48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)最新文献

筛选
英文 中文
Maximizing Non-Monotone Submodular Functions 最大化非单调子模函数
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) Pub Date : 2011-07-01 DOI: 10.1109/FOCS.2007.29
U. Feige, V. Mirrokni, J. Vondrák
{"title":"Maximizing Non-Monotone Submodular Functions","authors":"U. Feige, V. Mirrokni, J. Vondrák","doi":"10.1109/FOCS.2007.29","DOIUrl":"https://doi.org/10.1109/FOCS.2007.29","url":null,"abstract":"Submodular maximization generalizes many important problems including Max Cut in directed/undirected graphs and hypergraphs, certain constraint satisfaction problems and maximum facility location problems. Unlike the problem of minimizing submodular functions, the problem of maximizing submodular functions is NP-hard.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130313977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 638
On the Complexity of Nash Equilibria and Other Fixed Points (Extended Abstract) 论纳什均衡及其他不动点的复杂性(扩展摘要)
K. Etessami, M. Yannakakis
{"title":"On the Complexity of Nash Equilibria and Other Fixed Points (Extended Abstract)","authors":"K. Etessami, M. Yannakakis","doi":"10.1137/080720826","DOIUrl":"https://doi.org/10.1137/080720826","url":null,"abstract":"We reexamine, what it means to compute Nash equilibria and, more, generally, what it means to compute a fixed point of a given Brouwer function, and we investigate the complexity of the associated problems. Specifically, we study the complexity of the following problem: given a finite game, Gamma, with 3 or more players, and given epsiv > 0, compute a vector x' (a mixed strategy profile) that is within distance e (say in t^) of some (exact) Nash equilibrium. We show that approximation of an (actual) Nash equilibrium for games with 3 players, even to within any non-trivial constant additive factor epsiv < 1/2 in just one desired coordinate, is at least as hard as the long standing square-root sum problem, as well as more general arithmetic circuit decision problems, and thus that even placing the approximation problem in NP would-resolve a major open problem in the complexity of numerical computation. Furthermore, we show that the (exact or approximate) computation of Nash equilibria for 3 or more players is complete for the class of search problems, which we call FIXP, that can be cast as fixed point computation problems for functions represented by algebraic circuits (straight line programs) over basis {+, *, -, /, max, min}, with rational constants. We show that the linear fragment of FIXP equals PPAD. Many problems in game theory, economics, and probability theory, can be cast as fixed point problems for such algebraic functions. We discuss several important such problems: computing the value of Shapley's stochastic games, and the simpler games of Condon, extinction probabilities of branching processes, termination probabilities of stochastic context-free grammars, and of Recursive Markov Chains. We show that for some of them, the approximation, or even exact computation, problem can be placed-in PPAD, while for others, they are at least as hard as the square-root sum and arithmetic circuit decision problems.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 291
Linear Equations Modulo 2 and the L1 Diameter of Convex Bodies 线性方程模2与凸体的L1直径
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) Pub Date : 2008-07-01 DOI: 10.1109/focs.2007.4389503
Subhash Khot, A. Naor
{"title":"Linear Equations Modulo 2 and the L1 Diameter of Convex Bodies","authors":"Subhash Khot, A. Naor","doi":"10.1109/focs.2007.4389503","DOIUrl":"https://doi.org/10.1109/focs.2007.4389503","url":null,"abstract":"We design a randomized polynomial time algorithm which, given a 3-tensor of real numbers A={a<sub>ijk</sub>}<sub>ij,k=1</sub> <sup>n</sup> such that for all i,j,kisin{1,...,n} we have a<sub>ijk</sub>=a<sub>ikj</sub>=a<sub>kji</sub>=a<sub>jik</sub>=a<sub>kij</sub>=a<sub>kji</sub> and a<sub>iik</sub>=a<sub>ijj</sub>=a<sub>iji</sub>=0, computes a number Alg(A) which satisfies with probability at least 1/2, Omega(radic(logn/n))ldrmax<sub>xisin{-1,1}</sub> <sup>n</sup> Sigma<sub>i,j,k=1</sub> <sup>n</sup>a<sub>ijk</sub>x<sub>i</sub>x<sub>j</sub>x<sub>k</sub>lesAlg(A)lesmax<sub>xisin{-1,1}</sub> <sup>n</sup> Sigma<sub>i,j,k=1</sub> <sup>n</sup>a<sub>ijk</sub>x<sub>i</sub>x<sub>j</sub>x<sub>k</sub>. On the other hand, we show via a simple reduction from a result of Hastad and Venkatesh that under the assumption NPnsubeDTIME(n<sup>(logn)</sup> <sup>O(1)</sup>),for every epsiv>0 there is no algorithm that approximates max<sub>xisin{-1,1}</sub> <sup>n</sup> Sigma<sub>i,j,k=1</sub> <sup>n</sup>a<sub>ijk</sub>x<sub>i</sub>x<sub>j</sub>x<sub>k</sub> within a factor of 2(logn)<sup>t-epsiv</sup> in time 2<sup>(logn)</sup> <sup>O(1)</sup>. Our algorithm is based on a reduction to the problem of computing the diameter of a convex body in R<sup>n</sup> with respect to the L<sub>1</sub> norm. We show that it is possible to do so up to a multiplicative error of O(radic(n/logn)), while no randomized polynomial time algorithm can achieve accuracy O(radic(n/logn)). This resolves a question posed by Brieden, Gritzmann, Kantian, Klee, Lovasz and Simonos. We apply our new algorithm improve the algorithm of Hastad and Venkatesh or the Max-E3-Lin-2 problem. Given an over-determined system epsiv of N linear equations modulo 2 in nlesN Boolean variables, such that in each equation appear only three distinct variables, the goal is to approximate in polynomial time the maximum number of satisfiable equations in epsiv minus N/2 (i.e. we subtract the expected number of satisfied equations in a random assignment). Hastad and Venkatesh obtained an algorithm which approximates this value up to a factor of O(radicN). We obtain a O(radic(n/logn)) approximation algorithm. By relating this problem to the refutation problem for random 3-CNF formulas we give evidence that obtaining a significant improvement over this approximation factor is likely to be difficult.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132082412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits 语法多线性算术电路大小的下界
R. Raz, Amir Shpilka, A. Yehudayoff
{"title":"A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits","authors":"R. Raz, Amir Shpilka, A. Yehudayoff","doi":"10.1137/070707932","DOIUrl":"https://doi.org/10.1137/070707932","url":null,"abstract":"We construct an explicit polynomial f(x<sub>1</sub>,..., x<sub>n</sub>), with coefficients in {0, 1}, such that the size of any syntactically multilinear arithmetic circuit computing f is at least Omega{n<sup>4/3</sup> log<sup>2</sup> n} The lower bound holds over any field.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131059467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Lower Bounds on Streaming Algorithms for Approximating the Length of the Longest Increasing Subsequence 近似最长递增子序列长度的流算法下界
A. Gál, Parikshit Gopalan
{"title":"Lower Bounds on Streaming Algorithms for Approximating the Length of the Longest Increasing Subsequence","authors":"A. Gál, Parikshit Gopalan","doi":"10.1137/090770801","DOIUrl":"https://doi.org/10.1137/090770801","url":null,"abstract":"We show that any deterministic data-stream algorithm that, makes a constant number of passes over the input and gives a constant, factor approximation of the length of the longest increasing subsequence in a sequence of length n must use space Omega(radicn). This proves a conjecture made by Gopalan, Jayram, Krauthgamer and Kumar |10| who proved a matching upper bound. Our results yield asymptotically tight tower bounds for all approximation factors, thus resolving the main open problem, from their paper. Our proof is based on analyzing a related communication problem and proving a direct sum type property for it.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121975627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Near Optimal Bounds for Collision in Pollard Rho for Discrete Log 离散对数波拉德碰撞的近最优界
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) Pub Date : 2007-10-21 DOI: 10.1109/FOCS.2007.44
J. Kim, R. Montenegro, P. Tetali
{"title":"Near Optimal Bounds for Collision in Pollard Rho for Discrete Log","authors":"J. Kim, R. Montenegro, P. Tetali","doi":"10.1109/FOCS.2007.44","DOIUrl":"https://doi.org/10.1109/FOCS.2007.44","url":null,"abstract":"We analyze-a fairly standard idealization of Pollard's rho algorithm for finding the discrete logarithm in acyclic group G. It is found that, with high probability, a collision occurs in O(radic( |G|log|G|log log|G|)) steps, not far from the widely conjectured value of Theta(radic|G|). Tins improves upon a recent result of Miller-Venkalesan which showed an upper bound of O(radic|G|log3|G|). Our proof is based on analyzing an appropriate nonreversible, non-lazy random walk on a discrete cycle of (odd) length |G|, and showing that the mixing time of the corresponding walk is O(log|G|log log|G|).","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127558781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Brief Look at Pairings Based Cryptography 简要介绍基于配对的密码学
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) Pub Date : 2007-10-21 DOI: 10.1109/FOCS.2007.5
D. Boneh
{"title":"A Brief Look at Pairings Based Cryptography","authors":"D. Boneh","doi":"10.1109/FOCS.2007.5","DOIUrl":"https://doi.org/10.1109/FOCS.2007.5","url":null,"abstract":"This note provides a brief summary of how a new algebraic tool, bilinear groups, is transforming public-key cryptography. For the examples mentioned, the best solutions without bilinear groups either do not exist or are far less efficient. Many of the systems discussed in this note were implemented by Lynn [45] in a software library freely available under the GPL.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122476595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Approximation Algorithms Using Hierarchies of Semidefinite Programming Relaxations 基于半定规划松弛层次的逼近算法
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) Pub Date : 2007-10-21 DOI: 10.1109/FOCS.2007.13
E. Chlamtáč
{"title":"Approximation Algorithms Using Hierarchies of Semidefinite Programming Relaxations","authors":"E. Chlamtáč","doi":"10.1109/FOCS.2007.13","DOIUrl":"https://doi.org/10.1109/FOCS.2007.13","url":null,"abstract":"We. introduce, a framework for studying semidefiniie programming (SOP) relaxations based on the Lasserre hierarchy in the context of approximation algorithms for combinatorial problems. As an application of our approach, we give, improved approximation algorithms for two problems. We show that for some fixed constant epsiv > 0, given a 3-uniform hypergraph containing an independent set of size (1/2 - epsiv)v, we can find an independent set of size Omega(nepsiv). This improves upon the result of Krivelevich, Nathaniel and Sitdakov, who gave an algorithm finding an independent set of size Omega(n6gamma-3) for hypergraphs with an independent set of size gamman (but no guarantee for gamma les 1/2). We also give an algorithm which finds an O(n0.2072)-coloring given a 3-colorable graph, improving upon the work of Aurora, Clamtac and Charikar. Our approach stands in contrast to a long series of inapproximability results in the Lovasz Schrijver linear programming (LP) and SDP hierarchies for other problems.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments 发现交互协议中的碰撞——统计隐藏承诺的轮复杂度的紧下界
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) Pub Date : 2007-10-21 DOI: 10.1109/FOCS.2007.27
Iftach Haitner, Jonathan J. Hoch, Omer Reingold, G. Segev
{"title":"Finding Collisions in Interactive Protocols - A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments","authors":"Iftach Haitner, Jonathan J. Hoch, Omer Reingold, G. Segev","doi":"10.1109/FOCS.2007.27","DOIUrl":"https://doi.org/10.1109/FOCS.2007.27","url":null,"abstract":"We study the round complexity of various cryptographic protocols. Our main result is a tight lower bound on the round complexity of any fully-black-box construction of a statistically-hiding commitment scheme from oneway permutations, and even front trapdoor permutations. This lower bound matches the round complexity of the statistically-hiding commitment scheme due to Naor, Ostrovsky, Venkatesan and Yung (CRYPTO '92). As a corollary, we derive similar tight lower bounds for several other ctyptographicprotocols, such as single-server private information retrieval, interactive hashing, and oblivious transfer that guarantees statistical security for one of the parties. Our techniques extend the collision-finding oracle due to Simon (EUROCRYPT '98) to the setting of interactive protocols (our extension also implies an alternative proof for the main property of the original oracle). In addition, we substantially extend the reconstruction paradigm of Gennaro and Trevisan (FOCS '00). In both cases, our extensions are quite delicate and may be found useful in proving additional black-box separation results.","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
A primal-dual randomized algorithm for weighted paging 加权分页的原始对偶随机化算法
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) Pub Date : 2007-10-21 DOI: 10.1145/2339123.2339126
N. Bansal, Niv Buchbinder, J. Naor
{"title":"A primal-dual randomized algorithm for weighted paging","authors":"N. Bansal, Niv Buchbinder, J. Naor","doi":"10.1145/2339123.2339126","DOIUrl":"https://doi.org/10.1145/2339123.2339126","url":null,"abstract":"In the weighted paging problem there is a weight (cost) for fetching each page into the cache. We design a randomized O(log k) -competitive online algorithm for the weighted paging problem, where k is the cache size. This is the first randomized o(k)-competitive algorithm and its competitiveness matches the known lower bound on the problem. More generally, we design an O(log(k/(k - h + I)))-competitive online algorithm for the version of the. problem where, the online algorithm has-cache size k and the online algorithm has cache size h les k. Weighted paging is a special case (weighted star metric) of the well known k-server problem for which it is a major open question whether randomization can be useful in obtaining sub-linear competitive algorithms. Therefore, abstracting and extending the insights from paging is a key step in the resolution of the k-server problem. Our solution for the weighted paging problem is based on a two-step approach. In the first step we obtain an O(log k)-competitive fractional algorithm which is based on a novel online primal-dual approach. In the second step we. obtain a randomized algorithm by rounding online the fractional solution to an actual distribution on integral cache, solutions. We conclude with a randomized O(log N)-competitive algorithm for the well studied Metrical Task System problem (MTS) on a metric defined by a weighted star on N leaves, improving upon a previous O(log2 N)-competitive algorithm of Blum et al. [9].","PeriodicalId":197431,"journal":{"name":"48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 166
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信