28th Annual Symposium on Foundations of Computer Science (sfcs 1987)最新文献

筛选
英文 中文
Generic oracles and oracle classes 通用的oracle和oracle类
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.30
M. Blum, R. Impagliazzo
{"title":"Generic oracles and oracle classes","authors":"M. Blum, R. Impagliazzo","doi":"10.1109/SFCS.1987.30","DOIUrl":"https://doi.org/10.1109/SFCS.1987.30","url":null,"abstract":"In this paper, we examine various complexity issues relative to an oracle for a generic set in order to determine which are the more \"natural\" conjectures for these issues. Generic oracle results should be viewed as parallels to random oracle results, as in [BG]; the two are in many ways related, but, as we shall exhibit, not equivalent. Looking at computation relative to a generic oracle is in some ways a better reflection of computation without an oracle; for example, whereas adding a random oracle allows a deterministic polynomial-time machine to solve any problem in BPP, adding a generic oracle will not help solve any recursive problem faster than it could be solved without an oracle. Generic sets were first introduced by Cohen as a tool for proving independence results in set theory [Co]. Their recursion theoretic properties have also been explored in depth; for example, see [J] and [Ku2]. Some related work using forcing and/or generic sets as tools in oracle constructions can be found in [Ku3], [Do], [P], and [A-SFH]. However, this is to our knowledge the first knowledge the first thorough examination of complexity relative to a generic Oracle.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Lower bounds to randomized algorithms for graph properties 图属性随机化算法的下界
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.39
A. Yao
{"title":"Lower bounds to randomized algorithms for graph properties","authors":"A. Yao","doi":"10.1109/SFCS.1987.39","DOIUrl":"https://doi.org/10.1109/SFCS.1987.39","url":null,"abstract":"For any property P on n-vertex graphs, let C(P) be the minimum number of edges that need to be examined by any decision tree algorithm for determining P. In 1975 Rivest and Vuillemin settled the Aanderra-Rosenberg Conjecture, proving that C(P) = Ω(n2) for every nontrivial monotone graph property P. An intriguing open question is whether the theorem remains true when randomized algorithms are allowed. In this paper we report progress on this problem, showing that Ω(n(log n)1/12) edges must be examined by a randomized algorithm for determining any nontrivial monotone graph property.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132528245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
A new parallel algorithm for the maximal independent set problem 求解最大独立集问题的一种新的并行算法
M. Goldberg, T. Spencer
{"title":"A new parallel algorithm for the maximal independent set problem","authors":"M. Goldberg, T. Spencer","doi":"10.1137/0218029","DOIUrl":"https://doi.org/10.1137/0218029","url":null,"abstract":"A new parallel algorithm for the maximal independent set problem (MIS) is constructed. It runs in O(log4 n) time when implemented on a linear number of EREW-processors. This is the first deterministic algorithm for MIS whose running time is polylogarithmic and whose processor-time product is optimal up to a polylogarithmic factor.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114230291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
Functional decomposition of polynomials 多项式的泛函分解
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.29
J. Gathen, D. Kozen, S. Landau
{"title":"Functional decomposition of polynomials","authors":"J. Gathen, D. Kozen, S. Landau","doi":"10.1109/SFCS.1987.29","DOIUrl":"https://doi.org/10.1109/SFCS.1987.29","url":null,"abstract":"Fast DecoIIlposition in the tame case 2 polynomials over F. We obtain a range of results, trom Ulldecidability over sufficiently general fields to fast sequential and parallel algorithms over finite fields. A version of the algorithm of Theorem 1 below has beel implemented [2,6J and compares favorably with [3J. Dick erson [9J has extended some of these results to multivariate polynomials. We should give a brief history of the research behind this joint paper. Kozen and Landau [18] gave the first polynomial-time sequential and NCalgorithms for this problem in the tame case. The time hounds were O(n3 ) sequential, O(n ) if F supports an FFT, and 0(1og2 n) parallel. They also presented the structure theorem (Theorem 9), reducing the problem in the wild case to factorization, and gave an O(n ) algorithm for the decomposition of irreducible polynomials over general fields admitting a polynomial-time factorization algorithm, and an NC algorithm for irreducible polynomials over finite fields. Based on the algorithm of [18], von zur Gathen [17] improved the bounds in the tame case to those stated above. These results are presented in §2. He also gave an improved algorithm for the wild case, yielding a polynomial-time reduction to factorization of polynomials, and observed undecidability over sufficiently general fields. These results are presented in §3. Introduction 1","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122885727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Concurrent reading while writing II: The multi-writer case 写时并发读II:多写器情况
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.15
G. Peterson, J. Burns
{"title":"Concurrent reading while writing II: The multi-writer case","authors":"G. Peterson, J. Burns","doi":"10.1109/SFCS.1987.15","DOIUrl":"https://doi.org/10.1109/SFCS.1987.15","url":null,"abstract":"An algorithm is given for the multi-writer version of the Concurrent Reading While Writing (CRWW) problem. The algorithm solves the problem of allowing simultaneous access to arbitrarily sized shared data without requiring waiting, and hence avoids mutual exclusion. This. demonstrates that a quite complicated concurrent control problem can be solved-without eliminating the efficiency of parallelism. One very important aspect of the algorithm are the tools developed to prove its correctness. Without these tools, proving the correctness of a solution to a problem of this complexity would be very difficult.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
Determining edge connectivity in 0(nm) 确定0(nm)内的边缘连通性
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.19
D. Matula
{"title":"Determining edge connectivity in 0(nm)","authors":"D. Matula","doi":"10.1109/SFCS.1987.19","DOIUrl":"https://doi.org/10.1109/SFCS.1987.19","url":null,"abstract":"We describe an algorithm that determines the edge connectivity of an n-vertex m-edge graph G in O(nm) time. A refinement shows that the question as to whether a graph is k-edge connected can be determined in O(kn2). For dense graphs characterized by m = Ω(n2), the latter result implies that determination of whether a graph is k-edge connected for any fixed k can be accomplished in time linear in input size.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132573222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
A practical scheme for non-interactive verifiable secret sharing 一种实用的非交互式可验证秘密共享方案
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.4
Paul Feldman
{"title":"A practical scheme for non-interactive verifiable secret sharing","authors":"Paul Feldman","doi":"10.1109/SFCS.1987.4","DOIUrl":"https://doi.org/10.1109/SFCS.1987.4","url":null,"abstract":"This paper presents an extremely efficient, non-interactive protocol for verifiable secret sharing. Verifiable secret sharing (VSS) is a way of bequeathing information to a set of processors such that a quorum of processors is needed to access the information. VSS is a fundamental tool of cryptography and distributed computing. Seemingly difficult problems such as secret bidding, fair voting, leader election, and flipping a fair coin have simple one-round reductions to VSS. There is a constant-round reduction from Byzantine Agreement to non-interactive VSS. Non-interactive VSS provides asynchronous networks with a constant-round simulation of simultaneous broadcast networks whenever even a bare majority of processors are good. VSS is constantly repeated in the simulation of fault-free protocols by faulty systems. As verifiable secret sharing is a bottleneck for so many results, it is essential to find efficient solutions.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1213
New lower bound techniques for robot motion planning problems 机器人运动规划问题的新下界技术
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.42
J. Canny, J. Reif
{"title":"New lower bound techniques for robot motion planning problems","authors":"J. Canny, J. Reif","doi":"10.1109/SFCS.1987.42","DOIUrl":"https://doi.org/10.1109/SFCS.1987.42","url":null,"abstract":"We present new techniques for establishing lower bounds in robot motion planning problems. Our scheme is based on path encoding and uses homotopy equivalence classes of paths to encode state. We first apply the method to the shortest path problem in 3 dimensions. The problem is to find the shortest path under an Lp metric (e.g. a euclidean metric) between two points amid polyhedral obstacles. Although this problem has been extensively studied, there were no previously known lower bounds. We show that there may be exponentially many shortest path classes in single-source multiple-destination problems, and that the single-source single-destination problem is NP-hard. We use a similar proof technique to show that two dimensional dynamic motion planning with bounded velocity is NP-hard. Finally we extend the technique to compliant motion planning with uncertainty in control. Specifically, we consider a point in 3 dimensions which is commanded to move in a straight line, but whose actual motion may differ from the commanded motion, possibly involving sliding against obstacles. Given that the point initially lies in some start region, the problem of finding a sequence of commanded velocities which is guaranteed to move the point to the goal is shown to be non-deterministic exponential time hard, making it the first provably intractable problem in robotics.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131069988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 602
Applying static network protocols to dynamic networks 将静态网络协议应用于动态网络
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.7
Y. Afek, B. Awerbuch, E. Gafni
{"title":"Applying static network protocols to dynamic networks","authors":"Y. Afek, B. Awerbuch, E. Gafni","doi":"10.1109/SFCS.1987.7","DOIUrl":"https://doi.org/10.1109/SFCS.1987.7","url":null,"abstract":"This paper addresses the problem of how to adapt an algorithm designed for fixed topology networks to produce the intended results, when run in a network whose topology changes dynamically, in spite of encountering topological changes during its execution. We present a simple and unified procedure, called a reset procedure, which, when combined with the static algorithm, achieves this adaptation. The communication and time complexities of the reset procedure, per topological change, are independent of the number of topological changes and are linearly bounded by the size of the subset of the network which participates in the algorithm.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115782032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 137
Complete and incomplete randomized NP problems 完全和不完全随机NP问题
28th Annual Symposium on Foundations of Computer Science (sfcs 1987) Pub Date : 1987-10-12 DOI: 10.1109/SFCS.1987.14
Y. Gurevich
{"title":"Complete and incomplete randomized NP problems","authors":"Y. Gurevich","doi":"10.1109/SFCS.1987.14","DOIUrl":"https://doi.org/10.1109/SFCS.1987.14","url":null,"abstract":"A randomized decision problem is a decision problem together with a probability function on the instances. Leonid Levin [Lev1] generalized the NP completeness theory to the case of properly defined randomized NP (shortly, RNP) problems and proved the completeness of a randomized version of the bounded tiling problem with respect to (appropriately generalized) Ptime reductions. Levin's proof naturally splits into two parts; a randomized version of the bounded halting problem is proved complete and then reduced to Randomized Tiling. David Johnson [Jo] provided some intuition behind Levin's definitions and proofs, and challenged readers to find additional natural complete RNP problems.","PeriodicalId":153779,"journal":{"name":"28th Annual Symposium on Foundations of Computer Science (sfcs 1987)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126756948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信