首页 > 最新文献

Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing最新文献

英文 中文
A parallel approximation algorithm for positive linear programming 正线性规划的并行逼近算法
Pub Date : 1993-06-01 DOI: 10.1145/167088.167211
M. Luby, N. Nisan
We introduce a fast parallel approximation algorithm for the positive linear programming optimization problem, i.e. the special case of the linear programming optimization problem where the input constraint matrix and constraint vector consist entirely of positive entries. The algorithm is elementary, and has a simple parallel implementation that runs in polylog time using a linear number of processors.
针对线性规划优化问题,即输入约束矩阵和约束向量完全由正项组成的线性规划优化问题的特殊情况,提出了一种快速并行逼近算法。该算法是基本的,并且有一个简单的并行实现,使用线性数量的处理器在多对数时间内运行。
{"title":"A parallel approximation algorithm for positive linear programming","authors":"M. Luby, N. Nisan","doi":"10.1145/167088.167211","DOIUrl":"https://doi.org/10.1145/167088.167211","url":null,"abstract":"We introduce a fast parallel approximation algorithm for the positive linear programming optimization problem, i.e. the special case of the linear programming optimization problem where the input constraint matrix and constraint vector consist entirely of positive entries. The algorithm is elementary, and has a simple parallel implementation that runs in polylog time using a linear number of processors.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"20 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114022860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 206
Comparison-based search in the presence of errors 在存在错误的情况下进行基于比较的搜索
Pub Date : 1993-06-01 DOI: 10.1145/167088.167129
Ryan S. Borgstrom, S. R. Kosaraju
The classic problem of searching an ordered list becomes more complicated when the answers to queries are not reliable. In the prefix-bounded error model, the number of incorrect responses at no point exceeds r times the number of questions, where r is a fixed positive fraction strictly less than ~. We present efficient algorithms for searching in this error model, and we also establish nontrivial lower bounds for sorting, maxima finding, and related problems.
当查询的答案不可靠时,搜索有序列表的经典问题变得更加复杂。在前缀有界误差模型中,任何点的错误回答数都不超过问题数的r倍,其中r是一个严格小于~的固定正分数。我们提出了在这个错误模型中搜索的有效算法,并且我们还建立了排序、最大值查找和相关问题的非平凡下界。
{"title":"Comparison-based search in the presence of errors","authors":"Ryan S. Borgstrom, S. R. Kosaraju","doi":"10.1145/167088.167129","DOIUrl":"https://doi.org/10.1145/167088.167129","url":null,"abstract":"The classic problem of searching an ordered list becomes more complicated when the answers to queries are not reliable. In the prefix-bounded error model, the number of incorrect responses at no point exceeds r times the number of questions, where r is a fixed positive fraction strictly less than ~. We present efficient algorithms for searching in this error model, and we also establish nontrivial lower bounds for sorting, maxima finding, and related problems.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117027805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
What can be computed locally? 什么可以在本地计算?
Pub Date : 1993-06-01 DOI: 10.1145/167088.167149
M. Naor, L. Stockmeyer
The purpose of this paper is a study of computation that can be done locally in a distributed network, where "locally" means within time (or distance) independent of the size of the network. Locally checkable labeling (LCL) problems are considered, where the legality of a labeling can be checked locally (e.g., coloring). The results include the following: There are nontrivial LCL problems that have local algorithms. There is a variant of the dining philosophers problem that can be solved locally. Randomization cannot make an LCL problem local; i.e., if a problem has a local randomized algorithm then it has a local deterministic algorithm. It is undecidable, in general, whether a given LCL has a local algorithm. However, it is decidable whether a given LCL has an algorithm that operates in a given time $t$. Any LCL problem that has a local algorithm has one that is order-invariant (the algorithm depends only on the order of the processor IDs).
本文的目的是研究可以在分布式网络中本地完成的计算,其中“本地”意味着在时间(或距离)内独立于网络的大小。考虑局部可检查标签(LCL)问题,其中标签的合法性可以在局部检查(例如,着色)。结果包括:存在具有局部算法的非平凡LCL问题。用餐哲学家问题还有一种变体,可以在当地解决。随机化不能使LCL问题局部化;也就是说,如果一个问题有一个局部随机算法,那么它有一个局部确定性算法。一般来说,给定的LCL是否具有局部算法是不可确定的。然而,给定的LCL是否具有在给定时间内运行的算法是可以确定的。任何具有局部算法的LCL问题都有一个顺序不变的算法(算法仅依赖于处理器id的顺序)。
{"title":"What can be computed locally?","authors":"M. Naor, L. Stockmeyer","doi":"10.1145/167088.167149","DOIUrl":"https://doi.org/10.1145/167088.167149","url":null,"abstract":"The purpose of this paper is a study of computation that can be done locally in a distributed network, where \"locally\" means within time (or distance) independent of the size of the network. Locally checkable labeling (LCL) problems are considered, where the legality of a labeling can be checked locally (e.g., coloring). The results include the following: \u0000There are nontrivial LCL problems that have local algorithms. \u0000There is a variant of the dining philosophers problem that can be solved locally. \u0000Randomization cannot make an LCL problem local; i.e., if a problem has a local randomized algorithm then it has a local deterministic algorithm. \u0000It is undecidable, in general, whether a given LCL has a local algorithm. \u0000However, it is decidable whether a given LCL has an algorithm that operates in a given time $t$. \u0000Any LCL problem that has a local algorithm has one that is order-invariant (the algorithm depends only on the order of the processor IDs).","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126963552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Asynchronous secure computation 异步安全计算
Pub Date : 1993-06-01 DOI: 10.1145/167088.167109
M. Ben-Or, R. Canetti, Oded Goldreich
We initiate a study of security in asynchronous networks. We consider a completely asynchronous network where every two parties are connected via a private channel, and some of the parties may be faulty. We start by defining secure computation in this model. Our definition adapts the underlying principles of defining security (i.e., comparing the computation to a computation in the presence of a trusted party) to the asynchronous model. In particular, our definition takes into account the fact that the computation must be completed even if we never hear from the faulty parties. Next, we show that whatever can be securely computed in an asynchronous network in the presence of a trusted party, can be securely computed in a network in which no such trusted party exists. We distinguish two types of faults. In case of Fail-Stop faults, our construction is valid as long as the faulty parties constitute less than a thzr-d of the parties in the network. In case of general (i.e., Byzantine) faults, our construction requires that the faulty parties are less than a fourth fraction. In both cases, the resilience of our construction is optimal. Our construction generalizes known synchronous constructions by Ben-Or, Goldwasser and Wigderson. In addition, we introduce and implement several new asynchronous primitives. Among these, we note an errorless asynchronous verifiable secret sharing scheme, an asynchronous agreement on a large set that is contained in the dynamical y growing inputs of all non-faulty parties, and an on-line error-correcting procedure. * email: benor@cs.huji.ac.il t ~~ail.. canetti@tx .technion.ac.il %email: odedrfiks.technion. ac.il. Supported by grant no. 8900312 from the United States — Israel Binational Science Foundation, Jerusalem, Israel Permission to copy without fee all or part of this material ia granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appaar, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwiee, or to republish, requiree a fee and/or specific permission. 25th ACM STOC ‘93-5 /93/CA, USA G 1993 ACM 0-89791 -591 -7/93 /0005 [0052 . ..$1 .50 Computer Science Dept. of Computer Science
我们开始研究异步网络的安全性。我们考虑一个完全异步的网络,其中每两方都通过专用通道连接,其中一些方可能出现故障。我们首先在这个模型中定义安全计算。我们的定义将定义安全性的基本原则(即,将计算与存在可信方的计算进行比较)应用于异步模型。特别是,我们的定义考虑了这样一个事实,即即使我们从未收到错误方的消息,计算也必须完成。接下来,我们将展示在存在可信方的异步网络中可以安全计算的任何内容,在不存在此类可信方的网络中也可以安全计算。我们区分出两种类型的断层。在Fail-Stop故障的情况下,我们的构造是有效的,只要故障方占网络各方的比例小于1 / 3。在一般(即拜占庭)故障的情况下,我们的构造要求故障方小于四分之一。在这两种情况下,我们的建筑的弹性都是最佳的。我们的构造推广了Ben-Or, Goldwasser和Wigderson已知的同步构造。此外,我们还引入并实现了几个新的异步原语。其中,我们注意到一个无错误异步可验证秘密共享方案,一个包含在所有无错误方的动态y增长输入中的大集合上的异步协议,以及一个在线纠错过程。*邮箱:benor@cs.huji.ac.il t ~~ail..canetti@tx .technion.ac。电子邮件:odedrfiks.technion。ac.il。资助项目:8900312(美国-以色列两国科学基金会,耶路撒冷,以色列)允许免费复制本材料的全部或部分,前提是这些副本不是为了直接的商业利益而制作或分发的,ACM版权声明和出版物的标题及其日期,并通知复制是由计算机械协会许可的。复制他人,或重新发布,需要支付费用和/或特定许可。25 ACM STOC ' 93-5 /93/CA, USA G 1993 ACM 0-89791 -591 -7/93 /0005[0052 .…]$ 1.50计算机科学计算机科学系
{"title":"Asynchronous secure computation","authors":"M. Ben-Or, R. Canetti, Oded Goldreich","doi":"10.1145/167088.167109","DOIUrl":"https://doi.org/10.1145/167088.167109","url":null,"abstract":"We initiate a study of security in asynchronous networks. We consider a completely asynchronous network where every two parties are connected via a private channel, and some of the parties may be faulty. We start by defining secure computation in this model. Our definition adapts the underlying principles of defining security (i.e., comparing the computation to a computation in the presence of a trusted party) to the asynchronous model. In particular, our definition takes into account the fact that the computation must be completed even if we never hear from the faulty parties. Next, we show that whatever can be securely computed in an asynchronous network in the presence of a trusted party, can be securely computed in a network in which no such trusted party exists. We distinguish two types of faults. In case of Fail-Stop faults, our construction is valid as long as the faulty parties constitute less than a thzr-d of the parties in the network. In case of general (i.e., Byzantine) faults, our construction requires that the faulty parties are less than a fourth fraction. In both cases, the resilience of our construction is optimal. Our construction generalizes known synchronous constructions by Ben-Or, Goldwasser and Wigderson. In addition, we introduce and implement several new asynchronous primitives. Among these, we note an errorless asynchronous verifiable secret sharing scheme, an asynchronous agreement on a large set that is contained in the dynamical y growing inputs of all non-faulty parties, and an on-line error-correcting procedure. * email: benor@cs.huji.ac.il t ~~ail.. canetti@tx .technion.ac.il %email: odedrfiks.technion. ac.il. Supported by grant no. 8900312 from the United States — Israel Binational Science Foundation, Jerusalem, Israel Permission to copy without fee all or part of this material ia granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appaar, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwiee, or to republish, requiree a fee and/or specific permission. 25th ACM STOC ‘93-5 /93/CA, USA G 1993 ACM 0-89791 -591 -7/93 /0005 [0052 . ..$1 .50 Computer Science Dept. of Computer Science","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126290528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 212
Locality based graph coloring 基于局域的图着色
Pub Date : 1993-06-01 DOI: 10.1145/167088.167156
M. Szegedy, S. Vishwanathan
We study the problem of locality based graph coloring. This problem is motivated by the problem of assigning time slots for broadcast in mobile packet radio networks. This problem has also been studied in the context of distributed and parallel graph coloring [4, 6, 9, 8]. In this problem, one has to design a coloring algorithm that assigns a color to a vertex based on the label of the vertex and the labels on its neighbors. Linial proved an upper bound of O(A2 log n) and a lower bound of fl(log log n) on the number of colors needed to locally color an n-vertex graph with maximum vertex degree A [9, 8]. His main motivation was that repeated application of local coloring gives a fast algorithm for distributed coloring. He proved that one could get a A2 coloring in O(log* n) steps this way. In this paper we improve upon the bounds for the problem of local coloring. Using a new characterization in terms of a family of set systems we design a randomized algorithm for the problem and prove an upper bound of O(A. 2A log log n). An important question left open in Linial’s paper was the case of large A. The best lower bound was A + 1. Linial observed that a result of Erdos, Frankl and Furedi implied that his method cannot be applied to reduce the number of colors to below (A~2). We obtain lower bounds that match the upper bounds within a factor that is poly-logarithmic in terms of these bounds. Of particular interest we have very precise bounds for the case when A > 2+. These bounds are useful to obtain a heuristic estimate on the *Researchsupported in part by Ketan Mulmuley’s Packard Fellowship. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of tha Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-51931CA, LJSA
研究了基于局部性的图着色问题。这个问题是由移动分组无线网络中广播时隙的分配问题引起的。这个问题也在分布和并行图着色的背景下进行了研究[4,6,9,8]。在这个问题中,必须设计一种着色算法,根据顶点的标签及其相邻顶点的标签为顶点分配颜色。Linial证明了顶点度最大为a的n顶点图局部上色所需颜色数的上界为O(A2 log n),下界为fl(log log n)[9,8]。他的主要动机是重复应用局部着色可以得到一个快速的分布式着色算法。他证明了用这种方法可以在O(log* n)步内得到A2着色。本文对局部着色问题的界进行了改进。利用一组集系统的新表征,我们设计了一个随机算法,并证明了O(a)的上界。在Linial的论文中还有一个重要的问题没有解决,那就是大A的情况,最好的下界是A + 1。Linial观察到Erdos, Frankl和Furedi的结果表明他的方法不能用于将颜色数量减少到(a ~2)以下。我们得到了与上界相匹配的下界在一个多对数因子的范围内。特别有趣的是,我们有非常精确的边界当A >2 +。这些界限对于获得由kean Mulmuley的Packard Fellowship部分支持的*研究的启发式估计是有用的。允许免费复制本材料的全部或部分,前提是这些副本不是为了直接的商业利益而制作或分发的,必须出现ACM版权声明、出版物的标题和日期,并注明复制是由计算机协会许可的。以其他方式复制或重新发布需要付费和/或特定许可。25 ACM STOC ' 93-51931CA, LJSA
{"title":"Locality based graph coloring","authors":"M. Szegedy, S. Vishwanathan","doi":"10.1145/167088.167156","DOIUrl":"https://doi.org/10.1145/167088.167156","url":null,"abstract":"We study the problem of locality based graph coloring. This problem is motivated by the problem of assigning time slots for broadcast in mobile packet radio networks. This problem has also been studied in the context of distributed and parallel graph coloring [4, 6, 9, 8]. In this problem, one has to design a coloring algorithm that assigns a color to a vertex based on the label of the vertex and the labels on its neighbors. Linial proved an upper bound of O(A2 log n) and a lower bound of fl(log log n) on the number of colors needed to locally color an n-vertex graph with maximum vertex degree A [9, 8]. His main motivation was that repeated application of local coloring gives a fast algorithm for distributed coloring. He proved that one could get a A2 coloring in O(log* n) steps this way. In this paper we improve upon the bounds for the problem of local coloring. Using a new characterization in terms of a family of set systems we design a randomized algorithm for the problem and prove an upper bound of O(A. 2A log log n). An important question left open in Linial’s paper was the case of large A. The best lower bound was A + 1. Linial observed that a result of Erdos, Frankl and Furedi implied that his method cannot be applied to reduce the number of colors to below (A~2). We obtain lower bounds that match the upper bounds within a factor that is poly-logarithmic in terms of these bounds. Of particular interest we have very precise bounds for the case when A > 2+. These bounds are useful to obtain a heuristic estimate on the *Researchsupported in part by Ketan Mulmuley’s Packard Fellowship. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of tha Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-51931CA, LJSA","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
An Õ(n2) algorithm for minimum cuts 最小切割的Õ(n2)算法
Pub Date : 1993-06-01 DOI: 10.1145/167088.167281
David R Karger, C. Stein
A minimum cut is a set of edges of minimum weight whose removal disconnects a given graph. Minimum cut algorithms historically applied duality with maximum flows and thus had the same 0 (inn) running time as maximum flow algorithms. More recent algorithms which are not based on maximum flows also require fl (inn) time. In this paper, we present the first algorithm that breaks the tl(mn) “max-flow barrier” for finding minimum cuts in weighted undirected graphs. We give a strongly polynomial randomized algorithm which finds a minimum cut with high probability in 0(n2 log3 n) time. This suggests that the rein-cut problem might be fundamentally easier to solve than the maximum flow problem. Our algorithm can be implemented in 72JUC using only nz processors—this is the first efficient 7UfC algorithm for the rein-cut problem. Our algorithm is simple and uses no complicated data structures.
最小切割是一组权值最小的边的集合,移除这些边会断开给定图的连接。最小切割算法历来采用最大流量的对偶性,因此与最大流量算法具有相同的0 (inn)运行时间。不基于最大流量的最新算法也需要fl (inn)时间。在本文中,我们提出了第一个打破tl(mn)“最大流量障碍”的算法,用于寻找加权无向图中的最小切割。我们给出了一个强多项式随机化算法,该算法在0(n2 log3n)时间内以高概率找到最小割点。这表明,节流问题可能从根本上比最大流量问题更容易解决。我们的算法可以在72JUC中仅使用nz处理器来实现——这是第一个针对截弦问题的高效7UfC算法。算法简单,不使用复杂的数据结构。
{"title":"An Õ(n2) algorithm for minimum cuts","authors":"David R Karger, C. Stein","doi":"10.1145/167088.167281","DOIUrl":"https://doi.org/10.1145/167088.167281","url":null,"abstract":"A minimum cut is a set of edges of minimum weight whose removal disconnects a given graph. Minimum cut algorithms historically applied duality with maximum flows and thus had the same 0 (inn) running time as maximum flow algorithms. More recent algorithms which are not based on maximum flows also require fl (inn) time. In this paper, we present the first algorithm that breaks the tl(mn) “max-flow barrier” for finding minimum cuts in weighted undirected graphs. We give a strongly polynomial randomized algorithm which finds a minimum cut with high probability in 0(n2 log3 n) time. This suggests that the rein-cut problem might be fundamentally easier to solve than the maximum flow problem. Our algorithm can be implemented in 72JUC using only nz processors—this is the first efficient 7UfC algorithm for the rein-cut problem. Our algorithm is simple and uses no complicated data structures.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
How to use expert advice 如何使用专家建议
Pub Date : 1993-06-01 DOI: 10.1145/167088.167198
N. Cesa-Bianchi, Y. Freund, D. Helmbold, D. Haussler, R. Schapire, Manfred K. Warmuth
We analyze algorithms that predict a binary value by combining the predictions of several prediction strategies, called `experts''. Our analysis is for worst-case situations, i.e., we make no assumptions about the way the sequence of bits to be predicted is generated. We measure the performance of the algorithm by the difference between the expected number of mistakes it makes on the bit sequence and the expected number of mistakes made by the best expert on this sequence, where the expectation is taken with respect to the randomization in the predictions. We show that the minimum achievable difference is on the order of the square root of the number of mistakes of the best expert, and we give efficient algorithms that achieve this. Our upper and lower bounds have matching leading constants in most cases. We then show how this leads to certain kinds of pattern recognition/learning algorithms with performance bounds that improve on the best results currently known in this context. We also extend our analysis to the case in which log loss is used instead of the expected number of mistakes.
我们分析通过结合几种预测策略(称为“专家”)的预测来预测二值的算法。我们的分析是针对最坏的情况,也就是说,我们对要预测的比特序列的生成方式不做任何假设。我们通过它在比特序列上所犯的期望错误数与最好的专家在该序列上所犯的期望错误数之间的差来衡量算法的性能,其中期望是相对于预测中的随机化的。我们表明,最小可实现的差异是在最好的专家的错误数量的平方根的数量级上,并且我们给出了实现这一目标的有效算法。在大多数情况下,上界和下界的前导常数是匹配的。然后,我们展示了这如何导致某些具有性能界限的模式识别/学习算法,这些算法可以改进当前已知的最佳结果。我们还将分析扩展到使用日志损失而不是预期错误数量的情况。
{"title":"How to use expert advice","authors":"N. Cesa-Bianchi, Y. Freund, D. Helmbold, D. Haussler, R. Schapire, Manfred K. Warmuth","doi":"10.1145/167088.167198","DOIUrl":"https://doi.org/10.1145/167088.167198","url":null,"abstract":"We analyze algorithms that predict a binary value by combining the predictions of several prediction strategies, called `experts''. Our analysis is for worst-case situations, i.e., we make no assumptions about the way the sequence of bits to be predicted is generated. We measure the performance of the algorithm by the difference between the expected number of mistakes it makes on the bit sequence and the expected number of mistakes made by the best expert on this sequence, where the expectation is taken with respect to the randomization in the predictions. We show that the minimum achievable difference is on the order of the square root of the number of mistakes of the best expert, and we give efficient algorithms that achieve this. Our upper and lower bounds have matching leading constants in most cases. We then show how this leads to certain kinds of pattern recognition/learning algorithms with performance bounds that improve on the best results currently known in this context. We also extend our analysis to the case in which log loss is used instead of the expected number of mistakes.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128906179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 656
More deterministic simulation in logspace 在日志空间中更确定的模拟
Pub Date : 1993-06-01 DOI: 10.1145/167088.167162
N. Nisan, David Zuckerman
We show that any randomized space(S) algorithm which uses only poly(S) random bits can be simulated deterministically in space(S), for S(n) ~ log n. Of independent interest is our main technical tool: a procedure which extracts randomness from a defective random source using a small additional number of truly random bits.
我们证明了任何只使用多(S)随机比特的随机空间(S)算法都可以在空间(S)中确定性地模拟,为S(n) ~ log n。独立感兴趣的是我们的主要技术工具:一个使用少量额外的真正随机比特从有缺陷的随机源中提取随机性的过程。
{"title":"More deterministic simulation in logspace","authors":"N. Nisan, David Zuckerman","doi":"10.1145/167088.167162","DOIUrl":"https://doi.org/10.1145/167088.167162","url":null,"abstract":"We show that any randomized space(S) algorithm which uses only poly(S) random bits can be simulated deterministically in space(S), for S(n) ~ log n. Of independent interest is our main technical tool: a procedure which extracts randomness from a defective random source using a small additional number of truly random bits.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
Mapping the genome: some combinatorial problems arising in molecular biology 基因组图谱:分子生物学中出现的一些组合问题
Pub Date : 1993-06-01 DOI: 10.1145/167088.167170
R. Karp
The ultimate goal of the Human Genome Project and many other efforts in molecular biology is to sequence the chromosomal DNA of humans and other species and elucidate the genetic information contained therein. A less ambitious intermediate goal is to construct physical maps of our 23 pairs of chromosomes. A physical map specifies the locations of markers identifiable fragments of DNA along the DNA molecule. These markers provide a kind of random access to the linear DNA molecule. To locate a feature of interest such as a gene, an experimenter can start at a marker that is known to be close to the gene and “walk” along the DNA until the gene is identified.
人类基因组计划和分子生物学的许多其他努力的最终目标是对人类和其他物种的染色体DNA进行测序,并阐明其中包含的遗传信息。一个不那么雄心勃勃的中间目标是构建我们23对染色体的物理图谱。物理地图指定沿DNA分子标记可识别的DNA片段的位置。这些标记提供了一种随机进入线性DNA分子的途径。为了找到一个感兴趣的特征,比如一个基因,实验者可以从一个已知与该基因接近的标记开始,沿着DNA“行走”,直到识别出该基因。
{"title":"Mapping the genome: some combinatorial problems arising in molecular biology","authors":"R. Karp","doi":"10.1145/167088.167170","DOIUrl":"https://doi.org/10.1145/167088.167170","url":null,"abstract":"The ultimate goal of the Human Genome Project and many other efforts in molecular biology is to sequence the chromosomal DNA of humans and other species and elucidate the genetic information contained therein. A less ambitious intermediate goal is to construct physical maps of our 23 pairs of chromosomes. A physical map specifies the locations of markers identifiable fragments of DNA along the DNA molecule. These markers provide a kind of random access to the linear DNA molecule. To locate a feature of interest such as a gene, an experimenter can start at a marker that is known to be close to the gene and “walk” along the DNA until the gene is identified.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116619752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 167
Reinventing the wheel: an optimal data structure for connectivity queries 重新发明轮子:连接性查询的最佳数据结构
Pub Date : 1993-06-01 DOI: 10.1145/167088.167152
R. Cohen, G. Battista, A. Kanevsky, R. Tamassia
We show that, for any fixed k, there exists an optimal O(n)-space compact representation of a k-connected graph G with n vertices, such that one can determine in O(1) time whether two vertices areconnectedbyk+l vertex-dkjoint paths, or are separated by k vertices/edges. Previously, the existence of such compact representations was known only for k <3. 1 Summary of Results A fundamental issue for the fault-tolerance and reliabilityofnetworksis determining the existence of multiple disjoint paths connecting two nodes. In this paper we investigate the problem of constructing a compact representation of a graph so that one can test quickly for the existence of such paths. *Research supported in part by the National ScienceFoundation under grant CCR9007851, by the U.S. Army Research Office under grant DAAL03-91-G-o035, by the Office of Naval Research and the Defense Advanced Research Projects Agency under contract NOO014-91-J-4052, ARPA order 8225, by the NATO Scientific Affairs Division under collaborative research grant 911016, by the Pro get t o Finalimato Sisterni Informatici e Calcolo ParaUelo of the Italian National Research Council, and by the Esprit II BRA of the European Community (project ALCOM). t Department of Computer Science, University of Newcastle, Callaghan, New South Wales 2308, Australia. The work of this author was carried out in part while visiting the United States Coast Guard Academy and Brown University. t Dip=tirnento & Inforrnatica e %ternist.ica, Universit& & Roma ‘[La Sapienza”, Via Salaria 113, 00198 Rome, Italy, 5Department of Computer Science, Texas A&M University, College Station, TX 77843-3112. f Depmtment of Computer Science, Brown University, providence, RI 02912–1910. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-5193 /CA, USA 9 1993 ACM 0-89791 -591 -7/93 /0005 /0794 . ..$1.!50 Given a graph G, we say that vertices v’ and vII of G are k-connected if there are k vertex-diajoint paths between vi and v“. Graph G is said to be kconnected if every pair of vertices is k-connected. Let G be a k-connected graph. A k-cut of G ia a k-tuple U={tl,... t} , k , where each t~ is a vertex or an edge, such that removing U disconnects G. By Menger’a theorem [5], G is (k + I )-connected if and only if it has no k-cut. We say that a k-cut U separates subsets V’ and V“ of vertices if U n V’ = U n V“ = 0, and there ia no connected component of G — U containing vertices of both V’ and V“. A (k + I)-connectivity query for vertices v’ and v“ of a k-connected graph G, denoted (k + I)-Paths(v’, v“), returns -true if v’ and v“ are (k + I)-connected, and otherwise retu
我们证明,对于任意固定的k,存在一个具有n个顶点的k连通图G的最优O(n)空间紧表示,使得人们可以在O(1)时间内确定两个顶点是由k+ 1个顶点连接路径连接,还是由k个顶点/边分开。以前,只有在k <3时才知道这种紧表示的存在性。网络容错和可靠性的一个基本问题是确定连接两个节点的多条不相交路径的存在性。在本文中,我们研究了构造一个图的紧表示的问题,以便人们可以快速地测试这样的路径的存在性。*部分研究由国家科学基金会(CCR9007851)、美国陆军研究办公室(daal03 -91- g - 035)、海军研究办公室和国防高级研究计划局(no014 -91- j -4052)、ARPA订单8225、北约科学事务部(911016)、意大利国家研究委员会(nrc)最终信息系统和Calcolo ParaUelo项目资助。欧共体的Esprit II BRA (ALCOM项目)。t纽卡斯尔大学计算机科学系,澳大利亚新南威尔士州卡拉汉2308本作者的部分工作是在访问美国海岸警卫队学院和布朗大学期间进行的。it + it + it + it + it + it + it + it + it + it + it + it + it。5 .德克萨斯农工大学计算机科学系,大学城,德克萨斯州77843-3112。f布朗大学计算机科学系,加州普罗维登斯02912-1910允许免费复制本材料的全部或部分,前提是这些副本不是为了直接的商业利益而制作或分发的,必须出现ACM版权声明、出版物的标题和日期,并注明复制是由计算机协会许可的。以其他方式复制或重新发布需要付费和/或特定许可。25 ACM STOC ' 93-5193 /CA, USA 9 1993 ACM 0-89791 -591 -7/93 /0005 /0794…$1 !50给定一个图G,如果在vi和v”之间有k个顶点不相交的路径,我们说G的顶点v '和vII是k连通的。如果图G的每个顶点对都是k连通的,则称图G是连通的。设G是一个k连通图。k元组U={tl,…t}, k,其中每个t~是一个顶点或一条边,使得移除U断开G。根据门格尔定理[5],G是(k + I)连通的当且仅当它没有k-cut。我们说,如果U n V ' = U n V ' = 0,则k-cut U将顶点的子集V '和V "分开,并且G - U中不存在同时包含V '和V "顶点的连通分量。对于k连通图G的顶点v '和v ",表示为(k + I)-Paths(v ', v ")的(k + I)-连通性查询,如果v '和v "是(k + I)连通,则返回-true,否则返回分隔v '和v "的k-cut。本文证明了对于任意固定的k,存在(k + 1)个连通顶点对的最优紧表示。也就是说,我们提出了一个O(rz)空间的数据结构,它支持在O(1)时间内对k个连接的n顶点图进行(k + l)个连接查询。在此之前,这种紧表示的存在性仅在k <3时才被建立[1,3,7,9]。虽然可以有f2(rz2)个k-cuts[2],但我们的数据结构是基于O (n)个k-cuts的递归分解图,这样任何两个不(k+ 1)连接的顶点都被这个aet的k-cut分开。这种递归分解使用了名为“wheels”和“flowers”的结构,它们重新解释和推广了先前在[3]中为3连通图定义的相应结构。如果我们考虑边缘连接,LG。,边连接路径和仅由边组成的k-cut,那么问题就变成了回答边连通性查询的问题,对此,可以从边k-cut的表示中得到一个有效的数据结构[4](参见[6])。顶点连通性问题通常比相应的边连通性问题更难。我们的结果表明,对于任何固定k的(k + 1)-连通性查询,情况并非如此。
{"title":"Reinventing the wheel: an optimal data structure for connectivity queries","authors":"R. Cohen, G. Battista, A. Kanevsky, R. Tamassia","doi":"10.1145/167088.167152","DOIUrl":"https://doi.org/10.1145/167088.167152","url":null,"abstract":"We show that, for any fixed k, there exists an optimal O(n)-space compact representation of a k-connected graph G with n vertices, such that one can determine in O(1) time whether two vertices areconnectedbyk+l vertex-dkjoint paths, or are separated by k vertices/edges. Previously, the existence of such compact representations was known only for k <3. 1 Summary of Results A fundamental issue for the fault-tolerance and reliabilityofnetworksis determining the existence of multiple disjoint paths connecting two nodes. In this paper we investigate the problem of constructing a compact representation of a graph so that one can test quickly for the existence of such paths. *Research supported in part by the National ScienceFoundation under grant CCR9007851, by the U.S. Army Research Office under grant DAAL03-91-G-o035, by the Office of Naval Research and the Defense Advanced Research Projects Agency under contract NOO014-91-J-4052, ARPA order 8225, by the NATO Scientific Affairs Division under collaborative research grant 911016, by the Pro get t o Finalimato Sisterni Informatici e Calcolo ParaUelo of the Italian National Research Council, and by the Esprit II BRA of the European Community (project ALCOM). t Department of Computer Science, University of Newcastle, Callaghan, New South Wales 2308, Australia. The work of this author was carried out in part while visiting the United States Coast Guard Academy and Brown University. t Dip=tirnento & Inforrnatica e %ternist.ica, Universit& & Roma ‘[La Sapienza”, Via Salaria 113, 00198 Rome, Italy, 5Department of Computer Science, Texas A&M University, College Station, TX 77843-3112. f Depmtment of Computer Science, Brown University, providence, RI 02912–1910. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. 25th ACM STOC ‘93-5193 /CA, USA 9 1993 ACM 0-89791 -591 -7/93 /0005 /0794 . ..$1.!50 Given a graph G, we say that vertices v’ and vII of G are k-connected if there are k vertex-diajoint paths between vi and v“. Graph G is said to be kconnected if every pair of vertices is k-connected. Let G be a k-connected graph. A k-cut of G ia a k-tuple U={tl,... t} , k , where each t~ is a vertex or an edge, such that removing U disconnects G. By Menger’a theorem [5], G is (k + I )-connected if and only if it has no k-cut. We say that a k-cut U separates subsets V’ and V“ of vertices if U n V’ = U n V“ = 0, and there ia no connected component of G — U containing vertices of both V’ and V“. A (k + I)-connectivity query for vertices v’ and v“ of a k-connected graph G, denoted (k + I)-Paths(v’, v“), returns -true if v’ and v“ are (k + I)-connected, and otherwise retu","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"76 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123159906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1