Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems最新文献

筛选
英文 中文
A modular analysis of network transmission protocols 网络传输协议的模块化分析
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595157
M. Adler, Y. Bartal, J. Byers, M. Luby, D. Raz
{"title":"A modular analysis of network transmission protocols","authors":"M. Adler, Y. Bartal, J. Byers, M. Luby, D. Raz","doi":"10.1109/ISTCS.1997.595157","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595157","url":null,"abstract":"We propose a new model for the analysis of data transmission protocols in lossy communication networks. The overall goal of a data transmission protocol is to successfully transmit a message from the sender to the receiver We study the performance of protocols in an adversarial setting where the loss pattern and latencies of packets are determined by an adversary. We advocate the modular decomposition of data transmission protocols into a time scheduling policy, which determines when packets are to be sent, and a data selection policy, which determines what data is to be placed in each sent packet. We concentrate on the data selection policy and require that the protocol will achieve high bandwidth utilization in transmitting any prefix of the transmitted message. The simple and universal data selection policy we introduce is provably close to optimal in the following sense: For any time scheduling policy and any network behavior in the worst case prefix measure our data selection policy performs as well as any other data selection policy up to a constant additive term. Our explicit modular decomposition of a transmission protocol into two policies should be contrasted with existing network protocols such as TCP/IP. Our result shows that the performance of the overall transmission protocol would not degrade in performance (and could improve dramatically) if it used our universal data selection policy in place of its own. We therefore reduce the problem of designing a data transmission protocol to the task of designing a time scheduling policy.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116284710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Optimal point-to-point broadcast algorithms via lopsided trees 基于不平衡树的最佳点对点广播算法
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595158
M. Golin, A. Schuster
{"title":"Optimal point-to-point broadcast algorithms via lopsided trees","authors":"M. Golin, A. Schuster","doi":"10.1109/ISTCS.1997.595158","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595158","url":null,"abstract":"We consider the broadcasting operation in point-to-point packet-switched parallel and distributed networks of processors. We develop a general technique for the design of optimal broadcast algorithms on a wide range of such systems. Our technique makes it easier to design such algorithms and, furthermore, provides tools that can be used to derive precise analyses of their running times. As direct applications of this method we give an exact analysis of a known algorithm for the POSTAL model, and design and analyze an optimal broadcast algorithm for the MULTI PORT MULTI-MEDIA model. We then show how our method can be applied to networks with different underlying topologies, by designing and giving an exact analysis of an optimal broadcast algorithm for the OPTICAL RING.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Graph decompositions and factorizing permutations 图的分解和排列的分解
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595165
C. Capelle, M. Habib
{"title":"Graph decompositions and factorizing permutations","authors":"C. Capelle, M. Habib","doi":"10.1109/ISTCS.1997.595165","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595165","url":null,"abstract":"A factorizing permutation of a given undirected graph is simply a permutation of the vertices in which all decomposition sets appear to be factors. Such a concept seems to play a central role in recent papers dealing with graph decomposition. We apply it to modular decomposition and we propose a linear algorithm that computes the whole decomposition tree when a factorizing permutation is provided. This algorithm can be seen as a common generalization of (Ma and Hsu, 1991) for modular decomposition of chordal graphs and (Habib et al., 1995) for inheritance graph decomposition. It also suggests many new decomposition algorithms for various notions of graph decompositions.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Optimal query bounds for reconstructing a Hamiltonian cycle in complete graphs 完全图中重构哈密顿循环的最优查询界
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595169
Vladimir Grebinski, G. Kucherov
{"title":"Optimal query bounds for reconstructing a Hamiltonian cycle in complete graphs","authors":"Vladimir Grebinski, G. Kucherov","doi":"10.1109/ISTCS.1997.595169","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595169","url":null,"abstract":"This paper studies four combinatorial search models of reconstructing a fixed unknown Hamiltonian cycle in the complete graph by means of queries about subgraphs. For each model, an efficient algorithm is proposed that matches asymptotically the information-theoretic lower bound. The problem is motivated by an application to genome physical mapping.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134150709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
On-line load balancing of temporary tasks on identical machines 同一机器上临时任务的在线负载平衡
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595163
Y. Azar, L. Epstein
{"title":"On-line load balancing of temporary tasks on identical machines","authors":"Y. Azar, L. Epstein","doi":"10.1109/ISTCS.1997.595163","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595163","url":null,"abstract":"We prove an exact lower bound of 2-1/m on the competitive ratio of any deterministic algorithm for load balancing of temporary tasks on m identical machines. We also show a lower bound of 2-1/m for randomized algorithms for small m and 2-2/m+1 for general m. If in addition, we restrict the sequence to polynomial length, then the lower bound for randomized algorithms becomes 2-O(log log m/log m) for general m.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114658184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Closure properties of GapP and #P GapP和#P的闭包特性
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595166
R. Beigel
{"title":"Closure properties of GapP and #P","authors":"R. Beigel","doi":"10.1109/ISTCS.1997.595166","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595166","url":null,"abstract":"We classify the relativizable closure properties of GapP, solving a problem posed by (Hertrampf et al., 1995). We also give a simple proof of their classification of functions that are relativizable closure properties of #P.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126026626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Private simultaneous messages protocols with applications 带有应用程序的私有同步消息协议
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595170
Y. Ishai, E. Kushilevitz
{"title":"Private simultaneous messages protocols with applications","authors":"Y. Ishai, E. Kushilevitz","doi":"10.1109/ISTCS.1997.595170","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595170","url":null,"abstract":"We study the Private Simultaneous Messages (PSM) model which is a variant of the model proposed in Feige et. al., (1994). In the PSM model there are n players P/sub 1/, ..., P/sub n/, each player P/sub i/ holding a secret input x/sub i/ (say, a bit), and all having access to a common random string. Each player sends a single message to a special player, Carol, depending an its own input and the random string (and independently of all other messages). Based on these messages, Carol should be able to compute f(x/sub 1/, ..., x/sub n/) (for some predetermined function f) but should learn no additional information on the values of x/sub 1/, ..., x/sub n/. Our results go in two directions. First, we present efficient PSM protocols, which improve the efficiency of previous solutions, and extend their scope to several function classes for which no such solutions were known before. These classes include most of the important linear algebraic functions; as a result, we get efficient constant-round private protocols (in the standard model) for these classes. Second, we present reductions that allow transforming PSM protocols into solutions for some other problems, thereby demonstrating the power of this model. An interesting reduction of this sort shows how to construct, based on a standard (/sub 1//sup 2/)-OT (Oblivious Transfer) primitive, generalized-OT (GOT) primitives that, we believe, might be useful for the design of cryptographic protocols.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
Faster subtree isomorphism 更快的子树同构
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595164
R. Shamir, Dekel Tsur
{"title":"Faster subtree isomorphism","authors":"R. Shamir, Dekel Tsur","doi":"10.1109/ISTCS.1997.595164","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595164","url":null,"abstract":"We study the subtree isomorphism problem: Given trees H and G, find a subtree of G which is isomorphic to H or decide that there is no such subtree. We give an O(~k/sup 1.8//log k n) time algorithm for this problem, where k and n are the number of vertices in H and G respectively. This improves over the O(k/sup 1.5/n) algorithms of Chung (1987) and Matula (1978). We also give a randomized (Las Vegas) O(min(k/sup 1.45/n, kn/sup 1.43/))-time algorithm for the decision problem.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 146
Local stabilizer 当地的稳定剂
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595159
Y. Afek, S. Dolev
{"title":"Local stabilizer","authors":"Y. Afek, S. Dolev","doi":"10.1109/ISTCS.1997.595159","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595159","url":null,"abstract":"A local stabilizer protocol that takes any on-line or of-line distributed algorithm and converts it into a synchronous self-stabilizing algorithm with local monitoring and repairing properties is presented. Whenever the self-stabilizing version enters an inconsistent state, the inconsistency is detected, in O(1) time, and the system state is repaired in a local manner. The expected computation time that is lost during the repair process is proportional to the largest diameter of a faulty region.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
Stereoscopic families of permutations, and their applications 立体排列族及其应用
Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems Pub Date : 1997-06-17 DOI: 10.1109/ISTCS.1997.595160
U. Feige, Robert Krauthgamer
{"title":"Stereoscopic families of permutations, and their applications","authors":"U. Feige, Robert Krauthgamer","doi":"10.1109/ISTCS.1997.595160","DOIUrl":"https://doi.org/10.1109/ISTCS.1997.595160","url":null,"abstract":"A stereoscopic family of permutations maps an m-dimensional mesh into several 1-dimensional lines, in a way that jointly preserves distance information. Specifically, consider any two points and denote their distance on the m-dimensional mesh by d. Then the distance between their images, on the line on which these images are closest together is O(d/sup m/). We initiate a systematic study of stereoscopic families of permutations. We show a construction of these families that involves the use of m+1 images. We also show that under some additional restrictions (namely adjacent points on the image lines originate at points which are not too far away on the mesh), three images are necessary in order to construct such a family for the 2-dimensional mesh. We present two applications for stereoscopic families of permutations. One application is an algorithm for routing on the mesh that guarantees delivery of each packet within a number of steps that depends upon the distance between this packet's source and destination, but is independent of the size of the mesh. Our algorithm is exceptionally simple, involves no queues, and can be used in dynamic settings in which packets are continuously generated. Another application is an extension of the construction of nonexpansive hash functions of Linial and Sasson (STOC 96) from the case of one dimensional metrics to arbitrary dimensions.","PeriodicalId":367160,"journal":{"name":"Proceedings of the Fifth Israeli Symposium on Theory of Computing and Systems","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信