SIAM Journal on Computing最新文献

筛选
英文 中文
The Power of Two Choices in Graphical Allocation 图形分配中两种选择的力量
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-08-26 DOI: 10.1137/22m1541800
Nikhil Bansal, Ohad Feldheim
{"title":"The Power of Two Choices in Graphical Allocation","authors":"Nikhil Bansal, Ohad Feldheim","doi":"10.1137/22m1541800","DOIUrl":"https://doi.org/10.1137/22m1541800","url":null,"abstract":"SIAM Journal on Computing, Ahead of Print. <br/> Abstract. The graphical balls-into-bins process is a generalization of the classical 2-choice balls-into-bins process, where the bins correspond to vertices of an arbitrary underlying graph [math]. At each time step an edge of [math] is chosen uniformly at random, and a ball must be assigned to either of the two endpoints of this edge. The standard 2-choice process corresponds to the case of [math]. For any [math]-edge-connected, [math]-regular graph on [math] vertices, and any number of balls, we give an allocation strategy that, with high probability, ensures a gap of [math] between the load of any two bins. In particular, this implies a polylogarithmic bound for natural graphs such as cycles and tori, for which the classical greedy allocation strategy is conjectured to have a polynomial gap between the bin loads. For every graph [math], we also show an [math] lower bound on the gap achievable by any allocation strategy. This implies that our strategy achieves the optimal gap, up to polylogarithmic factors, for every graph [math]. Our allocation algorithm is simple to implement and requires only [math] time per allocation. It can be viewed as a more global version of the greedy strategy that compares average load on certain fixed sets of vertices, rather than on individual vertices. A key idea is to relate the problem of designing a good allocation strategy to that of finding suitable multicommodity flows. To this end, we consider Räcke’s cut-based decomposition tree and define certain orthogonal flows on it.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"69 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PTAS for Minimum Cost MultiCovering with Disks 最低成本磁盘多重覆盖 PTAS
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-08-22 DOI: 10.1137/22m1523352
Ziyun Huang, Qilong Feng, Jianxin Wang, Jinhui Xu
{"title":"PTAS for Minimum Cost MultiCovering with Disks","authors":"Ziyun Huang, Qilong Feng, Jianxin Wang, Jinhui Xu","doi":"10.1137/22m1523352","DOIUrl":"https://doi.org/10.1137/22m1523352","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 4, Page 1181-1215, August 2024. <br/> Abstract. In this paper, we study the following Minimum Cost Multicovering (MCMC) problem: Given a set of [math] client points [math] and a set of [math] server points [math] in a fixed dimensional [math] space, determine a set of disks centered at these server points so that each client point [math] is covered by at least [math] disks and the total cost of these disks is minimized, where [math] is a function that maps every client point to some nonnegative integer no more than [math] and the cost of each disk is measured by the [math]th power of its radius for some constant [math]. MCMC is a fundamental optimization problem with applications in many areas such as wireless/sensor networking. Despite extensive research on this problem for about two decades, only constant approximations were known for general [math]. It has been a long standing open problem to determine whether a PTAS is possible. In this paper, we give an affirmative answer to this question by presenting the first PTAS for it. Our approach is based on a number of novel techniques, such as balanced recursive realization and bubble charging, and new counterintuitive insights to the problem. Particularly, we approximate each disk with a set of sub-boxes and optimize them at the subdisk level. This allows us to first compute an approximate disk cover through dynamic programming, and then obtain the desired disk cover through a balanced recursive realization procedure.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"14 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Gomory–Hu Tree is Faster than [math] Maximum Flows 近似戈莫里-胡树比[数学]最大流量更快
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-08-20 DOI: 10.1137/21m1463379
Jason Li, Debmalya Panigrahi
{"title":"Approximate Gomory–Hu Tree is Faster than [math] Maximum Flows","authors":"Jason Li, Debmalya Panigrahi","doi":"10.1137/21m1463379","DOIUrl":"https://doi.org/10.1137/21m1463379","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 4, Page 1162-1180, August 2024. <br/> Abstract. The Gomory–Hu tree or cut tree [R. E. Gomory and T. C. Hu, J. Soc. Indust. Appl. Math., 9 (1961), pp. 551–570] is a classic data structure for reporting [math]-mincuts (and by duality, the values of [math]-maxflows) for all-pairs of vertices [math] and [math] in an undirected graph. Gomory and Hu showed that it can be computed using [math] exact maxflow computations. Surprisingly, this remains the best algorithm for Gomory–Hu trees more than 50 years later, even for approximate mincuts. In this paper, we break this longstanding barrier and give an algorithm for computing a [math]-approximate Gomory–Hu tree using [math] maxflow computations. Specifically, we obtain the running time bounds we describe below. We obtain a randomized (Monte Carlo) algorithm for undirected, weighted graphs that runs in [math] time and returns a [math]-approximate Gomory–Hu tree with high probability (w.h.p.). Previously, the best running time known was [math], which is obtained by running Gomory and Hu’s original algorithm on a cut sparsifier of the graph. Next, we obtain a randomized (Monte Carlo) algorithm for undirected, unweighted graphs that runs in [math] time and returns a [math]-approximate Gomory–Hu tree w.h.p. This improves on our first result for sparse graphs, namely [math]. Previously, the best running time known for unweighted graphs was [math] for an exact Gomory–Hu tree [A. Bhalgat et al., Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, CA, 2007, pp. 605–614]; no better result is known if approximations are allowed. As a consequence of our Gomory–Hu tree algorithms, we also solve the [math]-approximate all-pairs mincut (APMC) and single-source mincut (SSMC) problems in the same time bounds. (These problems are simpler in that the goal is to only return the [math]-mincut values, and not the mincuts.) This improves on the recent algorithm for these problems in [math] time due to Abboud, Krauthgamer, and Trabelsi [2020 IEEE 61st Annual Symposium on Foundations of Computer Science, IEEE Computer Society, 2020, pp. 105–118].","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"69 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithms for Subpath Convex Hull Queries and Ray-Shooting among Segments 子路径凸壳查询算法和线段间射线扫描算法
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-08-13 DOI: 10.1137/21m145118x
Haitao Wang
{"title":"Algorithms for Subpath Convex Hull Queries and Ray-Shooting among Segments","authors":"Haitao Wang","doi":"10.1137/21m145118x","DOIUrl":"https://doi.org/10.1137/21m145118x","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 4, Page 1132-1161, August 2024. <br/> Abstract. In this paper, we first consider the subpath convex hull query problem: Given a simple path [math] of [math] vertices, preprocess it so that the convex hull of any query subpath of [math] can be quickly obtained. Previously, Guibas, Hershberger, and Snoeyink [Int. J. Comput. Geom. Appl., 1 (1991), pp. 1–22; first appeared in SODA 1990] proposed a data structure of [math] space and [math] query time; they also reduced the query time to [math] by increasing the space to [math]. We present an improved result that uses [math] space while achieving [math] query time. Like the previous work, our query algorithm returns a compact interval tree representing the convex hull so that standard binary-search-based queries on the hull can be performed in [math] time each. The preprocessing time of our data structure is [math] after the vertices of [math] are sorted by [math]-coordinate. As the subpath convex hull query problem has many applications, our new result leads to improvements for several other problems. In particular, with the help of the above result, along with other techniques, we present new algorithms for the ray-shooting problem among segments. Given a set of [math] (possibly intersecting) line segments in the plane, preprocess it so that the first segment hit by a query ray can be quickly found. We give a data structure of [math] space that can answer each query in [math] time. If the segments are nonintersecting or if the segments are lines, then the space can be reduced to [math]. As a by-product, given a set of [math] (possibly intersecting) segments in the plane, we build a data structure of [math] space that can determine whether a query line intersects a segment in [math] time. The preprocessing time is [math] for all four problems, which can be reduced to [math] time by a randomized algorithm so that the query time is bounded by [math] with high probability. All these are classical problems that have been studied extensively. Previously data structures of [math] query time were known in the early 1990s (the notation [math] suppresses a polylogarithmic factor); nearly no progress has been made for more than two decades. For all these problems, our new results provide improvements by reducing the space of the data structures by at least a logarithmic factor while the preprocessing and query times are the same as before or even better.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"60 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142225314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast FPT-Approximation of Branchwidth 分支宽度的快速 FPT 近似算法
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-08-08 DOI: 10.1137/22m153937x
Fedor V. Fomin, Tuukka Korhonen
{"title":"Fast FPT-Approximation of Branchwidth","authors":"Fedor V. Fomin, Tuukka Korhonen","doi":"10.1137/22m153937x","DOIUrl":"https://doi.org/10.1137/22m153937x","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 4, Page 1085-1131, August 2024. <br/> Abstract. Branchwidth determines how graphs and, more generally, arbitrary connectivity (symmetric and submodular) functions can be decomposed into a tree-like structure by specific cuts. We develop a general framework for designing fixed-parameter tractable 2-approximation algorithms for branchwidth of connectivity functions. The first ingredient of our framework is combinatorial. We prove a structural theorem establishing that either a sequence of particular refinement operations can decrease the width of a branch decomposition or the width of the decomposition is already within a factor of 2 from the optimum. The second ingredient is an efficient implementation of the refinement operations for branch decompositions that support efficient dynamic programming. We present two concrete applications of our general framework. The first is an algorithm that, for a given [math]-vertex graph [math] and integer [math], in time [math] either constructs a rank decomposition of [math] of width at most [math] or concludes that the rankwidth of [math] is more than [math]. It also yields a [math]-approximation algorithm for cliquewidth within the same time complexity, which in turn improves to [math] the running times of various algorithms on graphs of cliquewidth [math]. Breaking the “cubic barrier” for rankwidth and cliquewidth was an open problem in the area. The second application is an algorithm that, for a given [math]-vertex graph [math] and integer [math], in time [math] either constructs a branch decomposition of [math] of width at most [math] or concludes that the branchwidth of [math] is more than [math]. This improves over the 3-approximation that follows from the recent treewidth 2-approximation of Korhonen [FOCS 2021].","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"163 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141937388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisionist Simulations: A New Approach to Proving Space Lower Bounds 修正主义模拟:证明空间下限的新方法
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-08-01 DOI: 10.1137/20m1322923
Faith Ellen, Rati Gelashvili, Leqi Zhu
{"title":"Revisionist Simulations: A New Approach to Proving Space Lower Bounds","authors":"Faith Ellen, Rati Gelashvili, Leqi Zhu","doi":"10.1137/20m1322923","DOIUrl":"https://doi.org/10.1137/20m1322923","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 4, Page 1039-1084, August 2024. <br/> Abstract. Determining the number of registers required for solving obstruction-free (or randomized wait-free) [math]-set agreement is an open problem that highlights important gaps in our understanding of the space complexity of synchronization. The best known upper bound on the number of registers needed to solve this problem among [math] processes is [math] registers. No general lower bound better than 2 was known. We prove that any obstruction-free protocol solving [math]-set agreement among [math] processes must use at least [math] registers. In particular, we get a tight lower bound of exactly [math] registers for solving obstruction-free and randomized wait-free consensus. Our main tool is a simulation that serves as a reduction from the impossibility of deterministic wait-free [math]-set agreement. In particular, we show that if an obstruction-free protocol for [math]-set agreement uses fewer registers, then it is possible for [math] processes to simulate the protocol and deterministically solve [math]-set agreement in a wait-free manner, which is impossible. An important aspect of the simulation is the ability of simulating processes to revise the past of simulated processes. We introduce an augmented snapshot object, which facilitates this. More generally, our simulation applies to the broad class of colorless tasks. We can use it to prove, for example, a lower bound on the number of registers needed to solve obstruction-free [math]-approximate agreement, which matches the best known upper bound to within a factor of 2 when [math] is sufficiently small. No general lower bound for this problem was known. Finally, we prove that any lower bound on the number of registers used by obstruction-free protocols applies to protocols that satisfy nondeterministic solo-termination. Hence, our lower bounds for obstruction-free protocols also hold for randomized wait-free protocols.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economical Convex Coverings and Applications 经济型凸面覆盖物及其应用
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-07-31 DOI: 10.1137/23m1568351
Sunil Arya, Guilherme D. da Fonseca, David M. Mount
{"title":"Economical Convex Coverings and Applications","authors":"Sunil Arya, Guilherme D. da Fonseca, David M. Mount","doi":"10.1137/23m1568351","DOIUrl":"https://doi.org/10.1137/23m1568351","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 4, Page 1002-1038, August 2024. <br/> Abstract. Coverings of convex bodies have emerged as a central component in the design of efficient solutions to approximation problems involving convex bodies. Intuitively, given a convex body [math] and [math], a covering is a collection of convex bodies whose union covers [math] such that a constant factor expansion of each body lies within an [math] expansion of [math]. Coverings have been employed in many applications, such as approximations for diameter, width, and [math]-kernels of point sets, approximate nearest neighbor searching, polytope approximations with low combinatorial complexity, and approximations to the closest vector problem (CVP). It is known how to construct coverings of size [math] for general convex bodies in [math]. In special cases, such as when the convex body is the [math] unit ball, this bound has been improved to [math]. This raises the question of whether such a bound generally holds. In this paper we answer the question in the affirmative. We demonstrate the power and versatility of our coverings by applying them to the problem of approximating a convex body by a polytope, where the error is measured through the Banach–Mazur metric. Given a well-centered convex body [math] and an approximation parameter [math], we show that there exists a polytope [math] consisting of [math] vertices (facets) such that [math]. This bound is optimal in the worst case up to factors of [math]. (This bound has been established recently using different techniques, but our approach is arguably simpler and more elegant.) As an additional consequence, we obtain the fastest [math]-approximate CVP algorithm that works in any norm, with a running time of [math] up to polynomial factors in the input size, and we obtain the fastest [math]-approximation algorithm for integer programming. We also present a framework for constructing coverings of optimal size for any convex body (up to factors of [math]).","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"36 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating Maximum Independent Set for Rectangles in the Plane 近似平面内矩形的最大独立集
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-07-23 DOI: 10.1137/22m1475521
Joseph Mitchell
{"title":"Approximating Maximum Independent Set for Rectangles in the Plane","authors":"Joseph Mitchell","doi":"10.1137/22m1475521","DOIUrl":"https://doi.org/10.1137/22m1475521","url":null,"abstract":"SIAM Journal on Computing, Ahead of Print. <br/> Abstract. We give a polynomial-time constant-factor approximation algorithm for the maximum independent set of (axis-aligned) rectangles problem in the plane. Using a polynomial-time algorithm, the best approximation factor previously known is [math]. The results are based on a new form of recursive partitioning in the plane, in which faces that are constant-complexity and orthogonally convex are recursively partitioned into a constant number of such faces.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"71 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141782513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Privacy of Noisy Stochastic Gradient Descent for Convex Optimization 论凸优化的噪声随机梯度下降的隐私性
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-07-19 DOI: 10.1137/23m1556538
Jason M. Altschuler, Jinho Bok, Kunal Talwar
{"title":"On the Privacy of Noisy Stochastic Gradient Descent for Convex Optimization","authors":"Jason M. Altschuler, Jinho Bok, Kunal Talwar","doi":"10.1137/23m1556538","DOIUrl":"https://doi.org/10.1137/23m1556538","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 4, Page 969-1001, August 2024. <br/> Abstract. A central issue in machine learning is how to train models on sensitive user data. Industry has widely adopted a simple algorithm: Stochastic Gradient Descent (SGD) with noise (a.k.a. Stochastic Gradient Langevin Dynamics). However, foundational theoretical questions about this algorithm’s privacy loss remain open—even in the seemingly simple setting of smooth convex losses over a bounded domain. Our main result resolves these questions: for a large range of parameters, we characterize the differential privacy up to a constant factor. This result reveals that all previous analyses for this setting have the wrong qualitative behavior. Specifically, while previous privacy analyses increase ad infinitum in the number of iterations, we show that after a small burn-in period, running SGD longer leaks no further privacy. Our analysis departs from previous approaches based on fast mixing, instead using techniques based on optimal transport (namely, Privacy Amplification by Iteration) and the Sampled Gaussian Mechanism (namely, Privacy Amplification by Sampling). Our techniques readily extend to other settings, e.g., strongly convex losses, nonuniform stepsizes, arbitrary batch sizes, and random or cyclic choice of batches.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"18 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circuits Resilient to Short-Circuit Errors 可抵御短路错误的电路
IF 1.6 3区 计算机科学
SIAM Journal on Computing Pub Date : 2024-07-16 DOI: 10.1137/22m1520578
Klim Efremenko, Bernhard Haeupler, Yael Tauman Kalai, Pritish Kamath, Gillat Kol, Nicolas Resch, Raghuvansh R. Saxena
{"title":"Circuits Resilient to Short-Circuit Errors","authors":"Klim Efremenko, Bernhard Haeupler, Yael Tauman Kalai, Pritish Kamath, Gillat Kol, Nicolas Resch, Raghuvansh R. Saxena","doi":"10.1137/22m1520578","DOIUrl":"https://doi.org/10.1137/22m1520578","url":null,"abstract":"SIAM Journal on Computing, Ahead of Print. <br/> Abstract. Given a Boolean circuit [math], we wish to convert it to a circuit [math] that computes the same function as [math], even if some of its gates suffer from adversarial short circuit errors, i.e., their output is replaced by the value of one of their inputs [D. J. Kleitman, F. T. Leighton, and Y. Ma, J. Comput. System Sci., 55 (1997), pp. 385–401]. Can we design such a resilient circuit [math] whose size is roughly comparable to that of [math]? Prior work [T. Kalai, A. B. Lewko, and A. Rao, Formulas resilient to short-circuit errors, in Foundations of Computer Science (FOCS), 2012, pp. 490–499; M. Braverman et al., Optimal short-circuit resilient formulas, in Computational Complexity Conference (CCC), Vol. 137, 2019, pp. 10:1–10:22] gave a positive answer for the special case where [math] is a formula. We study the general case and show that any Boolean circuit [math] of size [math] can be converted to a new circuit [math] of quasi-polynomial size [math] that computes the same function as [math], even if a [math] fraction of the gates on any root-to-leaf path in [math] are short circuited. Moreover, if the original circuit [math] is a formula, the resilient circuit [math] is of near-linear size [math]. The construction of our resilient circuits utilizes the connection between circuits and dag-like communication protocols [A. Razborov, Izvestiya of the RAN, 59 (1995), pp. 201–224; P. Pudlák, On extracting computations from propositional proofs (a survey), in Foundations of Software Technology and Theoretical Computer Science (FSTTCS) Vol. 8, 2010, pp. 30–41; D. Sokolov, Dag-like communication and its applications, in Computer Science Symposium in Russia (CSR), Springer, 2017, pp. 294–307], originally introduced in the context of proof complexity.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"30 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信