{"title":"Routing permutations on graphs via matchings","authors":"N. Alon, F. Graham, R. Graham","doi":"10.1145/167088.167239","DOIUrl":"https://doi.org/10.1145/167088.167239","url":null,"abstract":"A class of routing problems on connected graphs $G$ is considered. Initially, each vertex $v$ of $G$ is occupied by a ``pebble'' that has a unique destination $pi (v)$ in $G$ (so that $pi$ is a permutation of the vertices of $G$). It is required that all the pebbles be routed to their respective destinations by performing a sequence of moves of the following type: A disjoint set of edges is selected, and the pebbles at each edge's endpoints are interchanged. The problem of interest is to minimize the number of steps required for any possible permutation $pi$. \u0000This paper investigates this routing problem for a variety of graphs $G$, including trees, complete graphs, hypercubes, Cartesian products of graphs, expander graphs, and Cayley graphs. In addition, this routing problem is related to certain network flow problems, and to several graph invariants including diameter, eigenvalues, and expansion coefficients.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"49 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic hardness of distribution-specific learning","authors":"M. Kharitonov","doi":"10.1145/167088.167197","DOIUrl":"https://doi.org/10.1145/167088.167197","url":null,"abstract":"We investigate cryptographic lower bounds on the learnability of Boolean formulas and constant depth circuits on the {niform distribution and other specifi; distributions. We first show that weakly learning Boolean formulas and constant depth threshold circuits with membership queries on the uniform distribution in polynomial time is as hard as factoring Blum integers (or inverting RSA, or deciding 1? quadratic residuosity . We formalize the notion of a trivially learnable distri ution and extend these hardness results to all non-trivial distributions. Moreover, we show that under appropriate assumptions on the hardness of factoring, the learnability of Boolean formulas and constant depth threshold circuits on any distribution is characterized by the distribution’s Renyi entropy. Furthermore, we show that a sub-exponential lower bound for factoring implies a Q(2’Og@ ‘‘) lower bound (for some constant ~) for learning Boolean circuits of depth d on the uniform distribution (with membership queries), which matches the upper bound of Linial, M ansour, and Nisan [19]. From this we conclude that, assuming such a lower bou-nd for factoring, there is no O(npOLy 10gn ) algorithm to learn all of ACO on the uniform distribution. We observe that, under cryptographic assumptions, all our bounds can be used to establish trade~trs between the running time and the number of samples necessary to learn.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Competitive distributed file allocation","authors":"B. Awerbuch, Y. Bartal, A. Fiat","doi":"10.1145/167088.167142","DOIUrl":"https://doi.org/10.1145/167088.167142","url":null,"abstract":"This paper deals with the file allocation problem [6] concerning the dynamic optimization of communication costs to access data in a distributed environment. We develop a dynamic file re-allocation strategy that adapts on-line to a sequence of read and write requests whose location and relative frequencies are completely unpredictable. This is achieved by replicating the file in response to read requests and migrating the file in response to write requests while paying the associated communications costs, so as to be closer to processors that access it frequently. We develop first explicit deterministic on-line strategy assuming existence of global information about the state of the network; previous (deterministic) solutions were complicated and more expensive. Our solution has (optimal) logarithmic competitive ratio. The paper also contains the first explicit deterministic data migration [7] algorithm achieving the best known competitive ratio for this problem. Using somewhat different technique, we also develop the first deterministic distributed file allocation algorithm (using only local information) with poly-logarithmic competitive ratio against a globally optimized optimal prescient strategy.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constant time factors do matter","authors":"N. Jones","doi":"10.1145/167088.167244","DOIUrl":"https://doi.org/10.1145/167088.167244","url":null,"abstract":"The constant speedup theorem, so well known from Turing machine based complexity theory, is shown false for a natural imperative programming language I that manipulates tree-structured data. This relieves a tension between general programming practice, where linear factors are essential, and complexity theory, where linear time changes are traditionally regarded as trivial. Specifically, there is a constant b such that for any a > 0 there is a set X recognizable in time a · b · n but not in time a · n. Thus LIN, the collection of all sets recognizable in linear time by deterministic I-programs, contains an infinite hierarchy ordered by constant coefficients. Constant hierarchies also exist for larger time bounds T (n), provided they are time-constructable. Second, a problem is exhibited which is complete for the nondeterministic linear time sets NLIN with respect to a natural notion of deterministic linear-time reduction. Third, Kleene’s Second Recursion Theorem in essence shows that for any program p defined with self-reference, there is an equivalent nonreflexive program q. This is proven for an extension I↑ of I. Further, q can be simulated by an I program at most constantly slower than p. Language I↑ allows calls to the language’s own interpretation function, and even to its running time function (without the usual high costs for nested levels of interpretation). The results all hold as well for a stronger language I allowing selective updating of tree-structured data. The results are robust in that classes LIN and NLIN are identical for I , Isu↑, Schonhage’s Storage Modification Machines, Knuth/Tarjan’s pointer machines, and successor RAMs [13,14,11]. where n is the size of the input. DIKU, Department of Computer Science, University of Copenhagen, Universitetsparken 1, DK-2100 Copenhagen East, Denmark, E-mail: neil@diku.dk. If the “more realistic and precise measure” of SMM computation time is used [13], and similarly for the other models.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129934794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The biased coin problem","authors":"R. Boppana, Babu O. Narayanan","doi":"10.1145/167088.167164","DOIUrl":"https://doi.org/10.1145/167088.167164","url":null,"abstract":"A slightly random source (with bias$epsilon $) is a sequence $mathbf{x} = (mathbf{x}_1 ,mathbf{x}_2 , ldots ,mathbf{x}_n )$ of random bits such that the conditional probability that $mathbf{x}_i = 1$, given the outcomes of the first $i - 1$ bits, is always between $frac{1}{2} - epsilon $ and $frac{1}{2} + epsilon $. Given a subset S of ${ 0,1} ^n $, define its $epsilon $-biased probability to be the minimum of $text{Pr}[ mathbf{x} in S ]$ over all slightly random sources $mathbf{x}$ with bias $epsilon $. It is shown that, for every fixed $epsilon < frac{1}{2}$ and almost every subset S of ${ 0,1} ^n $, the $epsilon $-biased probability of S is bounded away from 0.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131289315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomness-optimal unique element isolation, with applications to perfect matching and related problems","authors":"Suresh Chari, P. Rohatgi, A. Srinivasan","doi":"10.1145/167088.167213","DOIUrl":"https://doi.org/10.1145/167088.167213","url":null,"abstract":"In this paper, we precisely characterize the randomness complexity of the unique element isolation problem, a crucial step in the RNC algorithm for perfect matching due to Mulmuley, Vazirani & Vazirani[21] and in several other applications. Given a set $S$ and an unknown family $cal F subseteq$ $2^{S}$ with $|cal F| leq$ $Z$, we present a scheme to assign polynomially bounded weights to the elements of $S$, using only $O(log Z + log |S|)$ ransom bits, such that the minimum weight set in $cal F$ is unique with high probability. This generalizes and improves the results of Mulmuley, Vazirani & Vazirani who give a scheme which uses $O(S log S)$ random bits independent of $Z$. We also prove a matching lower bound for the randomness complexity of this problem. This new weight assignment scheme yields a randomness-efficient $RNC^{2}$ algorithm for perfect matching which uses $O(log Z + log n)$ random bits where $Z$ is any given upper bound on the number of perfect matchings in the input graph. This generalizes the result of Grigoriev & Karpinski[11] who present an $NC^{3}$ algorithm when $Z$ is polynomially bounded and also gives an improvement on the running time in this case. The worst-case randomness complexity of our algorithm is $O(n log (m/n))$ random bits, as opposed to the previous bound of $O(m log n)$ bits. Our technique also gives randomness-efficient solutions for several problems in which the unique element isolation tool is used, such as $RNC$ algorithms for variants of matching and basic problems on linear matroids such as matroid intersection and matroid matching. We also obtain a randomness-efficient alternative to the random reduction from $SAT$ to $USAT$, the language of uniquely satisfiable formulas, due to Valiant and Vazirani[32]. This reduction can be derandomized in the case of languages in $F ew P$ to yield new proofs of the results $F ew P subseteq oplus P$ and $F ew P subseteq C_{=} P$.","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"131 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision trees: old and new results","authors":"R. Fleischer","doi":"10.1145/167088.167216","DOIUrl":"https://doi.org/10.1145/167088.167216","url":null,"abstract":"Abstract In this paper, we prove two general lower bounds for algebraic decision trees which test membership in a set S ⊆ R n which is defined by linear inequalities. Let rank( S ) be the maximal dimension of a linear sub- space contained in the closure of S (in Euclidean topology). First we show that any decision tree for S which uses products of linear functions (we call such functions mlf- functions ) must have depth at least n −rank( S ). This solves an open question raised by A. C. Yao and can be used to show that mlf-functions are not really more powerful than simple comparisons between the input variables when computing the largest k out of n elements. Yao proved this result in the special case when products of at most two linear functions are allowed. Our proof also shows that any decision tree for this problem must have exponential size. Using the same methods, we can give an alternative proof of Rabin's theorem, namely that the depth of any decision tree for S using arbitrary analytic functions is at least n −rank( S ).","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"415 6871 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133787249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-space trade-offs for undirected st-connectivity on a JAG","authors":"J. Edmonds","doi":"10.1145/167088.167272","DOIUrl":"https://doi.org/10.1145/167088.167272","url":null,"abstract":"Undirected st-connectivity is an important problem in computing. There are algorithms for this problem that use O(n) time and ones that use O(log n) space. The main result of this paper is that in a very naturat structured model, these upper bounds are not simultaneously achievable. More formalty, for every constant z z O, the expected time to solve undirected sr-connectivity on a probabilistic JAG with p ~ & & pebbles and q < n’”< n states isn x ZQ(*J when theinputgraph is chosen unifortnly from a family of 3-regular graphs. 1","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulating threshold circuits by majority circuits","authors":"M. Goldmann, Marek Karpinski","doi":"10.1145/167088.167234","DOIUrl":"https://doi.org/10.1145/167088.167234","url":null,"abstract":"We prove that a single threshold gate with arbitrary weights can be simulated by an explicit polynomial-size, depth-2 majority circuit. In general we show that a polynomial-size, depth-d threshold circuit can be simulated uniformly by a polynomial-size majority circuit of depth d + 1. Goldmann, Hastad, and Razborov showed in [Comput. Complexity, 2 (1992), pp. 277--300] that a nonuniform simulation exists. Our construction answers two open questions posed by them: we give an explicit construction, whereas they use a randomized existence argument, and we show that such a simulation is possible even if the depth d grows with the number of variables n (their simulation gives polynomial-size circuits only when d is constant).","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123638836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polynomial space polynomial delay algorithms for listing families of graphs","authors":"L. A. Goldberg","doi":"10.1145/167088.167160","DOIUrl":"https://doi.org/10.1145/167088.167160","url":null,"abstract":"The main result of this paper is a method that turns any almost sure sentence in the first order language of graphs into a deterministic polynomial space polynomial delay algorithm for listing the graphs that satisfy the sentence. (Our result is the first such method. ) Our work builds upon earlier work of Fagin. In particular, Fagin defined an infinite collection of combinatorial axioms and showed that for any fixed integer k almost every graph satisfies the k th axiom in his collection. Suppose that 0 is a sentence in the first order language of graphs. (For example, 0 might say “This graph does not have a triangle”, or “Every connected component of this graph is a clique”. ) Fagin has shown that for each such 19 there is an integer k such that either","PeriodicalId":280602,"journal":{"name":"Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125271493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}