Proceedings of the nineteenth annual ACM symposium on Theory of computing最新文献

筛选
英文 中文
Size-time complexity of Boolean networks for prefix computations 用于前缀计算的布尔网络的大小时间复杂度
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28442
G. Bilardi, F. Preparata
{"title":"Size-time complexity of Boolean networks for prefix computations","authors":"G. Bilardi, F. Preparata","doi":"10.1145/28395.28442","DOIUrl":"https://doi.org/10.1145/28395.28442","url":null,"abstract":"The prefix problem consists of computing all the products x0x1…xj (j=0, …, N - 1), given a sequence x = (x0, x1, …, xN - 1) of elements in a semigroup. In this paper we completely characterize the size-time complexity of computing prefixes with boolean networks, which are synchronized interconnections of Boolean gates and one-bit storage devices. This complexity crucially depends upon a property of the underlying semigroup, which we call cycle-freedom (no cycle of length greater than one in the Cayley graph of the semigroup). Denoting by S and T size and computation time, respectively, we have S = &THgr;((N/T) log(N/T)), for non-cycle-free semigroups, and S = &THgr;(N/T), for cycle-free semigroups. In both cases, T ∈ [&OHgr;(logN), O(N)].","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132897898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A new graphy triconnectivity algorithm and its parallelization 一种新的图形三连通算法及其并行化
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28431
G. Miller, V. Ramachandran
{"title":"A new graphy triconnectivity algorithm and its parallelization","authors":"G. Miller, V. Ramachandran","doi":"10.1145/28395.28431","DOIUrl":"https://doi.org/10.1145/28395.28431","url":null,"abstract":"We present a new algorithm for finding the tri-connected components of an undirected graph. The algorithm is based on ear decomposition and has linear sequential running time. It also has a parallel implementation on a CRCW PRAM with O(log2n) parallel time using a linear number of processors, where n is the number of vertices in the graph. This is the first efficient parallel algorithm for graph tri-connectivity.","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"66 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134127842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Approximation algorithms for shortest path motion planning 最短路径运动规划的近似算法
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28402
K. Clarkson
{"title":"Approximation algorithms for shortest path motion planning","authors":"K. Clarkson","doi":"10.1145/28395.28402","DOIUrl":"https://doi.org/10.1145/28395.28402","url":null,"abstract":"This paper gives approximation algorithms of solving the following motion planning problem: Given a set of polyhedral obstacles and points s and t, find a shortest path from s to t that avoids the obstacles. The paths found by the algorithms are piecewise linear, and the length of a path is the sum of the lengths of the line segments making up the path. Approximation algorithms will be given for versions of this problem in the plane and in three-dimensional space. The algorithms return an &egr;-short path, that is, a path with length within (1 + &egr;) of shortest. Let n be the total number of faces of the polyhedral obstacles, and &egr; a given value satisfying &Ogr; < &egr; ≤ &pgr;. The algorithm for the planar case requires &Ogr;(n log n)/&egr; time to build a data structure of size &Ogr;(n/&egr;). Given points s and t, and &egr;-short path from s to t can be found with the use of the data structure in time &Ogr;(n/&egr; + n log n). The data structure is associated with a new variety of Voronoi diagram. Given obstacles S ⊂ &Egr;3 and points s, t &egr; E3, an &egr;-short path between s and t can be found in &Ogr;(n2&lgr;(n) log(n/&egr;)/&egr;4 + n2 lognp log(n logp)) time, where p is the ratio of the length of the longest obstacle edge to the distance between s to t. The function &lgr;(n) = &agr;(n)&Ogr;(&agr;(n)&Ogr;(1)), where the &agr;(n) is a form of inverse of Ackermann's function. For log(1/&egr;) and log p that are &Ogr;(log n), this bound is &Ogr;(log n2(n)&lgr;(n)/&egr;4).","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133834491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 264
A random NC algorithm for depth first search 深度优先搜索的随机NC算法
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28430
A. Aggarwal, Richard J. Anderson
{"title":"A random NC algorithm for depth first search","authors":"A. Aggarwal, Richard J. Anderson","doi":"10.1145/28395.28430","DOIUrl":"https://doi.org/10.1145/28395.28430","url":null,"abstract":"In this paper we present a fast parallel algorithm for constructing a depth first search tree for an undirected graph. The algorithm is an RNC algorithm, meaning that it is a probabilistic algorithm that runs in polylog time using a polynomial number of processors on a P-RAM. The run time of the algorithm is &Ogr;(TMM(n)log3n), and the number of processors used is PMM(n) where TMM(n) and PMM(n) are the time and number of processors needed to find a minimum weight perfect matching on an n vertex graph with maximum edge weight n.","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
Single-factor Hensel lifting and its application to the straight-line complexity of certain polynomials 单因素Hensel提升及其在某些多项式直线复杂度中的应用
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28443
E. Kaltofen
{"title":"Single-factor Hensel lifting and its application to the straight-line complexity of certain polynomials","authors":"E. Kaltofen","doi":"10.1145/28395.28443","DOIUrl":"https://doi.org/10.1145/28395.28443","url":null,"abstract":"Three theorems are presented that establish polynomial straight-line complexity for certain operations on polynomials given by straight-line programs of unbounded input degree. The first theorem shows how to compute a higher order partial derivative in a single variable. The other two theorems impose the degree of the output polynomial as a parameter of the length of the output program. First it is shown that if a straight-line program computes an arbitrary power of a multivariate polynomial, that polynomial also admits a polynomial bounded straight-line computation. Second, any factor of a multivariate polynomial given by a division-free straight-line program with relatively prime co-factor also admits a straight-line computation of length polynomial in the input length and the degree of the factor. This result is based on a new Hensel lifting process, one where only one factor image is lifted back to the original factor. As an application we get that the greatest common divisor of polynomials given by a division-free straight-line program has polynomial straight-line complexity in terms of the input length and its own degree.","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121073151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
On hiding information from an oracle 关于对oracle隐藏信息
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28417
M. Abadi, J. Feigenbaum, J. Kilian
{"title":"On hiding information from an oracle","authors":"M. Abadi, J. Feigenbaum, J. Kilian","doi":"10.1145/28395.28417","DOIUrl":"https://doi.org/10.1145/28395.28417","url":null,"abstract":"We consider the problem of computing with encrypted data. Player A wishes to know the value ƒ(x) for some x but lacks the power to compute it. Player B has the power to compute ƒ and is willing to send ƒ(y) to A if she sends him y, for any y. Informally, an encryption scheme for the problem ƒ is a method by which A, using her inferior resources, can transform the cleartext instance x into an encrypted instance y, obtain ƒ(y) from B, and infer ƒ(x) from ƒ(y) in such a way that B cannot infer x from y. When such an encryption scheme exists, we say that ƒ is encryptable. The framework defined in this paper enables us to prove precise statements about what an encrypted instance hides and what it leaks, in an information-theoretic sense. Our definitions are cast in the language of probability theory and do not involve assumptions such as the intractability of factoring or the existence of one-way functions. We use our framework to describe encryption schemes for some natural problems in NP ⋒ CoNP. We also consider the following generalization of encryption schemes. Player A, who is limited to probabilistic polynomial time, wishes to guess the value ƒ(x) with probability at least 1/2 + 1/|x|c of being correct, for some constant c. Player B can compute any function and generate arbitrary probability distributions. Players A and B can interact for a polynomial number of rounds by sending polynomial-sized messages. We prove a strong negative result: there is no such generalized encryption scheme for SAT that leaks no more than the size of x (unless the polynomial hierarchy collapses at the second level).","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121157916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 316
Realistic analysis of some randomized algorithms 一些随机化算法的现实分析
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28444
E. Bach
{"title":"Realistic analysis of some randomized algorithms","authors":"E. Bach","doi":"10.1145/28395.28444","DOIUrl":"https://doi.org/10.1145/28395.28444","url":null,"abstract":"Many problems such as primality testing can be solved efficiently using a source of independent, identically distributed random numbers. It is therefore customary in the theory of algorithms to assume the availability of such a source. However, probabilistic algorithms often work well in practice with pseudo-random numbers; the point of this paper is to offer a justification for this fact. The results below apply to sequences generated by iteratively applying functions of the form ƒ (&khgr;) = &agr;&khgr; + &bgr; (mod p) to a randomly chosen seed x, and estimate the probability that a predetermined number of trials of an algorithm will fail. In particular, the following bounds hold: For finding square roots modulo a prime p, a failure probability of &Ogr; (log p/√p). For testing p for primality, a failure probability of &Ogr; (p-1/4+&egr;), for any &egr;>0. (In both cases, the number of trials is about 1/2 log p.) The analysis uses results of André Weil concerning the number of points on algebraic varieties over finite fields.","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
The complexity of cutting convex polytypes 切割凸型的复杂性
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28403
B. Chazelle, H. Edelsbrunner, L. Guibas
{"title":"The complexity of cutting convex polytypes","authors":"B. Chazelle, H. Edelsbrunner, L. Guibas","doi":"10.1145/28395.28403","DOIUrl":"https://doi.org/10.1145/28395.28403","url":null,"abstract":"Throughout this paper, we use the term subdivision as a shorthand for “a subdivision of E2 into convex regions”. A subdivision is said to be of size n if it is made of n convex (open) regions, and it is of degree d if every region is adjacent to at most d other regions. We define the line span of a subdivision as the maximum number of regions which can be intersected by a single line (section 3).","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficiency considerations in using semi-random sources 使用半随机源时的效率考虑
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28413
U. Vazirani
{"title":"Efficiency considerations in using semi-random sources","authors":"U. Vazirani","doi":"10.1145/28395.28413","DOIUrl":"https://doi.org/10.1145/28395.28413","url":null,"abstract":"Randomness is an important computational resource, and has found application in such diverse computational tasks as combinatorial algorithms, synchronization and deadlock resolution protocols, encrypting data and cryptographic protocols. Blum [Bl] pointed out the fundamental fact that whereas all these applications of randomness assume a source of independent, unbiased bits, the available physical sources of randomness (such as zener diodes) suffer seriously from problems of correlation. A general","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123567101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Analysis of backoff protocols for multiple access channels 多接入信道退避协议分析
Proceedings of the nineteenth annual ACM symposium on Theory of computing Pub Date : 1987-01-01 DOI: 10.1145/28395.28422
J. Håstad, F. Leighton, B. Rogoff
{"title":"Analysis of backoff protocols for multiple access channels","authors":"J. Håstad, F. Leighton, B. Rogoff","doi":"10.1145/28395.28422","DOIUrl":"https://doi.org/10.1145/28395.28422","url":null,"abstract":"In the paper, we analyze the stochastic behavior of backoff protocols for multiple access channels such as the Ethernet. In particular, we prove that binary exponential backoff is unstable if the arrival rate of new messages at each station is &lgr;/N for any number of stations N exceeding 1 and any overall arrival rate &lgr; exceeding .567 + 1/4N - 2. More importantly, we also prove that any superlinear polynomial backoff protocol (e.g., quadratic backoff) is stable for any set of arrival rates that sum to less than one, and any number of stations. The results significantly extend the previous work in the area, and provide the first examples of acknowledgement based protocols known to be stable for a nonnegligible overall arrival rate distributed over an arbitrarily large number of stations. The results also disprove a popular assumption that exponential backoff is the best choice among acknowledgement based protocols for systems with large overall arrival rates. Finally, we prove that any linear or sublinear backoff protocol is unstable if the arrival rate at each station is &lgr;/N for any fixed &lgr; and sufficiently large N.","PeriodicalId":161795,"journal":{"name":"Proceedings of the nineteenth annual ACM symposium on Theory of computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123151535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 225
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信