,计数网络是一类实现共享计数器的并发数据结构。实验表明,某些计数网络在高竞争水平上优于传统的单变量计数器。我们的分析提供了解释这一现象的第一个正式模型。
{"title":"Contention in shared memory algorithms","authors":"C. Dwork, M. Herlihy, Orli Waarts","doi":"10.1145/167088.167145","DOIUrl":"https://doi.org/10.1145/167088.167145","url":null,"abstract":"Most complexity measures for concurrent algorithms for asynchronous shared-memory architectures focus on process steps and memory consumption. In practice, however, performance of multiprocessor algorithms is heavily influenced by contention , the extent to which processess access the same location at the same time. Nevertheless, even though contention is one of the principal considerations affecting the performance of real algorithms on real multiprocessors, there are no formal tools for analyzing the contention of asynchronous shared-memory algorithms. This paper introduces the first formal complexity model for contention in shared-memory multiprocessors. We focus on the standard multiprocessor architecture in which n asynchronous processes communicate by applying read, write, and read-modify-write operations to a shared memory. To illustrate the utility of our model, we use it to derive two kinds of results: (1) lower bounds on contention for well-known basic problems such as agreement and mutual exclusion, and (2) trade-offs between the length of the critical path (maximal number of accesses to shared variables performed by a single process in executing the algorithm) and contention for these algorithms. Furthermore, we give the first formal contention analysis of a variety of counting networks, a class of concurrent data structures inplementing shared counters. Experiments indicate that certain counting networks outperform conventional single-variable counters at high levels of contention. Our analysis provides the first formal model explaining this phenomenon.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Size-depth trade-offs for threshold circuits 阈值电路的尺寸深度权衡
Pub Date : 1993-06-01 DOI: 10.1145/167088.167233
R. Impagliazzo, R. Paturi, M. Saks
The following size{depth tradeo for threshold circuits is obtained: any threshold circuit of depth d that computes the parity function on n variables must have at least n1+c d edges, where c> 0 and 3 are constants independent of n and d. Previously known constructions show that up to the choice of c and this bound is best possible. In particular, the lower bound implies an armative answer to the conjecture of Paturi and Saks that a bounded-depth threshold circuit that computes parity requires a superlinear number of edges. This is the rst superlinear lower bound for an explicit function that holds for any xed depth and the rst that applies to threshold circuits with unrestricted weights. The tradeo is obtained as a consequence of a general restriction theorem for threshold circuits with a small number of edges: For any threshold circuit with n inputs, depth d, and at most kn edges, there exists a partial assignment to the inputs that xes the output of the circuit to a constant while leavingbn=(c1k)c2 d c variables unxed, where c1;c 2>0 and 3 are constants independent of n, k, and d. A tradeo between the number of gates and depth is also proved: any threshold circuit of depth d that computes the parity of n variables has at least (n=2) 1=2(d 1) gates. This tradeo, which is essentially the best possible, was proved previously (with a better constant in the exponent) for the case of threshold circuits with polynomially bounded weights in (K. Siu, V. Roychowdury, and T. Kailath, IEEE Trans. Inform. Theory, 40 (1994), pp. 455{466); the result in the present paper holds for unrestricted weights.
得到阈值电路的以下尺寸{深度折衷:任何深度d的阈值电路在n个变量上计算奇校验函数必须至少有n1+c d条边,其中c> 0和3是独立于n和d的常数。先前已知的结构表明,直到c和这个边界的选择是最好的。特别是,下界暗示了Paturi和Saks猜想的一个armative答案,即计算奇偶性的有界深度阈值电路需要一个超线性的边数。这是适用于任何固定深度的显式函数的第一个超线性下界,也是适用于权重不受限制的阈值电路的第一个超线性下界。获得tradeo由于一般限制定理与少量的边缘阈值电路:对任何阈值与n的输入电路,d,深度和最多kn边缘,存在部分任务换成的输入输出电路的一个常数,而leavingbn unxed = (c1k) c2 d c变量,c1; c 2 > 0和3是常数无关的n, k,和d。盖茨的数量和深度之间的tradeo也证明:任何计算n个变量奇偶校验的深度为d的阈值电路至少有(n=2) 1=2(d1)个门。这个折衷,本质上是最好的可能,在之前被证明(在指数中有一个更好的常数)对于多项式有界权的阈值电路的情况下(K. Siu, V. Roychowdury,和T. Kailath, IEEE Trans)。通知。理论,40(1994),第455页{466);本文的结果适用于不受限制的权重。
{"title":"Size-depth trade-offs for threshold circuits","authors":"R. Impagliazzo, R. Paturi, M. Saks","doi":"10.1145/167088.167233","DOIUrl":"https://doi.org/10.1145/167088.167233","url":null,"abstract":"The following size{depth tradeo for threshold circuits is obtained: any threshold circuit of depth d that computes the parity function on n variables must have at least n1+c d edges, where c> 0 and 3 are constants independent of n and d. Previously known constructions show that up to the choice of c and this bound is best possible. In particular, the lower bound implies an armative answer to the conjecture of Paturi and Saks that a bounded-depth threshold circuit that computes parity requires a superlinear number of edges. This is the rst superlinear lower bound for an explicit function that holds for any xed depth and the rst that applies to threshold circuits with unrestricted weights. The tradeo is obtained as a consequence of a general restriction theorem for threshold circuits with a small number of edges: For any threshold circuit with n inputs, depth d, and at most kn edges, there exists a partial assignment to the inputs that xes the output of the circuit to a constant while leavingbn=(c1k)c2 d c variables unxed, where c1;c 2>0 and 3 are constants independent of n, k, and d. A tradeo between the number of gates and depth is also proved: any threshold circuit of depth d that computes the parity of n variables has at least (n=2) 1=2(d 1) gates. This tradeo, which is essentially the best possible, was proved previously (with a better constant in the exponent) for the case of threshold circuits with polynomially bounded weights in (K. Siu, V. Roychowdury, and T. Kailath, IEEE Trans. Inform. Theory, 40 (1994), pp. 455{466); the result in the present paper holds for unrestricted weights.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116534384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Constructing small sample spaces satisfying given constraints 构造满足给定约束的小样本空间
Pub Date : 1993-06-01 DOI: 10.1145/167088.167168
D. Koller, N. Megiddo
The subject of this paper is finding small sample spaces for joint distributions of n discrete random variables. Such distributions are often only required to obey a certain limited set of constraints of the form Pr (Event) = $pi$. It is shown that the problem of deciding whether there exists any distribution satisfying a given set of constraints is NP-hard. However, if the constraints are consistent, then there exists a distribution satisfying them, which is supported by a "small" sample space (one whose cardinality is equal to the number of constraints). For the important case of independence constraints, where the constraints have a certain form and are consistent with a joint distribution of independent random variables, a small sample space can be constructed in polynomial time. This last result can be used to derandomize algorithms; this is demonstrated by an application to the problem of finding large independent sets in sparse hypergraphs.
本文的主题是寻找n个离散随机变量的联合分布的小样本空间。这种分布通常只需要遵守Pr (Event) = $pi$形式的某些有限约束集。证明了判定是否存在满足给定约束集的分布的问题是np困难的。然而,如果约束是一致的,那么存在一个满足它们的分布,该分布由一个“小”样本空间(其基数等于约束的数量)支持。对于独立约束的重要情况,即约束具有一定的形式且符合独立随机变量的联合分布,可以在多项式时间内构造一个小样本空间。最后一个结果可以用于非随机化算法;通过在稀疏超图中寻找大型独立集的问题中的应用证明了这一点。
{"title":"Constructing small sample spaces satisfying given constraints","authors":"D. Koller, N. Megiddo","doi":"10.1145/167088.167168","DOIUrl":"https://doi.org/10.1145/167088.167168","url":null,"abstract":"The subject of this paper is finding small sample spaces for joint distributions of n discrete random variables. Such distributions are often only required to obey a certain limited set of constraints of the form Pr (Event) = $pi$. It is shown that the problem of deciding whether there exists any distribution satisfying a given set of constraints is NP-hard. However, if the constraints are consistent, then there exists a distribution satisfying them, which is supported by a \"small\" sample space (one whose cardinality is equal to the number of constraints). For the important case of independence constraints, where the constraints have a certain form and are consistent with a joint distribution of independent random variables, a small sample space can be constructed in polynomial time. This last result can be used to derandomize algorithms; this is demonstrated by an application to the problem of finding large independent sets in sparse hypergraphs.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115852482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Thermodynamics of computation and information distance 热力学的计算和信息距离
Pub Date : 1993-06-01 DOI: 10.1145/167088.167098
Charles H. Bennett, P. Gács, Ming Li, P. Vitányi, W. H. Zurek
Applying the tools of algorithmic information theory, we compare several candidates for an asymptotically machine-independent. absolute measure of the informational or ``cognitive`` distance between discrete objects x and y. The maximum of the conditional Kolmogorov complexities max{l_brace}K(y{vert_bar}z) K(m{vert_bar}y){r_brace}, is shown to be optimal, in the sense of being minimal within an additive constant among semicomputable, symmetric, positive semidefinite functions of z and y satisfying a reasonable normalization condition and obeying the triangle intequality. The optimal metric, in turn, differs by at most an additive logarithmic term from the size of the smallest program for a universal reversible computer to transform x into y. This program functions in a `catalytic`` capacity, being retained in the computer before, during, and after the computation. Similarly, the sum of the conditional complexities. K(y{vert_bar}x) + K(x{vert_bar}y), is shown to be equal within a logarithmic term to the minimal amount Of information flowing out and in during a reversible computation in which the program is not retained. Finally. using the physical theory of reversible computation, it is shown that the simple difference K(x) - K(y) is an appropriate (ie universal, antisymmetric, and transitive) measure of the amount of thermodynamic work required to transform string x intomore » string y by the most efficient process.« less
应用算法信息论的工具,我们比较了几个候选的渐近机器无关。离散对象x和y之间的信息或“认知”距离的绝对度量。条件Kolmogorov复杂度max{l_brace}K(y{vert_bar}z) K(m{vert_bar}y){r_brace}的最大值被证明是最优的,在满足合理的归一化条件并服从三角不等式的半可计算的对称正半定函数z和y之间的加性常数范围内是最小的。反过来,最优度量与通用可逆计算机将x转换为y的最小程序的大小至多相差一个加性对数项。该程序具有“催化”能力,在计算之前、期间和之后都保留在计算机中。类似地,条件复杂度的和。K(y{vert_bar}x) + K(x{vert_bar}y)在一个对数项内等于在可逆计算期间流出和输入的最小信息量,其中程序不被保留。最后。利用可逆计算的物理理论,证明了简单的差分K(x) - K(y)是一个适当的(即通用的、反对称的和传递的)度量,通过最有效的过程将弦x转化为更多的弦y所需的热力学功。«少
{"title":"Thermodynamics of computation and information distance","authors":"Charles H. Bennett, P. Gács, Ming Li, P. Vitányi, W. H. Zurek","doi":"10.1145/167088.167098","DOIUrl":"https://doi.org/10.1145/167088.167098","url":null,"abstract":"Applying the tools of algorithmic information theory, we compare several candidates for an asymptotically machine-independent. absolute measure of the informational or ``cognitive`` distance between discrete objects x and y. The maximum of the conditional Kolmogorov complexities max{l_brace}K(y{vert_bar}z) K(m{vert_bar}y){r_brace}, is shown to be optimal, in the sense of being minimal within an additive constant among semicomputable, symmetric, positive semidefinite functions of z and y satisfying a reasonable normalization condition and obeying the triangle intequality. The optimal metric, in turn, differs by at most an additive logarithmic term from the size of the smallest program for a universal reversible computer to transform x into y. This program functions in a `catalytic`` capacity, being retained in the computer before, during, and after the computation. Similarly, the sum of the conditional complexities. K(y{vert_bar}x) + K(x{vert_bar}y), is shown to be equal within a logarithmic term to the minimal amount Of information flowing out and in during a reversible computation in which the program is not retained. Finally. using the physical theory of reversible computation, it is shown that the simple difference K(x) - K(y) is an appropriate (ie universal, antisymmetric, and transitive) measure of the amount of thermodynamic work required to transform string x intomore » string y by the most efficient process.« less","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Finding minimum-quotient cuts in planar graphs 在平面图中求最小商切
Pub Date : 1993-06-01 DOI: 10.1145/167088.167284
James K. Park, C. Phillips
Given a graph G = (V, E) where each vertex v {element_of} V is assigned a weight w(v) and each edge e {element_of} E is assigned a cost c(e), the quotient of a cut partitioning the vertices of V into sets S and {bar S} is c(S, {bar S})/min{l_brace}w(S), w(S){r_brace}, where c(S, {bar S}) is the sum of the costs of the edges crossing the cut and w(S) and w({bar S}) are the sum of the weights of the vertices in S and {bar S}, respectively. The problem of finding a cut whose quotient is minimum for a graph has in recent years attracted considerable attention, due in large part to the work of Rao and Leighton and Rao. They have shown that an algorithm (exact or approximation) for the minimum-quotient-cut problem can be used to obtain an approximation algorithm for the more famous minimumb-balanced-cut problem, which requires finding a cut (S,{bar S}) minimizing c(S,{bar S}) subject to the constraint bW {le} w(S) {le} (1 {minus} b)W, where W is the total vertex weight and b is some fixed balance in the range 0 < b {le} {1/2}. Unfortunately, the minimum-quotient-cut problem is strongly NP-hard for general graphs, and themore » best polynomial-time approximation algorithm known for the general problem guarantees only a cut whose quotient is at mostO(lg n) times optimal, where n is the size of the graph. However, for planar graphs, the minimum-quotient-cut problem appears more tractable, as Rao has developed several efficient approximation algorithms for the planar version of the problem capable of finding a cut whose quotient is at most some constant times optimal. In this paper, we improve Rao`s algorithms, both in terms of accuracy and speed. As our first result, we present two pseudopolynomial-time exact algorithms for the planar minimum-quotient-cut problem. As Rao`s most accurate approximation algorithm for the problem -- also a pseudopolynomial-time algorithm -- guarantees only a 1.5-times-optimal cut, our algorithms represent a significant advance.« less
给定一个图G = (V, E),每个顶点V {element_of}被赋予一个重量w (V)和每条边E {element_of} E分配成本c (E)的商分区的顶点V切成集年代和年代}{酒吧是c (S, S}{酒吧)/分钟{l_brace} w (S), w (S) {r_brace},其中c (S,{酒吧年代})是成本之和的边缘穿越削减和w (S)和w({酒吧年代})顶点的权值之和年代和年代}{酒吧,分别。近年来,寻找图中商最小的切的问题引起了相当大的关注,这在很大程度上要归功于Rao、Leighton和Rao的工作。他们已经证明,最小商切问题的算法(精确或近似)可以用来获得更著名的最小平衡切问题的近似算法,该问题需要找到一个cut (S,{bar S})最小化c(S,{bar S}),服从约束bW {le} w(S) {le} (1 {-} b) w,其中w是总顶点权值,b是范围0 < b{{1/2}内的某个固定平衡。不幸的是,对于一般图来说,最小商切问题是强np困难的,而对于一般问题,已知的最好的多项式时间近似算法只能保证商最多为to (lgn)倍最优的切,其中n是图的大小。然而,对于平面图形,最小商切问题似乎更容易处理,因为Rao已经开发了几种有效的近似算法来解决平面版本的问题,这些算法能够找到商最多是某个常数倍最优的切。在本文中,我们从精度和速度两个方面改进了Rao的算法。作为我们的第一个结果,我们给出了平面最小商切问题的两个伪多项式时间精确算法。由于Rao对该问题最精确的近似算法(也是伪多项式时间算法)只能保证1.5倍的最优切割,因此我们的算法代表了一个重大的进步。«少
{"title":"Finding minimum-quotient cuts in planar graphs","authors":"James K. Park, C. Phillips","doi":"10.1145/167088.167284","DOIUrl":"https://doi.org/10.1145/167088.167284","url":null,"abstract":"Given a graph G = (V, E) where each vertex v {element_of} V is assigned a weight w(v) and each edge e {element_of} E is assigned a cost c(e), the quotient of a cut partitioning the vertices of V into sets S and {bar S} is c(S, {bar S})/min{l_brace}w(S), w(S){r_brace}, where c(S, {bar S}) is the sum of the costs of the edges crossing the cut and w(S) and w({bar S}) are the sum of the weights of the vertices in S and {bar S}, respectively. The problem of finding a cut whose quotient is minimum for a graph has in recent years attracted considerable attention, due in large part to the work of Rao and Leighton and Rao. They have shown that an algorithm (exact or approximation) for the minimum-quotient-cut problem can be used to obtain an approximation algorithm for the more famous minimumb-balanced-cut problem, which requires finding a cut (S,{bar S}) minimizing c(S,{bar S}) subject to the constraint bW {le} w(S) {le} (1 {minus} b)W, where W is the total vertex weight and b is some fixed balance in the range 0 < b {le} {1/2}. Unfortunately, the minimum-quotient-cut problem is strongly NP-hard for general graphs, and themore » best polynomial-time approximation algorithm known for the general problem guarantees only a cut whose quotient is at mostO(lg n) times optimal, where n is the size of the graph. However, for planar graphs, the minimum-quotient-cut problem appears more tractable, as Rao has developed several efficient approximation algorithms for the planar version of the problem capable of finding a cut whose quotient is at most some constant times optimal. In this paper, we improve Rao`s algorithms, both in terms of accuracy and speed. As our first result, we present two pseudopolynomial-time exact algorithms for the planar minimum-quotient-cut problem. As Rao`s most accurate approximation algorithm for the problem -- also a pseudopolynomial-time algorithm -- guarantees only a 1.5-times-optimal cut, our algorithms represent a significant advance.« less","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124544888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Deterministic coding for interactive communication 交互式通信的确定性编码
Pub Date : 1993-06-01 DOI: 10.1145/167088.167279
L. Schulman
Two factors are prominent among those contributing to the increases in speed and storage capacity in current generations of computers. The first is increasing parallelism — whether in actual parallel and distributed computers, or among the steadily more numerous components of a sequential machine. The second is the dramatic miniaturization of logical devices and wires. The first of these factors greatly magnifies the number of interprocessor communications performed during any computation, while the second increases the noise level affecting transmissions. For these reasons, and on the basis that the role of noise should be understood in a model of a physical process, the following concern was recently identified as basic [10]. Consider a problem whose input is split between two processors connect ed by a communication link; and for which an interactive protocol exists which solves the problem in T transmissions on any input, provided the channel is noiseless. If in fact there is some noise on the channel, what is the effect upon the number of transmissions needed in order to solve the communication problem reliably? We describe a deterministic method for simulating noiseless-channel protocols on noisy channels, with only a constant slow-down. This is an analog for general interactive protocols of Shannon’s coding theorem, which dealt only with data transmission, i.e. one-way protocols [11]. This result im*Research supported by an NSF postdoctoral fellowship. Permission to copy without fee all or part of this material is granted provided that the copias are not made or distributed for direct commercial advantage, the ACM copyright notice and tha title of the publication and its date appear, and notioe is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-51931CA,USA 01993 ACM 0-89791 -591 -71931000510747 . .. S1.50 proves on recent work which provided a randomized simulation method for interactive protocols. The Shannon theorem is thus reproduced for the general interactive case, in all but the constant factor. The randomized method was fundamentally unsuited to further derandomization, and the deterministic solution is entirely different. A key role in the present work is played by tree codes, originally considered by Wozencraft [13] for the sake of comput ationally efficient decoding of noisy data transmissions. In their new setting tree codes are reinterpreted as a way of transforming a highly interactive protocol into one that behaves like a pair of one-way protocols, and which therefore can be implemented at both high rate and reliability y.
在促成当前几代计算机的速度和存储容量增加的因素中,有两个突出的因素。首先是不断增加的并行性——无论是在实际的并行和分布式计算机中,还是在顺序机器中数量越来越多的组件中。第二是逻辑器件和线路的急剧小型化。第一个因素大大增加了在任何计算过程中执行的处理器间通信的数量,而第二个因素增加了影响传输的噪声水平。由于这些原因,并且基于噪声在物理过程模型中的作用应该被理解,以下问题最近被确定为基本问题[10]。考虑这样一个问题,它的输入被两个由通信链路连接的处理器分割;并且存在一种交互式协议,该协议解决了在任何输入上的T传输中的问题,前提是信道是无噪声的。如果信道上确实存在一些噪声,那么为了可靠地解决通信问题所需的传输次数会受到什么影响?我们描述了一种确定性的方法来模拟噪声信道上的无噪声信道协议,只有一个恒定的慢速。这是对香农编码定理的一般交互协议的类比,它只处理数据传输,即单向协议[11]。该研究结果是由美国国家科学基金会博士后奖学金资助的。允许免费复制本材料的全部或部分内容,前提是这些复制不是为了直接的商业利益而制作或分发的,ACM版权声明、出版物标题和出版日期必须出现,并且要注明复制是由计算机协会许可的。以其他方式复制或重新发布需要付费和/或特定许可。25 ACM STOC ' 93-51931CA,USA 01993 ACM 0-89791 -591 -71931000510747 ..S1.50对最近的工作进行了验证,该工作为交互式协议提供了一种随机模拟方法。因此,香农定理在一般的相互作用情况下,除了常数因素外,在所有情况下都是适用的。随机化的方法根本不适合进一步的非随机化,而确定性的解决方案则完全不同。树码在本研究中发挥了关键作用,最初由wozraft[13]考虑,目的是为了对噪声数据传输进行计算效率解码。在他们的新设定中,树代码被重新解释为一种将高度交互的协议转换为行为类似于一对单向协议的协议的方式,因此可以以高速率和高可靠性实现。
{"title":"Deterministic coding for interactive communication","authors":"L. Schulman","doi":"10.1145/167088.167279","DOIUrl":"https://doi.org/10.1145/167088.167279","url":null,"abstract":"Two factors are prominent among those contributing to the increases in speed and storage capacity in current generations of computers. The first is increasing parallelism — whether in actual parallel and distributed computers, or among the steadily more numerous components of a sequential machine. The second is the dramatic miniaturization of logical devices and wires. The first of these factors greatly magnifies the number of interprocessor communications performed during any computation, while the second increases the noise level affecting transmissions. For these reasons, and on the basis that the role of noise should be understood in a model of a physical process, the following concern was recently identified as basic [10]. Consider a problem whose input is split between two processors connect ed by a communication link; and for which an interactive protocol exists which solves the problem in T transmissions on any input, provided the channel is noiseless. If in fact there is some noise on the channel, what is the effect upon the number of transmissions needed in order to solve the communication problem reliably? We describe a deterministic method for simulating noiseless-channel protocols on noisy channels, with only a constant slow-down. This is an analog for general interactive protocols of Shannon’s coding theorem, which dealt only with data transmission, i.e. one-way protocols [11]. This result im*Research supported by an NSF postdoctoral fellowship. Permission to copy without fee all or part of this material is granted provided that the copias are not made or distributed for direct commercial advantage, the ACM copyright notice and tha title of the publication and its date appear, and notioe is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-51931CA,USA 01993 ACM 0-89791 -591 -71931000510747 . .. S1.50 proves on recent work which provided a randomized simulation method for interactive protocols. The Shannon theorem is thus reproduced for the general interactive case, in all but the constant factor. The randomized method was fundamentally unsuited to further derandomization, and the deterministic solution is entirely different. A key role in the present work is played by tree codes, originally considered by Wozencraft [13] for the sake of comput ationally efficient decoding of noisy data transmissions. In their new setting tree codes are reinterpreted as a way of transforming a highly interactive protocol into one that behaves like a pair of one-way protocols, and which therefore can be implemented at both high rate and reliability y.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
Finiteness results for sigmoidal “neural” networks s型神经网络的有限性结果
Pub Date : 1993-06-01 DOI: 10.1145/167088.167192
A. Macintyre, Eduardo Sontag
Proc. 25th Annual Symp. Theory Computing , San Diego, May 1993 This paper deals with analog circuits. It establishes the finiteness of VC dimension, teaching dimension, and several other measures of sample complexity which arise in learning theory. It also shows that the equivalence of behaviors, and the loading problem, are effectively decidable, modulo a widely believed conjecture in number theory. The results, the first ones that are independent of weight size, apply when the gate function is the “standard sigmoid” commonly used in neural networks research. The proofs rely on very recent developments in the elementary theory of real numbers with exponentiation. (Some weaker conclusions are also given for more general analytic gate functions.) Applications to learnability of sparse polynomials are also mentioned.
第25届年会理论计算,圣地亚哥,1993年5月。它建立了VC维、教学维和学习理论中出现的其他几个样本复杂性度量的有限性。它还证明了行为的等价性和加载问题是有效可确定的,模是数论中一个广泛相信的猜想。当门函数是神经网络研究中常用的“标准s形”时,这些结果是第一个与权值大小无关的结果。这些证明依赖于最近在带幂的实数初等理论中的发展。(对于更一般的解析门函数也给出了一些较弱的结论。)本文还讨论了稀疏多项式在可学习性方面的应用。
{"title":"Finiteness results for sigmoidal “neural” networks","authors":"A. Macintyre, Eduardo Sontag","doi":"10.1145/167088.167192","DOIUrl":"https://doi.org/10.1145/167088.167192","url":null,"abstract":"Proc. 25th Annual Symp. Theory Computing , San Diego, May 1993 This paper deals with analog circuits. It establishes the finiteness of VC dimension, teaching dimension, and several other measures of sample complexity which arise in learning theory. It also shows that the equivalence of behaviors, and the loading problem, are effectively decidable, modulo a widely believed conjecture in number theory. The results, the first ones that are independent of weight size, apply when the gate function is the “standard sigmoid” commonly used in neural networks research. The proofs rely on very recent developments in the elementary theory of real numbers with exponentiation. (Some weaker conclusions are also given for more general analytic gate functions.) Applications to learnability of sparse polynomials are also mentioned.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
k one-way heads cannot do string-matching K个单向头不能进行字符串匹配
Pub Date : 1993-06-01 DOI: 10.1145/167088.167111
Tao Jiang, Ming Li
We settle a conjecture raised by Z. Galil and J. Seiferas 14 years ago (J. Comput. System Sci.26(1983), 280?294):k-head one-way deterministic finite automata cannot perform string-machine (i.e., accept the language {x#y??u?vy=uxv}), for anyknonsensing heads.
我们解决了Z. Galil和J. Seiferas在14年前提出的一个猜想。系统科学26(1983),280?294):对于任意感知头,k头单向确定性有限自动机不能执行字符串机(即,接受语言{x#y??u?vy=uxv})。
{"title":"k one-way heads cannot do string-matching","authors":"Tao Jiang, Ming Li","doi":"10.1145/167088.167111","DOIUrl":"https://doi.org/10.1145/167088.167111","url":null,"abstract":"We settle a conjecture raised by Z. Galil and J. Seiferas 14 years ago (J. Comput. System Sci.26(1983), 280?294):k-head one-way deterministic finite automata cannot perform string-machine (i.e., accept the language {x#y??u?vy=uxv}), for anyknonsensing heads.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Modified ranks of tensors and the size of circuits 修改张量的秩和电路的大小
Pub Date : 1993-06-01 DOI: 10.1145/167088.167228
P. Pudlák, V. Rödl
We consider a concept of the rank of a tensor which is related to the contact rank introduced by Razborov [15]. We prove some upper and lower bounds for the tensor of multiplication of polynomials mod (z” — 1) and derive some corollaries for contact rank, for the size of depth 2 algebraic and boolean circuits and for a multiparty communication complexity problem. In particular we give answers to a conjecture of A. A. Razborov and a problem of M.Saks and A. Wigderson.
我们考虑一个张量秩的概念,它与Razborov[15]引入的接触秩有关。我们证明了多项式乘法张量mod (z ' - 1)的一些上界和下界,并推导了接触秩、深度2代数和布尔电路的大小以及多方通信复杂性问题的一些推论。特别地,我们给出了a . a . Razborov的一个猜想和M.Saks和a . Wigderson的一个问题的答案。
{"title":"Modified ranks of tensors and the size of circuits","authors":"P. Pudlák, V. Rödl","doi":"10.1145/167088.167228","DOIUrl":"https://doi.org/10.1145/167088.167228","url":null,"abstract":"We consider a concept of the rank of a tensor which is related to the contact rank introduced by Razborov [15]. We prove some upper and lower bounds for the tensor of multiplication of polynomials mod (z” — 1) and derive some corollaries for contact rank, for the size of depth 2 algebraic and boolean circuits and for a multiparty communication complexity problem. In particular we give answers to a conjecture of A. A. Razborov and a problem of M.Saks and A. Wigderson.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122528404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1