id
stringlengths
9
16
submitter
stringlengths
4
52
authors
stringlengths
4
937
title
stringlengths
7
243
comments
stringlengths
1
472
journal-ref
stringlengths
4
244
doi
stringlengths
14
55
report-no
stringlengths
3
125
categories
stringlengths
5
97
license
stringclasses
9 values
abstract
stringlengths
33
2.95k
versions
list
update_date
unknown
authors_parsed
sequence
cs/9809012
David Karger
David R. Karger
A Fully Polynomial Randomized Approximation Scheme for the All Terminal Network Reliability Problem
To appear in SICOMP
null
null
null
cs.DS
null
The classic all-terminal network reliability problem posits a graph, each of whose edges fails independently with some given probability.
[ { "version": "v1", "created": "Wed, 9 Sep 1998 02:38:56 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Karger", "David R.", "" ] ]
cs/9809064
Madhav Marathe
Madhav V. Marathe, Harry B. Hunt III, Richard E. Stearns, Venkatesh Radhakrishnan
Approximation Algorithms for PSPACE-Hard Hierarchically and Periodically Specified Problems
5 Figures, 24 pages
SIAM J. Computing, Vol. 27, No 5, Oct. 1998, pp. 1237--1261
null
null
cs.CC cs.DS
null
We study the efficient approximability of basic graph and logic problems in the literature when instances are specified hierarchically as in \cite{Le89} or are specified by 1-dimensional finite narrow periodic specifications as in \cite{Wa93}. We show that, for most of the problems $\Pi$ considered when specified using {\bf k-level-restricted} hierarchical specifications or $k$-narrow periodic specifications the following holds: \item Let $\rho$ be any performance guarantee of a polynomial time approximation algorithm for $\Pi$, when instances are specified using standard specifications. Then $\forall \epsilon > 0$, $ \Pi$ has a polynomial time approximation algorithm with performance guarantee $(1 + \epsilon) \rho$. \item $\Pi$ has a polynomial time approximation scheme when restricted to planar instances. \end{romannum} These are the first polynomial time approximation schemes for PSPACE-hard hierarchically or periodically specified problems. Since several of the problems considered are PSPACE-hard, our results provide the first examples of natural PSPACE-hard optimization problems that have polynomial time approximation schemes. This answers an open question in Condon et. al. \cite{CF+93}.
[ { "version": "v1", "created": "Wed, 23 Sep 1998 15:58:21 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Marathe", "Madhav V.", "" ], [ "Hunt", "Harry B.", "III" ], [ "Stearns", "Richard E.", "" ], [ "Radhakrishnan", "Venkatesh", "" ] ]
cs/9809103
Madhav Marathe
Madhav V. Marathe, R. Ravi, Ravi Sundaram, S. S. Ravi, Daniel J. Rosenkrantz, Harry B. Hunt III
Bicriteria Network Design Problems
24 pages 1 figure
J. Algorithms, 28, 142-171, (1998)
null
null
cs.CC cs.DS
null
We study a general class of bicriteria network design problems. A generic problem in this class is as follows: Given an undirected graph and two minimization objectives (under different cost functions), with a budget specified on the first, find a <subgraph \from a given subgraph-class that minimizes the second objective subject to the budget on the first. We consider three different criteria - the total edge cost, the diameter and the maximum degree of the network. Here, we present the first polynomial-time approximation algorithms for a large class of bicriteria network design problems for the above mentioned criteria. The following general types of results are presented. First, we develop a framework for bicriteria problems and their approximations. Second, when the two criteria are the same %(note that the cost functions continue to be different) we present a ``black box'' parametric search technique. This black box takes in as input an (approximation) algorithm for the unicriterion situation and generates an approximation algorithm for the bicriteria case with only a constant factor loss in the performance guarantee. Third, when the two criteria are the diameter and the total edge costs we use a cluster-based approach to devise a approximation algorithms --- the solutions output violate both the criteria by a logarithmic factor. Finally, for the class of treewidth-bounded graphs, we provide pseudopolynomial-time algorithms for a number of bicriteria problems using dynamic programming. We show how these pseudopolynomial-time algorithms can be converted to fully polynomial-time approximation schemes using a scaling technique.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 17:48:18 GMT" } ]
"2019-08-17T00:00:00"
[ [ "Marathe", "Madhav V.", "" ], [ "Ravi", "R.", "" ], [ "Sundaram", "Ravi", "" ], [ "Ravi", "S. S.", "" ], [ "Rosenkrantz", "Daniel J.", "" ], [ "Hunt", "Harry B.", "III" ] ]
cs/9809122
Osamu Watanabe
Carlos Domingo, Ricard Gavalda, and Osamu Watanabe
Practical algorithms for on-line sampling
To appear in the Proc. of Discovery Science '98, Dec. 1998
null
null
C-123
cs.LG cs.DS
null
One of the core applications of machine learning to knowledge discovery consists on building a function (a hypothesis) from a given amount of data (for instance a decision tree or a neural network) such that we can use it afterwards to predict new instances of the data. In this paper, we focus on a particular situation where we assume that the hypothesis we want to use for prediction is very simple, and thus, the hypotheses class is of feasible size. We study the problem of how to determine which of the hypotheses in the class is almost the best one. We present two on-line sampling algorithms for selecting hypotheses, give theoretical bounds on the number of necessary examples, and analize them exprimentally. We compare them with the simple batch sampling approach commonly used and show that in most of the situations our algorithms use much fewer number of examples.
[ { "version": "v1", "created": "Wed, 30 Sep 1998 03:44:08 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Domingo", "Carlos", "" ], [ "Gavalda", "Ricard", "" ], [ "Watanabe", "Osamu", "" ] ]
cs/9810009
Maurizio Pizzonia
Maurizio Pizzonia, Giuseppe Di Battista
Object-Oriented Design of Graph Oriented Data Structures
10 pages, 9 figures, code examples, ALENEX (accepted)
null
null
null
cs.SE cs.CG cs.DS
null
Applied research in graph algorithms and combinatorial structures needs comprehensive and versatile software libraries. However, the design and the implementation of flexible libraries are challenging activities. Among the other problems involved in such a difficult field, a very special role is played by graph classification issues. We propose new techniques devised to help the designer and the programmer in the development activities. Such techniques are especially suited for dealing with graph classification problems and rely on an extension of the usual object-oriented paradigm. In order to support the usage of our approach, we devised an extension of the C++ programming language and implemented the corresponding pre-compiler.
[ { "version": "v1", "created": "Thu, 8 Oct 1998 23:54:51 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Pizzonia", "Maurizio", "" ], [ "Di Battista", "Giuseppe", "" ] ]
cs/9811019
Joseph O'Rourke
T. Biedl, E. Demaine, M. Demaine, S. Lazard, A. Lubiw, J. O'Rourke, M. Overmars, S. Robbins, I. Streinu, G. Toussaint, S. Whitesides
Locked and Unlocked Polygonal Chains in 3D
To appear in Proc. 10th ACM-SIAM Sympos. Discrete Algorithms, Jan. 1999
Proc. 10th ACM-SIAM Sympos. Discrete Algorithms, Jan. 1999, pp. S866-7.
null
null
cs.CG cs.DS cs.RO
null
In this paper, we study movements of simple polygonal chains in 3D. We say that an open, simple polygonal chain can be straightened if it can be continuously reconfigured to a straight sequence of segments in such a manner that both the length of each link and the simplicity of the chain are maintained throughout the movement. The analogous concept for closed chains is convexification: reconfiguration to a planar convex polygon. Chains that cannot be straightened or convexified are called locked. While there are open chains in 3D that are locked, we show that if an open chain has a simple orthogonal projection onto some plane, it can be straightened. For closed chains, we show that there are unknotted but locked closed chains, and we provide an algorithm for convexifying a planar simple polygon in 3D with a polynomial number of moves.
[ { "version": "v1", "created": "Wed, 11 Nov 1998 20:36:50 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Biedl", "T.", "" ], [ "Demaine", "E.", "" ], [ "Demaine", "M.", "" ], [ "Lazard", "S.", "" ], [ "Lubiw", "A.", "" ], [ "O'Rourke", "J.", "" ], [ "Overmars", "M.", "" ], [ "Robbins", "S.", "" ], [ "Streinu", "I.", "" ], [ "Toussaint", "G.", "" ], [ "Whitesides", "S.", "" ] ]
cs/9812007
David Karger
David R. Karger
Minimum Cuts in Near-Linear Time
null
null
null
null
cs.DS
null
We significantly improve known time bounds for solving the minimum cut problem on undirected graphs. We use a ``semi-duality'' between minimum cuts and maximum spanning tree packings combined with our previously developed random sampling techniques. We give a randomized algorithm that finds a minimum cut in an m-edge, n-vertex graph with high probability in O(m log^3 n) time. We also give a simpler randomized algorithm that finds all minimum cuts with high probability in O(n^2 log n) time. This variant has an optimal RNC parallelization. Both variants improve on the previous best time bound of O(n^2 log^3 n). Other applications of the tree-packing approach are new, nearly tight bounds on the number of near minimum cuts a graph may have and a new data structure for representing them in a space-efficient manner.
[ { "version": "v1", "created": "Tue, 8 Dec 1998 21:29:20 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Karger", "David R.", "" ] ]
cs/9812008
David Karger
David Karger, Rajeev Motwani, and Madhu Sudan
Approximate Graph Coloring by Semidefinite Programming
null
JACM 45(2), mar. 1998, pp.246--265
null
null
cs.DS
null
We consider the problem of coloring k-colorable graphs with the fewest possible colors. We present a randomized polynomial time algorithm that colors a 3-colorable graph on $n$ vertices with min O(Delta^{1/3} log^{1/2} Delta log n), O(n^{1/4} log^{1/2} n) colors where Delta is the maximum degree of any vertex. Besides giving the best known approximation ratio in terms of n, this marks the first non-trivial approximation result as a function of the maximum degree Delta. This result can be generalized to k-colorable graphs to obtain a coloring using min O(Delta^{1-2/k} log^{1/2} Delta log n), O(n^{1-3/(k+1)} log^{1/2} n) colors. Our results are inspired by the recent work of Goemans and Williamson who used an algorithm for semidefinite optimization problems, which generalize linear programs, to obtain improved approximations for the MAX CUT and MAX 2-SAT problems. An intriguing outcome of our work is a duality relationship established between the value of the optimum solution to our semidefinite program and the Lovasz theta-function. We show lower bounds on the gap between the optimum solution of our semidefinite program and the actual chromatic number; by duality this also demonstrates interesting new facts about the theta-function.
[ { "version": "v1", "created": "Tue, 8 Dec 1998 22:03:36 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Karger", "David", "" ], [ "Motwani", "Rajeev", "" ], [ "Sudan", "Madhu", "" ] ]
cs/9901004
Vladimir Pestov
Vladimir Pestov
On the geometry of similarity search: dimensionality curse and concentration of measure
7 pages, LaTeX 2e
Information Processing Letters 73 (2000), 47-51.
null
RP-99-01, Victoria University of Wellington, NZ
cs.IR cs.CG cs.DB cs.DS
null
We suggest that the curse of dimensionality affecting the similarity-based search in large datasets is a manifestation of the phenomenon of concentration of measure on high-dimensional structures. We prove that, under certain geometric assumptions on the query domain $\Omega$ and the dataset $X$, if $\Omega$ satisfies the so-called concentration property, then for most query points $x^\ast$ the ball of radius $(1+\e)d_X(x^\ast)$ centred at $x^\ast$ contains either all points of $X$ or else at least $C_1\exp(-C_2\e^2n)$ of them. Here $d_X(x^\ast)$ is the distance from $x^\ast$ to the nearest neighbour in $X$ and $n$ is the dimension of $\Omega$.
[ { "version": "v1", "created": "Tue, 12 Jan 1999 21:56:39 GMT" } ]
"2009-11-17T00:00:00"
[ [ "Pestov", "Vladimir", "" ] ]
cs/9901010
Tao Jiang
Tao Jiang (McMaster U.), Ming Li (U of Waterloo), Paul Vitanyi (CWI and U of Amsterdam)
Average-Case Complexity of Shellsort
11 pages. Submitted to ICALP'99
null
null
null
cs.DS cs.CC
null
We prove a general lower bound on the average-case complexity of Shellsort: the average number of data-movements (and comparisons) made by a $p$-pass Shellsort for any incremental sequence is $\Omega (pn^{1 + 1/p)$ for all $p \leq \log n$. Using similar arguments, we analyze the average-case complexity of several other sorting algorithms.
[ { "version": "v1", "created": "Wed, 20 Jan 1999 16:32:01 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Jiang", "Tao", "", "McMaster U." ], [ "Li", "Ming", "", "U of Waterloo" ], [ "Vitanyi", "Paul", "", "CWI\n and U of Amsterdam" ] ]
cs/9902005
Paul Vitanyi
Harry Buhrman (CWI), Matthew Franklin (Xerox PARC), Juan A. Garay (Bell Labs - Lucent Technologies), Jaap-Henk Hoepman (University Twente), John Tromp (CWI), Paul Vitanyi (CWI and University of Amsterdam)
Mutual Search
18 pages, Latex, 5 figures, J. Assoc. Comp. Mach., To appear
null
null
null
cs.DS cs.CC cs.DB cs.DC cs.DM cs.IR
null
We introduce a search problem called ``mutual search'' where $k$ \agents, arbitrarily distributed over $n$ sites, are required to locate one another by posing queries of the form ``Anybody at site $i$?''. We ask for the least number of queries that is necessary and sufficient. For the case of two \agents using deterministic protocols we obtain the following worst-case results: In an oblivious setting (where all pre-planned queries are executed) there is no savings: $n-1$ queries are required and are sufficient. In a nonoblivious setting we can exploit the paradigm of ``no news is also news'' to obtain significant savings: in the synchronous case $0.586n$ queries suffice and $0.536n$ queries are required; in the asynchronous case $0.896n$ queries suffice and a fortiori 0.536 queries are required; for $o(\sqrt{n})$ \agents using a deterministic protocol less than $n$ queries suffice; there is a simple randomized protocol for two \agents with worst-case expected $0.5n$ queries and all randomized protocols require at least $0.125n$ worst-case expected queries. The graph-theoretic framework we formulate for expressing and analyzing algorithms for this problem may be of independent interest.
[ { "version": "v1", "created": "Tue, 2 Feb 1999 15:46:00 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Buhrman", "Harry", "", "CWI" ], [ "Franklin", "Matthew", "", "Xerox PARC" ], [ "Garay", "Juan A.", "", "Bell Labs - Lucent Technologies" ], [ "Hoepman", "Jaap-Henk", "", "University Twente" ], [ "Tromp", "John", "", "CWI" ], [ "Vitanyi", "Paul", "", "CWI and University of Amsterdam" ] ]
cs/9902006
Paul Vitanyi
Paul Vitanyi
A Discipline of Evolutionary Programming
25 pages, LaTeX source, Theoretical Computer Science, To appear
Theoret. Comp. Sci., 241:1-2 (2000), 3--23.
null
null
cs.NE cs.AI cs.CC cs.DS cs.LG cs.MA
null
Genetic fitness optimization using small populations or small population updates across generations generally suffers from randomly diverging evolutions. We propose a notion of highly probable fitness optimization through feasible evolutionary computing runs on small size populations. Based on rapidly mixing Markov chains, the approach pertains to most types of evolutionary genetic algorithms, genetic programming and the like. We establish that for systems having associated rapidly mixing Markov chains and appropriate stationary distributions the new method finds optimal programs (individuals) with probability almost 1. To make the method useful would require a structured design methodology where the development of the program and the guarantee of the rapidly mixing property go hand in hand. We analyze a simple example to show that the method is implementable. More significant examples require theoretical advances, for example with respect to the Metropolis filter.
[ { "version": "v1", "created": "Tue, 2 Feb 1999 16:17:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Vitanyi", "Paul", "" ] ]
cs/9903009
Paul Vitanyi
Harry Buhrman (CWI), Jaap-Henk Hoepman, Paul Vitanyi (CWI and University of Amsterdam)
Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method
19 pages, Latex, 1 table, 1 figure; SIAM J. Comput., To appear
null
null
CWI Tech Report 1997
cs.DC cs.AR cs.CC cs.DS cs.NI
null
We use the incompressibility method based on Kolmogorov complexity to determine the total number of bits of routing information for almost all network topologies. In most models for routing, for almost all labeled graphs $\Theta (n^2)$ bits are necessary and sufficient for shortest path routing. By `almost all graphs' we mean the Kolmogorov random graphs which constitute a fraction of $1-1/n^c$ of all graphs on $n$ nodes, where $c > 0$ is an arbitrary fixed constant. There is a model for which the average case lower bound rises to $\Omega(n^2 \log n)$ and another model where the average case upper bound drops to $O(n \log^2 n)$. This clearly exposes the sensitivity of such bounds to the model under consideration. If paths have to be short, but need not be shortest (if the stretch factor may be larger than 1), then much less space is needed on average, even in the more demanding models. Full-information routing requires $\Theta (n^3)$ bits on average. For worst-case static networks we prove a $\Omega(n^2 \log n)$ lower bound for shortest path routing and all stretch factors $<2$ in some networks where free relabeling is not allowed.
[ { "version": "v1", "created": "Wed, 10 Mar 1999 19:01:02 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Buhrman", "Harry", "", "CWI" ], [ "Hoepman", "Jaap-Henk", "", "CWI and\n University of Amsterdam" ], [ "Vitanyi", "Paul", "", "CWI and\n University of Amsterdam" ] ]
cs/9903010
Anatoly D. Plotnikov
Anatoly D. Plotnikov (Vinnitsa Institute of Regional Economics and Management)
A class of problems of NP to be worth to search an efficient solving algorithm
9 pages, 1 figures
null
null
null
cs.DS
null
We examine possibility to design an efficient solving algorithm for problems of the class \np. It is introduced a classification of \np problems by the property that a partial solution of size $k$ can be extended into a partial solution of size $k+1$ in polynomial time. It is defined an unique class problems to be worth to search an efficient solving algorithm. The problems, which are outside of this class, are inherently exponential. We show that the Hamiltonian cycle problem is inherently exponential.
[ { "version": "v1", "created": "Thu, 11 Mar 1999 19:36:05 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Plotnikov", "Anatoly D.", "", "Vinnitsa Institute of Regional Economics and\n Management" ] ]
cs/9903011
Stephan Mertens
Stephan Mertens
A complete anytime algorithm for balanced number partitioning
12 pages, 5 figures
null
null
null
cs.DS cond-mat.dis-nn cs.AI
null
Given a set of numbers, the balanced partioning problem is to divide them into two subsets, so that the sum of the numbers in each subset are as nearly equal as possible, subject to the constraint that the cardinalities of the subsets be within one of each other. We combine the balanced largest differencing method (BLDM) and Korf's complete Karmarkar-Karp algorithm to get a new algorithm that optimally solves the balanced partitioning problem. For numbers with twelve significant digits or less, the algorithm can optimally solve balanced partioning problems of arbitrary size in practice. For numbers with greater precision, it first returns the BLDM solution, then continues to find better solutions as time allows.
[ { "version": "v1", "created": "Thu, 11 Mar 1999 22:38:01 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Mertens", "Stephan", "" ] ]
cs/9903012
Anatoly D. Plotnikov
Anatoly D. Plotnikov
Formalization of the class of problems solvable by a nondeterministic Turing machine
10 pages, 2 figures
Cybernetics and Systems Analysis. Vol. 33, 5(1997) pp. 635-640
null
null
cs.DS cs.CC
null
The objective of this article is to formalize the definition of NP problems. We construct a mathematical model of discrete problems as independence systems with weighted elements. We introduce two auxiliary sets that characterize the solution of the problem: the adjoint set, which contains the elements from the original set none of which can be adjoined to the already chosen solution elements; and the residual set, in which every element can be adjoined to previously chosen solution elements. In a problem without lookahead, every adjoint set can be generated by the solution algorithm effectively, in polynomial time. The main result of the study is the assertion that the NP class is identical with the class of problems without lookahead. Hence it follows that if we fail to find an effective (polynomial-time) solution algorithm for a given problem, then we need to look for an alternative formulation of the problem in set of problems without lookahead.
[ { "version": "v1", "created": "Tue, 16 Mar 1999 17:13:43 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Plotnikov", "Anatoly D.", "" ] ]
cs/9903020
Christoph D\"urr
Christoph Durr, Eric Goles, Ivan Rapaport, Eric Remila
Tiling with bars under tomographic constraints
Updated references
null
null
null
cs.DS cs.CC
null
We wish to tile a rectangle or a torus with only vertical and horizontal bars of a given length, such that the number of bars in every column and row equals given numbers. We present results for particular instances and for a more general problem, while leaving open the initial problem.
[ { "version": "v1", "created": "Wed, 31 Mar 1999 09:58:20 GMT" }, { "version": "v2", "created": "Wed, 7 Jul 1999 06:51:42 GMT" }, { "version": "v3", "created": "Fri, 28 Sep 2001 15:59:30 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Durr", "Christoph", "" ], [ "Goles", "Eric", "" ], [ "Rapaport", "Ivan", "" ], [ "Remila", "Eric", "" ] ]
cs/9904002
Vladimir Pestov
Vladimir Pestov
A geometric framework for modelling similarity search
11 pages, LaTeX 2.e
Proc. 10-th Int. Workshop on Database and Expert Systems Applications (DEXA'99), Sept. 1-3, 1999, Florence, Italy, IEEE Comp. Soc., pp. 150-154.
10.1109/DEXA.1999.795158
RP-99-12, School of Math and Comp Sci, Victoria University of Wellington, New Zealand
cs.IR cs.DB cs.DS
null
The aim of this paper is to propose a geometric framework for modelling similarity search in large and multidimensional data spaces of general nature, which seems to be flexible enough to address such issues as analysis of complexity, indexability, and the `curse of dimensionality.' Such a framework is provided by the concept of the so-called similarity workload, which is a probability metric space $\Omega$ (query domain) with a distinguished finite subspace $X$ (dataset), together with an assembly of concepts, techniques, and results from metric geometry. They include such notions as metric transform, $\e$-entropy, and the phenomenon of concentration of measure on high-dimensional structures. In particular, we discuss the relevance of the latter to understanding the curse of dimensionality. As some of those concepts and techniques are being currently reinvented by the database community, it seems desirable to try and bridge the gap between database research and the relevant work already done in geometry and analysis.
[ { "version": "v1", "created": "Wed, 7 Apr 1999 04:16:02 GMT" }, { "version": "v2", "created": "Mon, 21 Jun 1999 03:45:13 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Pestov", "Vladimir", "" ] ]
cs/9906008
Paul Vitanyi
Tao Jiang (McMaster U.), Ming Li (U. Waterloo), Paul Vitanyi (CWI & U. Amsterdam)
A Lower Bound on the Average-Case Complexity of Shellsort
Preliminary version 10 pages, 2 figures, Proc ICALP 99, Springer LNCS; final version (given here) LaTeX 5 pages published in J. Assoc. Comp. Mach. as below
T. Jiang, M. Li, and P. Vitanyi, A lower bound on the average-case complexity of Shellsort, J. Assoc. Comp. Mach., 47:5(2000), 905--91
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a general lower bound on the average-case complexity of Shellsort: the average number of data-movements (and comparisons) made by a $p$-pass Shellsort for any incremental sequence is $\Omega (pn^{1 + 1/p})$ for every $p$. The proof method is an incompressibility argument based on Kolmogorov complexity. Using similar techniques, the average-case complexity of several other sorting algorithms is analyzed.
[ { "version": "v1", "created": "Fri, 4 Jun 1999 15:11:31 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2015 15:25:40 GMT" } ]
"2015-01-29T00:00:00"
[ [ "Jiang", "Tao", "", "McMaster U." ], [ "Li", "Ming", "", "U. Waterloo" ], [ "Vitanyi", "Paul", "", "CWI & U.\n Amsterdam" ] ]
cs/9906018
Christoph Durr
Christoph Durr and Marek Chrobak
Reconstructing Polyatomic Structures from Discrete X-Rays: NP-Completeness Proof for Three Atoms
null
Proceedings of the 23rd International Symposium on Mathematical Foundations of Computer Science, LNCS vol 1450, 185-193, 1998
null
null
cs.DS cs.CC
null
We address a discrete tomography problem that arises in the study of the atomic structure of crystal lattices. A polyatomic structure T can be defined as an integer lattice in dimension D>=2, whose points may be occupied by $c$ distinct types of atoms. To ``analyze'' T, we conduct ell measurements that we call_discrete X-rays_. A discrete X-ray in direction xi determines the number of atoms of each type on each line parallel to xi. Given ell such non-parallel X-rays, we wish to reconstruct T. The complexity of the problem for c=1 (one atom type) has been completely determined by Gardner, Gritzmann and Prangenberg, who proved that the problem is NP-complete for any dimension D>=2 and ell>=3 non-parallel X-rays, and that it can be solved in polynomial time otherwise. The NP-completeness result above clearly extends to any c>=2, and therefore when studying the polyatomic case we can assume that ell=2. As shown in another article by the same authors, this problem is also NP-complete for c>=6 atoms, even for dimension D=2 and axis-parallel X-rays. They conjecture that the problem remains NP-complete for c=3,4,5, although, as they point out, the proof idea does not seem to extend to c<=5. We resolve the conjecture by proving that the problem is indeed NP-complete for c>=3 in 2D, even for axis-parallel X-rays. Our construction relies heavily on some structure results for the realizations of 0-1 matrices with given row and column sums.
[ { "version": "v1", "created": "Mon, 21 Jun 1999 15:33:20 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Durr", "Christoph", "" ], [ "Chrobak", "Marek", "" ] ]
cs/9906021
Christoph D\"urr
Christoph Durr and Marek Chrobak
Reconstructing hv-Convex Polyominoes from Orthogonal Projections
null
Information Processing Letters, 69, 1999, 283-289
null
null
cs.DS
null
Tomography is the area of reconstructing objects from projections. Here we wish to reconstruct a set of cells in a two dimensional grid, given the number of cells in every row and column. The set is required to be an hv-convex polyomino, that is all its cells must be connected and the cells in every row and column must be consecutive. A simple, polynomial algorithm for reconstructing hv-convex polyominoes is provided, which is several orders of magnitudes faster than the best previously known algorithm from Barcucci et al. In addition, the problem of reconstructing a special class of centered hv-convex polyominoes is addressed. (An object is centered if it contains a row whose length equals the total width of the object). It is shown that in this case the reconstruction problem can be solved in linear time.
[ { "version": "v1", "created": "Tue, 22 Jun 1999 09:56:53 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Durr", "Christoph", "" ], [ "Chrobak", "Marek", "" ] ]
cs/9906024
Christoph D\"urr
Christoph Durr, Huong LeThanh and Miklos Santha
A decision procedure for well-formed linear quantum cellular automata
null
Random Structures and Algorithms 11, 381-394, 1997
null
null
cs.DS cs.CC quant-ph
null
In this paper we introduce a new quantum computation model, the linear quantum cellular automaton. Well-formedness is an essential property for any quantum computing device since it enables us to define the probability of a configuration in an observation as the squared magnitude of its amplitude. We give an efficient algorithm which decides if a linear quantum cellular automaton is well-formed. The complexity of the algorithm is $O(n^2)$ in the algebraic model of computation if the input automaton has continuous neighborhood.
[ { "version": "v1", "created": "Wed, 23 Jun 1999 10:48:10 GMT" }, { "version": "v2", "created": "Fri, 27 Oct 2000 16:00:55 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Durr", "Christoph", "" ], [ "LeThanh", "Huong", "" ], [ "Santha", "Miklos", "" ] ]
cs/9907001
David Eppstein
David Eppstein
Setting Parameters by Example
13 pages, 3 figures. To be presented at 40th IEEE Symp. Foundations of Computer Science (FOCS '99)
SIAM J. Computing 32(3):643-653, 2003
10.1137/S0097539700370084
null
cs.DS cs.CG
null
We introduce a class of "inverse parametric optimization" problems, in which one is given both a parametric optimization problem and a desired optimal solution; the task is to determine parameter values that lead to the given solution. We describe algorithms for solving such problems for minimum spanning trees, shortest paths, and other "optimal subgraph" problems, and discuss applications in multicast routing, vehicle path planning, resource allocation, and board game programming.
[ { "version": "v1", "created": "Fri, 2 Jul 1999 21:09:55 GMT" } ]
"2010-01-21T00:00:00"
[ [ "Eppstein", "David", "" ] ]
cs/9907011
Ming-Yang Kao
Zhi-Zhong Chen and Ming-Yang Kao
Reducing Randomness via Irrational Numbers
null
SIAM Journal on Computing, 29(4):1247--1256, 2000
null
null
cs.DS cs.DM
null
We propose a general methodology for testing whether a given polynomial with integer coefficients is identically zero. The methodology evaluates the polynomial at efficiently computable approximations of suitable irrational points. In contrast to the classical technique of DeMillo, Lipton, Schwartz, and Zippel, this methodology can decrease the error probability by increasing the precision of the approximations instead of using more random bits. Consequently, randomized algorithms that use the classical technique can generally be improved using the new methodology. To demonstrate the methodology, we discuss two nontrivial applications. The first is to decide whether a graph has a perfect matching in parallel. Our new NC algorithm uses fewer random bits while doing less work than the previously best NC algorithm by Chari, Rohatgi, and Srinivasan. The second application is to test the equality of two multisets of integers. Our new algorithm improves upon the previously best algorithms by Blum and Kannan and can speed up their checking algorithm for sorting programs on a large range of inputs.
[ { "version": "v1", "created": "Wed, 7 Jul 1999 23:39:27 GMT" }, { "version": "v2", "created": "Wed, 15 Nov 2000 14:39:19 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Chen", "Zhi-Zhong", "" ], [ "Kao", "Ming-Yang", "" ] ]
cs/9907015
Ming-Yang Kao
Ming-Yang Kao and Jie Wang
Linear-Time Approximation Algorithms for Computing Numerical Summation with Provably Small Errors
null
SIAM Journal on Computing, 29(5):1568--1576, 2000
null
null
cs.DS cs.NA
null
Given a multiset $X=\{x_1,..., x_n\}$ of real numbers, the {\it floating-point set summation} problem asks for $S_n=x_1+...+x_n$. Let $E^*_n$ denote the minimum worst-case error over all possible orderings of evaluating $S_n$. We prove that if $X$ has both positive and negative numbers, it is NP-hard to compute $S_n$ with the worst-case error equal to $E^*_n$. We then give the first known polynomial-time approximation algorithm that has a provably small error for arbitrary $X$. Our algorithm incurs a worst-case error at most $2(\mix)E^*_n$.\footnote{All logarithms $\log$ in this paper are base 2.} After $X$ is sorted, it runs in O(n) time. For the case where $X$ is either all positive or all negative, we give another approximation algorithm with a worst-case error at most $\lceil\log\log n\rceil E^*_n$. Even for unsorted $X$, this algorithm runs in O(n) time. Previously, the best linear-time approximation algorithm had a worst-case error at most $\lceil\log n\rceil E^*_n$, while $E^*_n$ was known to be attainable in $O(n \log n)$ time using Huffman coding.
[ { "version": "v1", "created": "Fri, 9 Jul 1999 18:23:17 GMT" }, { "version": "v2", "created": "Tue, 14 Nov 2000 16:27:58 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kao", "Ming-Yang", "" ], [ "Wang", "Jie", "" ] ]
cs/9910013
Michelangelo Grigni
Zhi-Zhong Chen, Michelangelo Grigni, Christos Papadimitriou
Map Graphs
46 pages, LaTeX with 41 PS figures; see http://www.mathcs.emory.edu/~mic/mapgraphs/ for hi-res figures
null
null
null
cs.DM cs.DS
null
We consider a modified notion of planarity, in which two nations of a map are considered adjacent when they share any point of their boundaries (not necessarily an edge, as planarity requires). Such adjacencies define a map graph. We give an NP characterization for such graphs, and a cubic time recognition algorithm for a restricted version: given a graph, decide whether it is realized by adjacencies in a map without holes, in which at most four nations meet at any point.
[ { "version": "v1", "created": "Wed, 13 Oct 1999 21:41:19 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Chen", "Zhi-Zhong", "" ], [ "Grigni", "Michelangelo", "" ], [ "Papadimitriou", "Christos", "" ] ]
cs/9911003
David Eppstein
David Eppstein
Subgraph Isomorphism in Planar Graphs and Related Problems
27 pages, 6 figures. A preliminary version of this paper appeared at the 6th ACM-SIAM Symp. Discrete Algorithms, 1995
J. Graph Algorithms & Applications 3(3):1-27, 1999
null
null
cs.DS
null
We solve the subgraph isomorphism problem in planar graphs in linear time, for any pattern of constant size. Our results are based on a technique of partitioning the planar graph into pieces of small tree-width, and applying dynamic programming within each piece. The same methods can be used to solve other planar graph problems including connectivity, diameter, girth, induced subgraph isomorphism, and shortest paths.
[ { "version": "v1", "created": "Tue, 9 Nov 1999 18:58:58 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Eppstein", "David", "" ] ]
cs/9912001
Gabriel Istrate
Gabriel Istrate
The phase transition in random Horn satisfiability and its algorithmic implications
26 pages. Journal version of papers in AIM'98, SODA'99. Submitted to Random Structures and Algorithms
null
null
null
cs.DS cs.CC
null
Let c>0 be a constant, and $\Phi$ be a random Horn formula with n variables and $m=c\cdot 2^{n}$ clauses, chosen uniformly at random (with repetition) from the set of all nonempty Horn clauses in the given variables. By analyzing \PUR, a natural implementation of positive unit resolution, we show that $\lim_{n\goesto \infty} \PR ({$\Phi$ is satisfiable})= 1-F(e^{-c})$, where $F(x)=(1-x)(1-x^2)(1-x^4)(1-x^8)... $. Our method also yields as a byproduct an average-case analysis of this algorithm.
[ { "version": "v1", "created": "Wed, 1 Dec 1999 22:04:47 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Istrate", "Gabriel", "" ] ]
cs/9912014
David Eppstein
David Eppstein
Fast Hierarchical Clustering and Other Applications of Dynamic Closest Pairs
20 pages, 9 figures. A preliminary version of this paper appeared at the 9th ACM-SIAM Symp. on Discrete Algorithms, San Francisco, 1998, pp. 619-628. For source code and experimental results, see http://www.ics.uci.edu/~eppstein/projects/pairs/
J. Experimental Algorithmics 5(1):1-23, 2000
10.1145/351827.351829
null
cs.DS
null
We develop data structures for dynamic closest pair problems with arbitrary distance functions, that do not necessarily come from any geometric structure on the objects. Based on a technique previously used by the author for Euclidean closest pairs, we show how to insert and delete objects from an n-object set, maintaining the closest pair, in O(n log^2 n) time per update and O(n) space. With quadratic space, we can instead use a quadtree-like structure to achieve an optimal time bound, O(n) per update. We apply these data structures to hierarchical clustering, greedy matching, and TSP heuristics, and discuss other potential applications in machine learning, Groebner bases, and local improvement algorithms for partition and placement problems. Experiments show our new methods to be faster in practice than previously used heuristics.
[ { "version": "v1", "created": "Wed, 22 Dec 1999 01:42:51 GMT" } ]
"2010-01-21T00:00:00"
[ [ "Eppstein", "David", "" ] ]
cs/9912020
Vladimir Pestov
Markus Hegland and Vladimir Pestov
Additive models in high dimensions
LaTeX 2e document, 21 pages, 5 figures
Proc. of 12th Computational Techniques and Applications Conference, CTAC-2004 (Rob May and A.J. Roberts, eds.), ANZIAM J. 46 (2005), C1205-C1221.
null
null
cs.DS
null
We discuss some aspects of approximating functions on high-dimensional data sets with additive functions or ANOVA decompositions, that is, sums of functions depending on fewer variables each. It is seen that under appropriate smoothness conditions, the errors of the ANOVA decompositions are of order $O(n^{m/2})$ for approximations using sums of functions of up to $m$ variables under some mild restrictions on the (possibly dependent) predictor variables. Several simulated examples illustrate this behaviour.
[ { "version": "v1", "created": "Thu, 30 Dec 1999 07:50:11 GMT" }, { "version": "v2", "created": "Fri, 24 May 2002 09:40:47 GMT" } ]
"2009-11-17T00:00:00"
[ [ "Hegland", "Markus", "" ], [ "Pestov", "Vladimir", "" ] ]
math-ph/0701043
Markus Jalsenius
Markus Jalsenius
Strong Spatial Mixing and Rapid Mixing with Five Colours for the Kagome Lattice
34 pages, 11 figures
null
null
null
math-ph cs.DM cs.DS math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider proper 5-colourings of the kagome lattice. Proper q-colourings correspond to configurations in the zero-temperature q-state anti-ferromagnetic Potts model. Salas and Sokal have given a computer assisted proof of strong spatial mixing on the kagome lattice for q>=6 under any temperature, including zero temperature. It is believed that there is strong spatial mixing for q>=4. Here we give a computer assisted proof of strong spatial mixing for q=5 and zero temperature. It is commonly known that strong spatial mixing implies that there is a unique infinite-volume Gibbs measure and that the Glauber dynamics is rapidly mixing. We give a proof of rapid mixing of the Glauber dynamics on any finite subset of the vertices of the kagome lattice, provided that the boundary is free (not coloured). The Glauber dynamics is not necessarily irreducible if the boundary is chosen arbitrarily for q=5 colours. The Glauber dynamics can be used to uniformly sample proper 5-colourings. Thus, a consequence of rapidly mixing Glauber dynamics is that there is fully polynomial randomised approximation scheme for counting the number of proper 5-colourings.
[ { "version": "v1", "created": "Sun, 14 Jan 2007 21:06:14 GMT" }, { "version": "v2", "created": "Tue, 31 Mar 2009 11:46:00 GMT" } ]
"2010-03-23T00:00:00"
[ [ "Jalsenius", "Markus", "" ] ]
math/0005235
James Allen Fill
James Allen Fill (Johns Hopkins Univ.), Svante Janson (Uppsala Univ.)
Smoothness and decay properties of the limiting Quicksort density function
11 pages. Refereed article, to apppear in a book edited by D. Gardy and A. Mokkadem and published in 2000 by Birkhauser
null
null
601, Department of Mathematical Sciences, The Johns Hopkins University
math.PR cs.DS
null
Using Fourier analysis, we prove that the limiting distribution of the standardized random number of comparisons used by Quicksort to sort an array of n numbers has an everywhere positive and infinitely differentiable density f, and that each derivative f^{(k)} enjoys superpolynomial decay at plus and minus infinity. In particular, each f^{(k)} is bounded. Our method is sufficiently computational to prove, for example, that f is bounded by 16.
[ { "version": "v1", "created": "Tue, 23 May 2000 19:24:59 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fill", "James Allen", "", "Johns Hopkins Univ." ], [ "Janson", "Svante", "", "Uppsala Univ." ] ]
math/0005236
James Allen Fill
James Allen Fill (Johns Hopkins Univ.), Svante Janson (Uppsala Univ.)
A characterization of the set of fixed points of the Quicksort transformation
9 pages. See also http://www.mts.jhu.edu/~fill/ and http://www.math.uu.se/~svante/papers . Submitted for publication in May,2000
null
null
606, Department of Mathematical Sciences, The Johns Hopkins University
math.PR cs.DS
null
The limiting distribution \mu of the normalized number of key comparisons required by the Quicksort sorting algorithm is known to be the unique fixed point of a certain distributional transformation T -- unique, that is, subject to the constraints of zero mean and finite variance. We show that a distribution is a fixed point of T if and only if it is the convolution of \mu with a Cauchy distribution of arbitrary center and scale. In particular, therefore, \mu is the unique fixed point of T having zero mean.
[ { "version": "v1", "created": "Tue, 23 May 2000 20:02:57 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Fill", "James Allen", "", "Johns Hopkins Univ." ], [ "Janson", "Svante", "", "Uppsala Univ." ] ]
math/0005237
James Allen Fill
Luc Devroye (McGill Univ.), James Allen Fill (Johns Hopkins Univ.), Ralph Neininger (Univ. Freiburg)
Perfect simulation from the Quicksort limit distribution
7 pages. See also http://www.mts.jhu.edu/~fill/, http://www-cgrl.cs.mcgill.ca/~luc/, and http://www.stochastik.uni-freiburg.de/homepages/neininger/ . Submitted for publication in May, 2000
null
null
603, Department of Mathematical Sciences, The Johns Hopkins University
math.PR cs.DS
null
The weak limit of the normalized number of comparisons needed by the Quicksort algorithm to sort n randomly permuted items is known to be determined implicitly by a distributional fixed-point equation. We give an algorithm for perfect random variate generation from this distribution.
[ { "version": "v1", "created": "Tue, 23 May 2000 20:21:34 GMT" }, { "version": "v2", "created": "Tue, 23 May 2000 23:40:49 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Devroye", "Luc", "", "McGill Univ." ], [ "Fill", "James Allen", "", "Johns Hopkins Univ." ], [ "Neininger", "Ralph", "", "Univ. Freiburg" ] ]
math/0012036
Howard Kleiman
Howard Kleiman (Prof. Emer., Queensborough Community Coll. (CUNY))
Hamilton Circuits in Graphs and Directed Graphs
Text in Word 97, Equations in MathType, sent in a PDF file using Adobe Acrobat Writer (4.05), no figures
null
null
null
math.CO cs.DS
null
We give polynomial-time algorithms for obtaining hamilton circuits in random graphs, G, and random directed graphs, D. If n is finite, we assume that G or D contains a hamilton circuit. If G is an arbitrary graph containing a hamilton circuit, we conjecture that Algorithm G always obtains a hamilton circuit in polynomial time.
[ { "version": "v1", "created": "Wed, 6 Dec 2000 05:59:29 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kleiman", "Howard", "", "Prof. Emer., Queensborough Community Coll." ] ]
math/0111309
Howard Kleiman
Howard Kleiman
The Floyd-Warshall Algorithm, the AP and the TSP
Text in Word 2000, math in MathType 4.0, sent in a PDF file written in Acrobat 5.0, 23 pages
null
null
null
math.CO cs.DS
null
We use admissible permutations and a variant of the Floyd-Warshall algorithm to obtain an optimal solution to the Assignment Problem. Using another variant of the F-W algorithm, we obtain an approximate solution to the Traveling Salesman Problem. We also give a sufficient condition for the approximate solution to be an optimal solution.
[ { "version": "v1", "created": "Thu, 29 Nov 2001 23:17:54 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kleiman", "Howard", "" ] ]
math/0112052
Howard Kleiman
Howard Kleiman
The Floyd-Warshall Algorithm, the AP and the TSP, Part II
Text in Word 2000, math in Math Type 4.0, sent in a PDF file written in Acrobat 5.0, 63 pages
null
null
null
math.CO cs.DS
null
In math.CO/0111309, we used admissible permutations and a variant of the Floyd-Warshall Algorithm to obtain an optimal solution to the Assignment Problem and an approximate solution to the Traveling Salesman Problem. Here we give a large, detailed illustration of how the algorithms are applied.
[ { "version": "v1", "created": "Thu, 6 Dec 2001 06:52:33 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kleiman", "Howard", "" ] ]
math/0207121
Tyll Krueger
Igor Bjelakovic, Tyll Krueger, Rainer Siegmund-Schultze, Arleta Szkola
The Shannon-McMillan Theorem for Ergodic Quantum Lattice Systems
21 pages, extended version concerning subalgebras
null
null
null
math.DS cs.DS cs.IT math-ph math.IT math.MP math.OA quant-ph
null
We formulate and prove a quantum Shannon-McMillan theorem. The theorem demonstrates the significance of the von Neumann entropy for translation invariant ergodic quantum spin systems on n-dimensional lattices: the entropy gives the logarithm of the essential number of eigenvectors of the system on large boxes. The one-dimensional case covers quantum information sources and is basic for coding theorems.
[ { "version": "v1", "created": "Mon, 15 Jul 2002 14:50:22 GMT" }, { "version": "v2", "created": "Thu, 25 Jul 2002 17:02:27 GMT" }, { "version": "v3", "created": "Wed, 20 Nov 2002 15:25:56 GMT" } ]
"2007-07-16T00:00:00"
[ [ "Bjelakovic", "Igor", "" ], [ "Krueger", "Tyll", "" ], [ "Siegmund-Schultze", "Rainer", "" ], [ "Szkola", "Arleta", "" ] ]
math/0209316
Thomas Zaslavsky
Konstantin Rybnikov (University of Massachusetts at Lowell and MSRI), Thomas Zaslavsky (Binghamton University)
Cycle and Circle Tests of Balance in Gain Graphs: Forbidden Minors and Their Groups
19 pages, 3 figures. Format: Latex2e. Changes: minor. To appear in Journal of Graph Theory
J. Graph Theory, 51 (2006), no. 1, 1--21.
null
null
math.CO cs.DM cs.DS
null
We examine two criteria for balance of a gain graph, one based on binary cycles and one on circles. The graphs for which each criterion is valid depend on the set of allowed gain groups. The binary cycle test is invalid, except for forests, if any possible gain group has an element of odd order. Assuming all groups are allowed, or all abelian groups, or merely the cyclic group of order 3, we characterize, both constructively and by forbidden minors, the graphs for which the circle test is valid. It turns out that these three classes of groups have the same set of forbidden minors. The exact reason for the importance of the ternary cyclic group is not clear.
[ { "version": "v1", "created": "Tue, 24 Sep 2002 04:24:53 GMT" }, { "version": "v2", "created": "Tue, 23 Sep 2003 06:35:59 GMT" }, { "version": "v3", "created": "Thu, 25 Nov 2004 00:21:18 GMT" } ]
"2010-01-24T00:00:00"
[ [ "Rybnikov", "Konstantin", "", "University of Massachusetts at Lowell and MSRI" ], [ "Zaslavsky", "Thomas", "", "Binghamton University" ] ]
math/0210052
Konstantin Rybnikov
Konstantin Rybnikov, Thomas Zaslavsky
Criteria for Balance in Abelian Gain Graphs, with Applications to Piecewise-Linear Geometry
Changes(28 Dec. 2004): revised title and abstract; shortened, mainly by omitting inessentials; minor errors fixed. Changes (16 Jan. 2005): ADDED--Appendix with detailes on some proofs and another counterexample with picture, a few references. Minor typo and notation fixes. To appear in Discrete & Comput. Geometry (without Appendix and extra references)
Discrete and Computational Geometry, 34 (2005), no. 2, 251-268.
null
null
math.CO cs.CG cs.DM cs.DS math.AT
null
A gain graph is a triple (G,h,H), where G is a connected graph with an arbitrary, but fixed, orientation of edges, H is a group, and h is a homomorphism from the free group on the edges of G to H. A gain graph is called balanced if the h-image of each closed walk on G is the identity. Consider a gain graph with abelian gain group having no odd torsion. If there is a basis of the graph's binary cycle space each of whose members can be lifted to a closed walk whose gain is the identity, then the gain graph is balanced, provided that the graph is finite or the group has no nontrivial infinitely 2-divisible elements. We apply this theorem to deduce a result on the projective geometry of piecewise-linear realizations of cell-decompositions of manifolds.
[ { "version": "v1", "created": "Thu, 3 Oct 2002 16:33:59 GMT" }, { "version": "v2", "created": "Mon, 22 Sep 2003 22:30:04 GMT" }, { "version": "v3", "created": "Wed, 24 Sep 2003 00:35:21 GMT" }, { "version": "v4", "created": "Tue, 28 Dec 2004 21:56:59 GMT" }, { "version": "v5", "created": "Mon, 17 Jan 2005 04:46:14 GMT" } ]
"2010-01-24T00:00:00"
[ [ "Rybnikov", "Konstantin", "" ], [ "Zaslavsky", "Thomas", "" ] ]
math/0211317
Kamil Kulesza
Kamil Kulesza, Zbigniew Kotulski
On graph coloring check-digit method
7 pages, paper sumitted to Applied Mathematics Letters (Elsevier)
null
null
null
math.CO cs.CR cs.DM cs.DS
null
We show a method how to convert any graph into the binary number and vice versa. We derive upper bound for maximum number of graphs, that, have fixed number of vertices and can be colored with n colors (n is any given number). Proof for the result is outlined. Next, graph coloring based check-digit scheme is proposed. We use quantitative result derived, to show, that feasibility of the proposed scheme increases with size of the number which digits are checked, and overall probability of digits errors.
[ { "version": "v1", "created": "Wed, 20 Nov 2002 12:41:13 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kulesza", "Kamil", "" ], [ "Kotulski", "Zbigniew", "" ] ]
math/0302315
Ernie Croot
Ernie Croot
Memory Efficient Arithmetic
Difference between this version and last: Better notation, light corrections, and more explanations
null
null
null
math.NT cs.DS
null
In this paper we give an algorithm for computing the mth base-b digit (m=1 is the least significant digit) of an integer n (actually, it finds sharp approximations to n/b^m mod 1), where n is defined as the last number in a sequence of integers s1,s2,...,sL=n, where s1=0, s2=1, and each successive si is either the sum, product, or difference of two previous sj's in the sequence. In many cases, the algorithm will find this mth digit using far less memory than it takes to write down all the base-b digits of n, while the number of bit operations will grow only slighly worse than linear in the number of digits. One consequence of this result is that the mth base-10 digit of 2^t can be found using O(t^{2/3} log^C t) bits of storage (for some C>0), and O(t log^C t) bit operations. The algorithm is also highly parallelizable, and an M-fold reduction in running time can be achieved using M processors, although the memory required will then grow by a factor of M.
[ { "version": "v1", "created": "Tue, 25 Feb 2003 19:42:25 GMT" }, { "version": "v2", "created": "Tue, 25 Feb 2003 22:52:29 GMT" }, { "version": "v3", "created": "Thu, 20 Mar 2003 19:27:15 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Croot", "Ernie", "" ] ]
math/0309285
Jeffrey D. Scargle
Brad Jackson, Jeffrey D. Scargle, David Barnes, Sundararajan Arabhi, Alina Alt, Peter Gioumousis, Elyus Gwin, Paungkaew Sangtrakulcharoen, Linda Tan, and Tun Tao Tsai
An Algorithm for Optimal Partitioning of Data on an Interval
3 pages, 1 figure, submitted to IEEE Signal Processing Letters, revised version with added references
null
10.1109/LSP.2001.838216
null
math.NA astro-ph cs.CE cs.DS cs.IT math.CO math.IT
null
Many signal processing problems can be solved by maximizing the fitness of a segmented model over all possible partitions of the data interval. This letter describes a simple but powerful algorithm that searches the exponentially large space of partitions of $N$ data points in time $O(N^2)$. The algorithm is guaranteed to find the exact global optimum, automatically determines the model order (the number of segments), has a convenient real-time mode, can be extended to higher dimensional data spaces, and solves a surprising variety of problems in signal detection and characterization, density estimation, cluster analysis and classification.
[ { "version": "v1", "created": "Wed, 17 Sep 2003 18:27:00 GMT" }, { "version": "v2", "created": "Fri, 9 Apr 2004 22:37:35 GMT" } ]
"2016-11-17T00:00:00"
[ [ "Jackson", "Brad", "" ], [ "Scargle", "Jeffrey D.", "" ], [ "Barnes", "David", "" ], [ "Arabhi", "Sundararajan", "" ], [ "Alt", "Alina", "" ], [ "Gioumousis", "Peter", "" ], [ "Gwin", "Elyus", "" ], [ "Sangtrakulcharoen", "Paungkaew", "" ], [ "Tan", "Linda", "" ], [ "Tsai", "Tun Tao", "" ] ]
math/0406094
Pr Philippe Chassaing
Philippe Chassaing, Regine Marchand
Merging costs for the additive Marcus-Lushnikov process, and Union-Find algorithms
28 pages, 1 figure
null
null
null
math.PR cs.DS math.CO
null
Starting with a monodisperse configuration with $n$ size-1 particles, an additive Marcus-Lushnikov process evolves until it reaches its final state (a unique particle with mass $n$). At each of the $n-1$ steps of its evolution, a merging cost is incurred, that depends on the sizes of the two particles involved, and on an independent random factor. This paper deals with the asymptotic behaviour of the cumulated costs up to the $k$th clustering, under various regimes for $(n,k)$, with applications to the study of Union--Find algorithms.
[ { "version": "v1", "created": "Sat, 5 Jun 2004 19:20:16 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Chassaing", "Philippe", "" ], [ "Marchand", "Regine", "" ] ]
math/0406353
Manor Mendel
Yair Bartal, Nathan Linial, Manor Mendel, Assaf Naor
On metric Ramsey-type phenomena
67 pages, published version
Ann. of Math. (2) 162 (2005), no. 2, 643--709
10.4007/annals.2005.162.643
null
math.MG cs.DS
null
The main question studied in this article may be viewed as a nonlinear analogue of Dvoretzky's theorem in Banach space theory or as part of Ramsey theory in combinatorics. Given a finite metric space on n points, we seek its subspace of largest cardinality which can be embedded with a given distortion in Hilbert space. We provide nearly tight upper and lower bounds on the cardinality of this subspace in terms of n and the desired distortion. Our main theorem states that for any epsilon>0, every n point metric space contains a subset of size at least n^{1-\epsilon} which is embeddable in Hilbert space with O(\frac{\log(1/\epsilon)}{\epsilon}) distortion. The bound on the distortion is tight up to the log(1/\epsilon) factor. We further include a comprehensive study of various other aspects of this problem.
[ { "version": "v1", "created": "Thu, 17 Jun 2004 20:01:40 GMT" }, { "version": "v2", "created": "Thu, 21 Jun 2007 02:52:34 GMT" } ]
"2012-11-15T00:00:00"
[ [ "Bartal", "Yair", "" ], [ "Linial", "Nathan", "" ], [ "Mendel", "Manor", "" ], [ "Naor", "Assaf", "" ] ]
math/0410593
Henrik B\"a\"arnhielm
Henrik B\"a\"arnhielm
The Schreier-Sims algorithm for matrix groups
The author's MSc thesis. Uses AMS-LaTeX and algorithm2e.sty. For the associated source code, see http://matrixss.sourceforge.net/
null
null
null
math.GR cs.DS
null
This is the report of a project with the aim to make a new implementation of the Schreier-Sims algorithm in GAP, specialized for matrix groups. The standard Schreier-Sims algorithm is described in some detail, followed by descriptions of the probabilistic Schreier-Sims algorithm and the Schreier-Todd-Coxeter-Sims algorithm. Then we discuss our implementation and some optimisations, and finally we report on the performance of our implementation, as compared to the existing implementation in GAP, and we give benchmark results. The conclusion is that our implementation in some cases is faster and consumes much less memory.
[ { "version": "v1", "created": "Thu, 28 Oct 2004 01:28:52 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Bäärnhielm", "Henrik", "" ] ]
math/0411128
Cyril Banderier
Cyril Banderier (LIPN), Sylviane Schwer (LIPN)
Why Delannoy numbers?
Presented to the conference "Lattice Paths Combinatorics and Discrete Distributions" (Athens, June 5-7, 2002) and to appear in the Journal of Statistical Planning and Inferences
Journal of Statistical Planning and Inference 135, 1 (11/2005) 40-54
10.1016/j.jspi.2005.02.004
null
math.CO cs.DS cs.GT math.HO math.PR math.ST q-bio.GN stat.TH
null
This article is not a research paper, but a little note on the history of combinatorics: We present here a tentative short biography of Henri Delannoy, and a survey of his most notable works. This answers to the question raised in the title, as these works are related to lattice paths enumeration, to the so-called Delannoy numbers, and were the first general way to solve Ballot-like problems. These numbers appear in probabilistic game theory, alignments of DNA sequences, tiling problems, temporal representation models, analysis of algorithms and combinatorial structures.
[ { "version": "v1", "created": "Sat, 6 Nov 2004 07:40:07 GMT" } ]
"2014-04-22T00:00:00"
[ [ "Banderier", "Cyril", "", "LIPN" ], [ "Schwer", "Sylviane", "", "LIPN" ] ]
math/0411138
Cyril Banderier
Cyril Banderier (LIPN), Jean-Marie Le Bars (LIPN, GREYC), Vlady Ravelomanana (LIPN)
Generating Functions For Kernels of Digraphs (Enumeration & Asymptotics for Nim Games)
Presented (as a poster) to the conference Formal Power Series and Algebraic Combinatorics (Vancouver, 2004), electronic proceedings
Proceedings of FPSAC'04 (2004) 91-105
null
null
math.CO cs.DM cs.DS cs.GT math.PR
null
In this article, we study directed graphs (digraphs) with a coloring constraint due to Von Neumann and related to Nim-type games. This is equivalent to the notion of kernels of digraphs, which appears in numerous fields of research such as game theory, complexity theory, artificial intelligence (default logic, argumentation in multi-agent systems), 0-1 laws in monadic second order logic, combinatorics (perfect graphs)... Kernels of digraphs lead to numerous difficult questions (in the sense of NP-completeness, #P-completeness). However, we show here that it is possible to use a generating function approach to get new informations: we use technique of symbolic and analytic combinatorics (generating functions and their singularities) in order to get exact and asymptotic results, e.g. for the existence of a kernel in a circuit or in a unicircuit digraph. This is a first step toward a generatingfunctionology treatment of kernels, while using, e.g., an approach "a la Wright". Our method could be applied to more general "local coloring constraints" in decomposable combinatorial structures.
[ { "version": "v1", "created": "Sat, 6 Nov 2004 20:33:39 GMT" } ]
"2012-02-06T00:00:00"
[ [ "Banderier", "Cyril", "", "LIPN" ], [ "Bars", "Jean-Marie Le", "", "LIPN, GREYC" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
math/0411250
Cyril Banderier
Cyril Banderier (LIPN, ALGO UR-R), Philippe Flajolet (ALGO UR-R), Daniele Gardy (PRISM), Mireille Bousquet-Melou (LABRI), Alain Denise (LRI), Dominique Gouyou-Beauchamps (LRI)
Generating functions for generating trees
This article corresponds, up to minor typo corrections, to the article submitted to Discrete Mathematics (Elsevier) in Nov. 1999, and published in its vol. 246(1-3), March 2002, pp. 29-55
Discrete Mathematics 246 (1-3) (2002) 29-55
10.1016/S0012-365X(01)00250-3
null
math.CO cs.DM cs.DS
null
Certain families of combinatorial objects admit recursive descriptions in terms of generating trees: each node of the tree corresponds to an object, and the branch leading to the node encodes the choices made in the construction of the object. Generating trees lead to a fast computation of enumeration sequences (sometimes, to explicit formulae as well) and provide efficient random generation algorithms. We investigate the links between the structural properties of the rewriting rules defining such trees and the rationality, algebraicity, or transcendence of the corresponding generating function.
[ { "version": "v1", "created": "Thu, 11 Nov 2004 09:19:47 GMT" } ]
"2014-04-22T00:00:00"
[ [ "Banderier", "Cyril", "", "LIPN, ALGO UR-R" ], [ "Flajolet", "Philippe", "", "ALGO UR-R" ], [ "Gardy", "Daniele", "", "PRISM" ], [ "Bousquet-Melou", "Mireille", "", "LABRI" ], [ "Denise", "Alain", "", "LRI" ], [ "Gouyou-Beauchamps", "Dominique", "", "LRI" ] ]
math/0502232
Svante Janson
Svante Janson
Individual displacements in hashing with coalesced chains
17 pages
null
null
U.U.D.M. 2005:4
math.PR cs.DS
null
We study the asymptotic distribution of the displacements in hashing with coalesced chains, for both late-insertion and early-insertion. Asymptotic formulas for means and variances follow. The method uses Poissonization and some stochastic calculus.
[ { "version": "v1", "created": "Fri, 11 Feb 2005 09:28:04 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Janson", "Svante", "" ] ]
math/0508183
Pavel Chebotarev
P. Yu. Chebotarev and E. V. Shamis
On a Duality between Metrics and $\Sigma$-Proximities
5 pages
Automation and Remote Control 59 (1998) 608--612
null
null
math.MG cs.DS math.CO
null
: In studies of discrete structures, functions are frequently used that express proximity, but are not metrics. We consider a class of such functions that is characterized by a normalization condition and an inequality that plays the same role as the triangle inequality does for metrics. We show that the introduced functions, named $\Sigma$-proximities, are in a definite sense dual to metrics: there exists a natural one-to-one correspondence between metrics and $\Sigma$-proximities defined on the same finite set; in contrast to metrics, $\Sigma$-proximities measure {\it comparative} proximity; the closer the objects, the greater the $\Sigma$-proximity; diagonal entries of the $\Sigma$-proximity matrix characterize the ``centrality'' of elements. The results are extended to arbitrary infinite sets.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 14:25:41 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Chebotarev", "P. Yu.", "" ], [ "Shamis", "E. V.", "" ] ]
math/0508199
Pavel Chebotarev
Pavel Chebotarev
Extending Utility Representations of Partial Orders
15 pages
In: Constructing and Applying Objective Functions. Lecture Notes in Economics and Math. Systems, Vol.510, Springer, 2002, P. 63-74
10.1007/978-3-642-56038-5_4
null
math.OC cs.DS math.FA
null
The problem is considered as to whether a monotone function defined on a subset P of a Euclidean space can be strictly monotonically extended to the whole space. It is proved that this is the case if and only if the function is {\em separably increasing}. Explicit formulas are given for a class of extensions which involves an arbitrary bounded increasing function. Similar results are obtained for monotone functions that represent strict partial orders on arbitrary abstract sets X. The special case where P is a Pareto subset is considered.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 12:51:11 GMT" } ]
"2022-10-21T00:00:00"
[ [ "Chebotarev", "Pavel", "" ] ]
math/0508212
Howard Kleiman
Howard Kleiman
The Symmetric Traveling Salesman Problem
A new theorem has been added
null
null
null
math.CO cs.DS
null
Let M be an nXn symetric matrix, n, even, T, an upper bound for T_OPT, an optimal tour, sigma_T, the smaller-valued perfect matching obtained from alternate edges of T expressed as a product of 2-cycles. Applying the modified Floyd-Warshall algorithm to (sigma_T)^-1M^-, we construct acceptable and 2-circuit cycles some sets of which may yield circuits that can be patched into tours. We obtain necessary and sufficient conditions for a set, S, of cycles to yield circuits that may be patched into a tour.Assume that the following (Condition A)is valid: If (sigma_T)s = T*, |T*|<T, then all cycles of s have values less than |T| - |sigma_T|.Let SFWOPT),S(OPT)be the respective sets of cycles yielding T_FWOPT, T_OPT. Given Condition(A), using F-W, we can always obtain S(FWOPT). Using Condition A but not F-W, S_OPT is always obtainable from a subset of the cycles obtained.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 22:08:27 GMT" }, { "version": "v2", "created": "Thu, 25 Aug 2005 16:51:16 GMT" }, { "version": "v3", "created": "Sat, 27 Aug 2005 19:53:03 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Kleiman", "Howard", "" ] ]
math/0509575
Elchanan Mossel
Constantinos Daskalakis, Elchanan Mossel, Sebastien Roch
Evolutionary Trees and the Ising Model on the Bethe Lattice: a Proof of Steel's Conjecture
Second major revision. Updated proofs and statements
null
null
null
math.PR cs.CE cs.DS math.CA math.CO math.ST q-bio.PE stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A major task of evolutionary biology is the reconstruction of phylogenetic trees from molecular data. The evolutionary model is given by a Markov chain on a tree. Given samples from the leaves of the Markov chain, the goal is to reconstruct the leaf-labelled tree. It is well known that in order to reconstruct a tree on $n$ leaves, sample sequences of length $\Omega(\log n)$ are needed. It was conjectured by M. Steel that for the CFN/Ising evolutionary model, if the mutation probability on all edges of the tree is less than $p^{\ast} = (\sqrt{2}-1)/2^{3/2}$, then the tree can be recovered from sequences of length $O(\log n)$. The value $p^{\ast}$ is given by the transition point for the extremality of the free Gibbs measure for the Ising model on the binary tree. Steel's conjecture was proven by the second author in the special case where the tree is "balanced." The second author also proved that if all edges have mutation probability larger than $p^{\ast}$ then the length needed is $n^{\Omega(1)}$. Here we show that Steel's conjecture holds true for general trees by giving a reconstruction algorithm that recovers the tree from $O(\log n)$-length sequences when the mutation probabilities are discretized and less than $p^\ast$. Our proof and results demonstrate that extremality of the free Gibbs measure on the infinite binary tree, which has been studied before in probability, statistical physics and computer science, determines how distinguishable are Gibbs measures on finite binary trees.
[ { "version": "v1", "created": "Fri, 23 Sep 2005 20:22:09 GMT" }, { "version": "v2", "created": "Wed, 6 Feb 2008 00:07:32 GMT" }, { "version": "v3", "created": "Tue, 28 Jul 2009 03:26:35 GMT" } ]
"2011-09-30T00:00:00"
[ [ "Daskalakis", "Constantinos", "" ], [ "Mossel", "Elchanan", "" ], [ "Roch", "Sebastien", "" ] ]
math/0510573
Hossein Zare
Shmuel Friedland, Mostafa Kaveh, Amir Niknejad, Hossein Zare
Fast Monte-Carlo Low Rank Approximations for Matrices
null
null
null
null
math.NA cs.DS
null
In many applications, it is of interest to approximate data, given by mxn matrix A, by a matrix B of at most rank k, which is much smaller than m and n. The best approximation is given by singular value decomposition, which is too time consuming for very large m and n. We present here a Monte Carlo algorithm for iteratively computing a k-rank approximation to the data consisting of mxn matrix A. Each iteration involves the reading of O(k) of columns or rows of A. The complexity of our algorithm is O(kmn). Our algorithm, distinguished from other known algorithms, guarantees that each iteration is a better k-rank approximation than the previous iteration. We believe that this algorithm will have many applications in data mining, data storage and data analysis.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 18:41:46 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Friedland", "Shmuel", "" ], [ "Kaveh", "Mostafa", "" ], [ "Niknejad", "Amir", "" ], [ "Zare", "Hossein", "" ] ]
math/0602059
Pavel Chebotarev
Rafig Agaev and Pavel Chebotarev
The Matrix of Maximum Out Forests of a Digraph and Its Applications
27 pages, 3 figures
Automation and Remote Control 61 (2000) 1424--1450
null
null
math.CO cs.DS math.AG
null
We study the maximum out forests of a (weighted) digraph and the matrix of maximum out forests. A maximum out forest of a digraph G is a spanning subgraph of G that consists of disjoint diverging trees and has the maximum possible number of arcs. If a digraph contains any out arborescences, then maximum out forests coincide with them. We provide a new proof to the Markov chain tree theorem saying that the matrix of Ces`aro limiting probabilities of an arbitrary stationary finite Markov chain coincides with the normalized matrix of maximum out forests of the weighted digraph that corresponds to the Markov chain. We discuss the applications of the matrix of maximum out forests and its transposition, the matrix of limiting accessibilities of a digraph, to the problems of preference aggregation, measuring the vertex proximity, and uncovering the structure of a digraph.
[ { "version": "v1", "created": "Fri, 3 Feb 2006 13:28:50 GMT" }, { "version": "v2", "created": "Sat, 4 Feb 2006 10:44:31 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Agaev", "Rafig", "" ], [ "Chebotarev", "Pavel", "" ] ]
math/0602073
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
On Proximity Measures for Graph Vertices
17 pages, 3 figures
Automation and Remote Control 59 (1998), No. 10, Part 2 1443-1459. Erratum: 60 (1999), No. 2, Part 2 297
null
null
math.CO cs.DS cs.NI math.MG
null
We study the properties of several proximity measures for the vertices of weighted multigraphs and multidigraphs. Unlike the classical distance for the vertices of connected graphs, these proximity measures are applicable to weighted structures and take into account not only the shortest, but also all other connections, which is desirable in many applications. To apply these proximity measures to unweighted structures, every edge should be assigned the same weight which determines the proportion of taking account of two routes, from which one is one edge longer than the other. Among the proximity measures we consider path accessibility, route accessibility, relative forest accessibility along with its components, accessibility via dense forests, and connection reliability. A number of characteristic conditions is introduced and employed to characterize the proximity measures. A topological interpretation is obtained for the Moore-Penrose generalized inverse of the Laplacian matrix of a weighted multigraph.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 15:55:52 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
math/0603207
Olga Holtz
James Demmel, Ioana Dumitriu, Olga Holtz, Robert Kleinberg
Fast matrix multiplication is stable
19 pages; final version, expanded and updated to reflect referees' remarks; to appear in Numerische Mathematik
Numer. Math. 106 (2007), no. 2, 199-224
10.1007/s00211-007-0061-6
null
math.NA cs.CC cs.DS math.GR
null
We perform forward error analysis for a large class of recursive matrix multiplication algorithms in the spirit of [D. Bini and G. Lotti, Stability of fast algorithms for matrix multiplication, Numer. Math. 36 (1980), 63--72]. As a consequence of our analysis, we show that the exponent of matrix multiplication (the optimal running time) can be achieved by numerically stable algorithms. We also show that new group-theoretic algorithms proposed in [H. Cohn, and C. Umans, A group-theoretic approach to fast matrix multiplication, FOCS 2003, 438--449] and [H. Cohn, R. Kleinberg, B. Szegedy and C. Umans, Group-theoretic algorithms for matrix multiplication, FOCS 2005, 379--388] are all included in the class of algorithms to which our analysis applies, and are therefore numerically stable. We perform detailed error analysis for three specific fast group-theoretic algorithms.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 04:34:36 GMT" }, { "version": "v2", "created": "Thu, 26 Oct 2006 19:21:20 GMT" }, { "version": "v3", "created": "Thu, 7 Dec 2006 18:15:41 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Demmel", "James", "" ], [ "Dumitriu", "Ioana", "" ], [ "Holtz", "Olga", "" ], [ "Kleinberg", "Robert", "" ] ]
math/0604331
Jean-Francois Marckert
Ali Akhavi (LIAFA), Jean-Fran\c{c}ois Marckert (LaBRI), Alain Rouault (LM-Versailles)
On the reduction of a random basis
null
null
null
null
math.PR cs.DS
null
For $g < n$, let $b\_1,...,b\_{n-g}$ be $n - g$ independent vectors in $\mathbb{R}^n$ with a common distribution invariant by rotation. Considering these vectors as a basis for the Euclidean lattice they generate, the aim of this paper is to provide asymptotic results when $n\to +\infty$ concerning the property that such a random basis is reduced in the sense of {\sc Lenstra, Lenstra & Lov\'asz}. The proof passes by the study of the process $(r\_{g+1}^{(n)},r\_{g+2}^{(n)},...,r\_{n-1}^{(n)})$ where $r\_j^{(n)}$ is the ratio of lengths of two consecutive vectors $b^*\_{n-j+1}$ and $b^*\_{n-j}$ built from $(b\_1,...,b\_{n-g})$ by the Gram--Schmidt orthogonalization procedure, which we believe to be interesting in its own. We show that, as $n\to+\infty$, the process $(r\_j^{(n)}-1)\_j$ tends in distribution in some sense to an explicit process $({\mathcal R}\_j -1)\_j$; some properties of this latter are provided.
[ { "version": "v1", "created": "Fri, 14 Apr 2006 07:57:50 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Akhavi", "Ali", "", "LIAFA" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Rouault", "Alain", "", "LM-Versailles" ] ]
math/0604367
Sebastian Roch
Shankar Bhamidi, Ram Rajagopal, Sebastien Roch
Network Delay Inference from Additive Metrics
null
null
null
null
math.PR cs.DS cs.NI math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate the use of computational phylogenetic techniques to solve a central problem in inferential network monitoring. More precisely, we design a novel algorithm for multicast-based delay inference, i.e. the problem of reconstructing the topology and delay characteristics of a network from end-to-end delay measurements on network paths. Our inference algorithm is based on additive metric techniques widely used in phylogenetics. It runs in polynomial time and requires a sample of size only $\poly(\log n)$.
[ { "version": "v1", "created": "Mon, 17 Apr 2006 11:12:31 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 01:20:14 GMT" } ]
"2011-09-07T00:00:00"
[ [ "Bhamidi", "Shankar", "" ], [ "Rajagopal", "Ram", "" ], [ "Roch", "Sebastien", "" ] ]
math/0605472
Nicolas Pouyanne
Nicolas Pouyanne (LM-Versailles)
An algebraic approach to Polya processes
null
Annales de l'IHP - Probabilit\'es et Statistiques (2008) Vol. 44, No. 2, 293-323
10.1214/07-AIHP130
null
math.CO cs.DM cs.DS math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
P\'olya processes are natural generalization of P\'olya-Eggenberger urn models. This article presents a new approach of their asymptotic behaviour {\it via} moments, based on the spectral decomposition of a suitable finite difference operator on polynomial functions. Especially, it provides new results for {\it large} processes (a P\'olya process is called {\it small} when 1 is simple eigenvalue of its replacement matrix and when any other eigenvalue has a real part $\leq 1/2$; otherwise, it is called large).
[ { "version": "v1", "created": "Wed, 17 May 2006 11:52:11 GMT" }, { "version": "v2", "created": "Sat, 11 Jul 2009 05:48:42 GMT" } ]
"2015-06-26T00:00:00"
[ [ "Pouyanne", "Nicolas", "", "LM-Versailles" ] ]
math/0606122
George Bell
George I. Bell
Diagonal Peg Solitaire
20 pages, 11 figures
INTEGERS: Electronic Journal of Combinatorial Number Theory 7 (2007) #G01
null
null
math.CO cs.DM cs.DS
null
We study the classical game of peg solitaire when diagonal jumps are allowed. We prove that on many boards, one can begin from a full board with one peg missing, and finish with one peg anywhere on the board. We then consider the problem of finding solutions that minimize the number of moves (where a move is one or more jumps by the same peg), and find the shortest solution to the "central game", which begins and ends at the center. In some cases we can prove analytically that our solutions are the shortest possible, in other cases we apply A* or bidirectional search heuristics.
[ { "version": "v1", "created": "Tue, 6 Jun 2006 03:07:27 GMT" }, { "version": "v2", "created": "Thu, 25 Jan 2007 15:53:10 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Bell", "George I.", "" ] ]
math/0607411
Jean-Gabriel Luque
G\'erard Duchamp (LIPN), Eric Laugerotte (LIFAR EA2655), Jean-Gabriel Luque (IGM-LabInfo)
Extending the scalars of minimizations
null
SCI, \'{E}tats-Unis d'Am\'{e}rique (2001)
null
null
math.CO cs.DS cs.SC
null
In the classical theory of formal languages, finite state automata allow to recognize the words of a rational subset of $\Sigma^*$ where $\Sigma$ is a set of symbols (or the alphabet). Now, given a semiring $(\K,+,.)$, one can construct $\K$-subsets of $\Sigma^*$ in the sense of Eilenberg, that are alternatively called noncommutative formal power series for which a framework very similar to language theory has been constructed Particular noncommutative formal power series, which are called rational series, are the behaviour of a family of weighted automata (or $\K$-automata). In order to get an efficient encoding, it may be interesting to point out one of them with the smallest number of states. Minimization processes of $\K$-automata already exist for $\K$ being: {\bf a)} a field, {\bf b)} a noncommutative field, {\bf c)} a PID . When $\K$ is the bolean semiring, such a minimization process (with isomorphisms of minimal objects) is known within the category of deterministic automata. Minimal automata have been proved to be isomorphic in cases {\bf (a)} and {\bf (b)}. But the proof given for (b) is not constructive. In fact, it lays on the existence of a basis for a submodule of $\K^n$. Here we give an independent algorithm which reproves this fact and an example of a pair of nonisomorphic minimal automata. Moreover, we examine the possibility of extending {\bf (c)}. To this end, we provide an {\em Effective Minimization Process} (or {\em EMP}) which can be used for more general sets of coefficients.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:06:59 GMT" } ]
"2016-08-16T00:00:00"
[ [ "Duchamp", "Gérard", "", "LIPN" ], [ "Laugerotte", "Eric", "", "LIFAR EA2655" ], [ "Luque", "Jean-Gabriel", "", "IGM-LabInfo" ] ]
math/0608210
Henrik B\"a\"arnhielm
Henrik B\"a\"arnhielm
Recognising the Suzuki groups in their natural representations
null
J. Algebra 300 (1), 171-198, 2006
10.1016/j.jalgebra.2006.02.010
null
math.GR cs.DS
null
Under the assumption of a certain conjecture, for which there exists strong experimental evidence, we produce an efficient algorithm for constructive membership testing in the Suzuki groups Sz(q), where q = 2^{2m + 1} for some m > 0, in their natural representations of degree 4. It is a Las Vegas algorithm with running time O{log(q)} field operations, and a preprocessing step with running time O{log(q) loglog(q)} field operations. The latter step needs an oracle for the discrete logarithm problem in GF(q). We also produce a recognition algorithm for Sz(q) = <X>. This is a Las Vegas algorithm with running time O{|X|^2} field operations. Finally, we give a Las Vegas algorithm that, given <X>^h = Sz(q) for some h in GL(4, q), finds some g such that <X>^g = Sz(q). The running time is O{log(q) loglog(q) + |X|} field operations. Implementations of the algorithms are available for the computer system MAGMA.
[ { "version": "v1", "created": "Wed, 9 Aug 2006 02:43:35 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Bäärnhielm", "Henrik", "" ] ]
math/0611679
Dominique Rossin
Dominique Rossin (LIAFA), Mathilde Bouvel (LIAFA)
Longest Common Pattern between two Permutations
null
Algebr. Geom. Topol. 7 (2007) 829-843
10.2140/agt.2007.7.829
null
math.CO cs.DM cs.DS
null
In this paper, we give a polynomial (O(n^8)) algorithm for finding a longest common pattern between two permutations of size n given that one is separable. We also give an algorithm for general permutations whose complexity depends on the length of the longest simple permutation involved in one of our permutations.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 10:47:05 GMT" } ]
"2014-10-01T00:00:00"
[ [ "Rossin", "Dominique", "", "LIAFA" ], [ "Bouvel", "Mathilde", "", "LIAFA" ] ]
math/0612264
Olga Holtz
James Demmel, Ioana Dumitriu, Olga Holtz
Fast linear algebra is stable
26 pages; final version; to appear in Numerische Mathematik
Numer. Math. 108 (2007), no. 1, 59-91
10.1007/s00211-007-0114-x
null
math.NA cs.CC cs.DS
null
In an earlier paper, we showed that a large class of fast recursive matrix multiplication algorithms is stable in a normwise sense, and that in fact if multiplication of $n$-by-$n$ matrices can be done by any algorithm in $O(n^{\omega + \eta})$ operations for any $\eta > 0$, then it can be done stably in $O(n^{\omega + \eta})$ operations for any $\eta > 0$. Here we extend this result to show that essentially all standard linear algebra operations, including LU decomposition, QR decomposition, linear equation solving, matrix inversion, solving least squares problems, (generalized) eigenvalue problems and the singular value decomposition can also be done stably (in a normwise sense) in $O(n^{\omega + \eta})$ operations.
[ { "version": "v1", "created": "Sun, 10 Dec 2006 20:44:57 GMT" }, { "version": "v2", "created": "Tue, 22 May 2007 19:31:20 GMT" }, { "version": "v3", "created": "Tue, 28 Aug 2007 20:15:50 GMT" } ]
"2011-11-09T00:00:00"
[ [ "Demmel", "James", "" ], [ "Dumitriu", "Ioana", "" ], [ "Holtz", "Olga", "" ] ]
math/0702325
Oskar Sandberg
Oskar Sandberg
Neighbor selection and hitting probability in small-world graphs
Published in at http://dx.doi.org/10.1214/07-AAP499 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2008, Vol. 18, No. 5, 1771-1793
10.1214/07-AAP499
IMS-AAP-AAP499
math.PR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Small-world graphs, which combine randomized and structured elements, are seen as prevalent in nature. Jon Kleinberg showed that in some graphs of this type it is possible to route, or navigate, between vertices in few steps even with very little knowledge of the graph itself. In an attempt to understand how such graphs arise we introduce a different criterion for graphs to be navigable in this sense, relating the neighbor selection of a vertex to the hitting probability of routed walks. In several models starting from both discrete and continuous settings, this can be shown to lead to graphs with the desired properties. It also leads directly to an evolutionary model for the creation of similar graphs by the stepwise rewiring of the edges, and we conjecture, supported by simulations, that these too are navigable.
[ { "version": "v1", "created": "Mon, 12 Feb 2007 12:16:35 GMT" }, { "version": "v2", "created": "Wed, 12 Nov 2008 13:51:53 GMT" } ]
"2008-11-18T00:00:00"
[ [ "Sandberg", "Oskar", "" ] ]
math/0702744
Mark Jerrum
Martin Dyer, Leslie Ann Goldberg, Mark Jerrum
Matrix norms and rapid mixing for spin systems
Published in at http://dx.doi.org/10.1214/08-AAP532 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2009, Vol. 19, No. 1, 71-107
10.1214/08-AAP532
IMS-AAP-AAP532
math.PR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a systematic development of the application of matrix norms to rapid mixing in spin systems. We show that rapid mixing of both random update Glauber dynamics and systematic scan Glauber dynamics occurs if any matrix norm of the associated dependency matrix is less than 1. We give improved analysis for the case in which the diagonal of the dependency matrix is $\mathbf{0}$ (as in heat bath dynamics). We apply the matrix norm methods to random update and systematic scan Glauber dynamics for coloring various classes of graphs. We give a general method for estimating a norm of a symmetric nonregular matrix. This leads to improved mixing times for any class of graphs which is hereditary and sufficiently sparse including several classes of degree-bounded graphs such as nonregular graphs, trees, planar graphs and graphs with given tree-width and genus.
[ { "version": "v1", "created": "Sun, 25 Feb 2007 13:25:16 GMT" }, { "version": "v2", "created": "Fri, 4 Apr 2008 12:50:19 GMT" }, { "version": "v3", "created": "Fri, 27 Feb 2009 10:33:04 GMT" } ]
"2009-03-06T00:00:00"
[ [ "Dyer", "Martin", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Jerrum", "Mark", "" ] ]
math/0703921
Louis Theran
Ileana Streinu and Louis Theran
Sparse Hypergraphs and Pebble Game Algorithms
null
null
null
null
math.CO cs.DS
null
A hypergraph $G=(V,E)$ is $(k,\ell)$-sparse if no subset $V'\subset V$ spans more than $k|V'|-\ell$ hyperedges. We characterize $(k,\ell)$-sparse hypergraphs in terms of graph theoretic, matroidal and algorithmic properties. We extend several well-known theorems of Haas, Lov{\'{a}}sz, Nash-Williams, Tutte, and White and Whiteley, linking arboricity of graphs to certain counts on the number of edges. We also address the problem of finding lower-dimensional representations of sparse hypergraphs, and identify a critical behaviour in terms of the sparsity parameters $k$ and $\ell$. Our constructions extend the pebble games of Lee and Streinu from graphs to hypergraphs.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 14:14:58 GMT" } ]
"2007-06-13T00:00:00"
[ [ "Streinu", "Ileana", "" ], [ "Theran", "Louis", "" ] ]
math/0703927
Christine Cheng
V. Arvind, Christine T. Cheng, Nikhil R. Devanur
On Computing the Distinguishing Numbers of Planar Graphs and Beyond: a Counting Approach
27 pages
null
null
null
math.CO cs.DS
null
A vertex k-labeling of graph G is distinguishing if the only automorphism that preserves the labels of G is the identity map. The distinguishing number of G, D(G), is the smallest integer k for which G has a distinguishing k-labeling. In this paper, we apply the principle of inclusion-exclusion and develop recursive formulas to count the number of inequivalent distinguishing k-labelings of a graph. Along the way, we prove that the distinguishing number of a planar graph can be computed in time polynomial in the size of the graph.}
[ { "version": "v1", "created": "Fri, 30 Mar 2007 16:50:09 GMT" } ]
"2007-06-13T00:00:00"
[ [ "Arvind", "V.", "" ], [ "Cheng", "Christine T.", "" ], [ "Devanur", "Nikhil R.", "" ] ]
math/9610221
null
J. Maurice Rojas
Extensions and Corrections for: ``A Convex Geometric Approach to Counting the Roots of a Polynomial System''
null
null
null
MSRI 1996-075
math.AG cs.DS
null
This brief note corrects some errors in the paper quoted in the title, highlights a combinatorial result which may have been overlooked, and points to further improvements in recent literature.
[ { "version": "v1", "created": "Thu, 31 Oct 1996 00:00:00 GMT" } ]
"2008-02-03T00:00:00"
[ [ "Rojas", "J. Maurice", "" ] ]
math/9702221
null
J. Maurice Rojas
Some New Applications of Toric Geometry
null
null
null
MSRI 1997-016
math.AG cs.DS
null
This paper reexamines univariate reduction from a toric geometric point of view. We begin by constructing a binomial variant of the $u$-resultant and then retailor the generalized characteristic polynomial to fully exploit sparsity in the monomial structure of any given polynomial system. We thus obtain a fast new algorithm for univariate reduction and a better understanding of the underlying projections. As a corollary, we show that a refinement of Hilbert's Tenth Problem is decidable within single-exponential time. We also show how certain multisymmetric functions of the roots of polynomial systems can be calculated with sparse resultants.
[ { "version": "v1", "created": "Sat, 8 Feb 1997 00:00:00 GMT" } ]
"2009-09-25T00:00:00"
[ [ "Rojas", "J. Maurice", "" ] ]
math/9702222
null
J. Maurice Rojas
Toric Generalized Characteristic Polynomials
null
null
null
MSRI 1997-017
math.AG cs.DS
null
We illustrate an efficient new method for handling polynomial systems with degenerate solution sets. In particular, a corollary of our techniques is a new algorithm to find an isolated point in every excess component of the zero set (over an algebraically closed field) of any $n$ by $n$ system of polynomial equations. Since we use the sparse resultant, we thus obtain complexity bounds (for converting any input polynomial system into a multilinear factorization problem) which are close to cubic in the degree of the underlying variety -- significantly better than previous bounds which were pseudo-polynomial in the classical B\'ezout bound. By carefully taking into account the underlying toric geometry, we are also able to improve the reliability of certain sparse resultant based algorithms for polynomial system solving.
[ { "version": "v1", "created": "Sat, 8 Feb 1997 00:00:00 GMT" } ]
"2009-09-25T00:00:00"
[ [ "Rojas", "J. Maurice", "" ] ]
math/9704218
Alexander Barvinok
Alexander Barvinok
A simple polynomial time algorithm to approximate the permanent within a simply exponential factor
null
null
null
MSRI 1997-031, formerly math.LA/9704218
math.RA cs.DS
null
We present a simple randomized polynomial time algorithm to approximate the mixed discriminant of $n$ positive semidefinite $n \times n$ matrices within a factor $2^{O(n)}$. Consequently, the algorithm allows us to approximate in randomized polynomial time the permanent of a given $n \times n$ non-negative matrix within a factor $2^{O(n)}$. When applied to approximating the permanent, the algorithm turns out to be a simple modification of the well-known Godsil-Gutman estimator.
[ { "version": "v1", "created": "Wed, 9 Apr 1997 00:00:00 GMT" } ]
"2008-02-03T00:00:00"
[ [ "Barvinok", "Alexander", "" ] ]
physics/0302034
Marek W. Gutowski
Marek W. Gutowski
Power and beauty of interval methods
Short, yet highly informative introduction into interval methods with immediate application to experimental data analysis. To be presented on May 26-29, 2003, VI Domestic Conference on Evolutionary Algorithms and Global Optimization, Poland (invited talk). 8 pages, no figures, LaTex2e. Improved layout, simplified notation, keyword list extended
null
null
null
physics.data-an cs.DS physics.gen-ph
null
Interval calculus is a relatively new branch of mathematics. Initially understood as a set of tools to assess the quality of numerical calculations (rigorous control of rounding errors), it became a discipline in its own rights today. Interval methods are usefull whenever we have to deal with uncertainties, which can be rigorously bounded. Fuzzy sets, rough sets and probability calculus can perform similar tasks, yet only the interval methods are able to (dis)prove, with mathematical rigor, the (non)existence of desired solution(s). Known are several problems, not presented here, which cannot be effectively solved by any other means. This paper presents basic notions and main ideas of interval calculus and two examples of useful algorithms.
[ { "version": "v1", "created": "Tue, 11 Feb 2003 16:27:50 GMT" }, { "version": "v2", "created": "Thu, 20 Feb 2003 16:02:13 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Gutowski", "Marek W.", "" ] ]
physics/0509039
Bernardo Huberman
Jure Leskovec, Lada A. Adamic and Bernardo A. Huberman
The Dynamics of Viral Marketing
null
Leskovec, J., Adamic, L. A., and Huberman, B. A. 2007. The dynamics of viral marketing. ACM Transactions on the Web, 1, 1 (May 2007)
10.1145/1232722.1232727
null
physics.soc-ph cond-mat.stat-mech cs.DB cs.DS
null
We present an analysis of a person-to-person recommendation network, consisting of 4 million people who made 16 million recommendations on half a million products. We observe the propagation of recommendations and the cascade sizes, which we explain by a simple stochastic model. We analyze how user behavior varies within user communities defined by a recommendation network. Product purchases follow a 'long tail' where a significant share of purchases belongs to rarely sold items. We establish how the recommendation network grows over time and how effective it is from the viewpoint of the sender and receiver of the recommendations. While on average recommendations are not very effective at inducing purchases and do not spread very far, we present a model that successfully identifies communities, product and pricing categories for which viral marketing seems to be very effective.
[ { "version": "v1", "created": "Mon, 5 Sep 2005 21:41:15 GMT" }, { "version": "v2", "created": "Tue, 25 Oct 2005 15:44:23 GMT" }, { "version": "v3", "created": "Fri, 29 Sep 2006 20:08:38 GMT" }, { "version": "v4", "created": "Fri, 20 Apr 2007 21:52:56 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Leskovec", "Jure", "" ], [ "Adamic", "Lada A.", "" ], [ "Huberman", "Bernardo A.", "" ] ]
quant-ph/0101133
Paul Vitanyi
Harry Buhrman (CWI and Univ. Amsterdam), J. Tromp (CWI and BioInformatics Solutions), Paul Vitanyi (CWI and Univ. Amsterdam)
Time and Space Bounds for Reversible Simulation
11 pages LaTeX, Proc ICALP 2001, Lecture Notes in Computer Science, Vol xxx Springer-Verlag, Berlin, 2001
Journal of Physics A: Mathematical and General, 34(2001), 6821--6830.
10.1088/0305-4470/34/35/308
null
quant-ph cs.CC cs.DS
null
We prove a general upper bound on the tradeoff between time and space that suffices for the reversible simulation of irreversible computation. Previously, only simulations using exponential time or quadratic space were known. The tradeoff shows for the first time that we can simultaneously achieve subexponential time and subquadratic space. The boundary values are the exponential time with hardly any extra space required by the Lange-McKenzie-Tapp method and the ($\log 3$)th power time with square space required by the Bennett method. We also give the first general lower bound on the extra storage space required by general reversible simulation. This lower bound is optimal in that it is achieved by some reversible simulations.
[ { "version": "v1", "created": "Mon, 29 Jan 2001 17:32:07 GMT" }, { "version": "v2", "created": "Thu, 19 Apr 2001 14:37:29 GMT" } ]
"2009-11-07T00:00:00"
[ [ "Buhrman", "Harry", "", "CWI and Univ. Amsterdam" ], [ "Tromp", "J.", "", "CWI and\n BioInformatics Solutions" ], [ "Vitanyi", "Paul", "", "CWI and Univ. Amsterdam" ] ]
quant-ph/0210064
Julia Kempe
Neil Shenvi, Julia Kempe, and K. Birgitta Whaley
A Quantum Random Walk Search Algorithm
13 pages, 3 figures
Phys. Rev. A, Vol. 67 (5), 052307 (2003)
10.1103/PhysRevA.67.052307
null
quant-ph cs.DS
null
Quantum random walks on graphs have been shown to display many interesting properties, including exponentially fast hitting times when compared with their classical counterparts. However, it is still unclear how to use these novel properties to gain an algorithmic speed-up over classical algorithms. In this paper, we present a quantum search algorithm based on the quantum random walk architecture that provides such a speed-up. It will be shown that this algorithm performs an oracle search on a database of $N$ items with $O(\sqrt{N})$ calls to the oracle, yielding a speed-up similar to other quantum search algorithms. It appears that the quantum random walk formulation has considerable flexibility, presenting interesting opportunities for development of other, possibly novel quantum algorithms.
[ { "version": "v1", "created": "Thu, 10 Oct 2002 00:06:30 GMT" } ]
"2009-11-07T00:00:00"
[ [ "Shenvi", "Neil", "" ], [ "Kempe", "Julia", "" ], [ "Whaley", "K. Birgitta", "" ] ]
quant-ph/0303081
Julia Kempe
Julia Kempe
Quantum random walks - an introductory overview
20 pages, 13 figures, to appear in Contemporary Physics
Contemporary Physics, Vol. 44 (4), p.307-327, 2003
10.1080/00107151031000110776
null
quant-ph cs.DS
null
This article aims to provide an introductory survey on quantum random walks. Starting from a physical effect to illustrate the main ideas we will introduce quantum random walks, review some of their properties and outline their striking differences to classical walks. We will touch upon both physical effects and computer science applications, introducing some of the main concepts and language of present day quantum information science in this context. We will mention recent developments in this new area and outline some open questions.
[ { "version": "v1", "created": "Thu, 13 Mar 2003 13:28:03 GMT" } ]
"2009-11-10T00:00:00"
[ [ "Kempe", "Julia", "" ] ]
quant-ph/0311001
Andris Ambainis
Andris Ambainis
Quantum walk algorithm for element distinctness
33 pages, 1 figure, v9 typos with signs corrected on pages 11-12
SIAM Journal on Computing, 37(1):210-239, 2007
null
null
quant-ph cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use quantum walks to construct a new quantum algorithm for element distinctness and its generalization. For element distinctness (the problem of finding two equal items among N given items), we get an O(N^{2/3}) query quantum algorithm. This improves the previous O(N^{3/4}) query quantum algorithm of Buhrman et.al. (quant-ph/0007016) and matches the lower bound by Shi (quant-ph/0112086). The algorithm also solves the generalization of element distinctness in which we have to find k equal items among N items. For this problem, we get an O(N^{k/(k+1)}) query quantum algorithm.
[ { "version": "v1", "created": "Sat, 1 Nov 2003 02:27:48 GMT" }, { "version": "v2", "created": "Sat, 17 Apr 2004 17:10:38 GMT" }, { "version": "v3", "created": "Thu, 22 Apr 2004 19:12:17 GMT" }, { "version": "v4", "created": "Tue, 8 Mar 2005 20:19:46 GMT" }, { "version": "v5", "created": "Wed, 16 Mar 2005 23:07:28 GMT" }, { "version": "v6", "created": "Thu, 18 Aug 2005 00:58:33 GMT" }, { "version": "v7", "created": "Tue, 18 Oct 2005 15:10:50 GMT" }, { "version": "v8", "created": "Wed, 19 Oct 2005 17:32:52 GMT" }, { "version": "v9", "created": "Wed, 30 Apr 2014 17:07:30 GMT" } ]
"2014-05-01T00:00:00"
[ [ "Ambainis", "Andris", "" ] ]
quant-ph/0402107
Julia Kempe
Andris Ambainis, Julia Kempe and Alexander Rivosh
Coins Make Quantum Walks Faster
25 pages, no figures
Proc. 16th ACM-SIAM SODA, p. 1099-1108 (2005)
null
null
quant-ph cs.DS
null
We show how to search N items arranged on a $\sqrt{N}\times\sqrt{N}$ grid in time $O(\sqrt N \log N)$, using a discrete time quantum walk. This result for the first time exhibits a significant difference between discrete time and continuous time walks without coin degrees of freedom, since it has been shown recently that such a continuous time walk needs time $\Omega(N)$ to perform the same task. Our result furthermore improves on a previous bound for quantum local search by Aaronson and Ambainis. We generalize our result to 3 and more dimensions where the walk yields the optimal performance of $O(\sqrt{N})$ and give several extensions of quantum walk search algorithms for general graphs. The coin-flip operation needs to be chosen judiciously: we show that another ``natural'' choice of coin gives a walk that takes $\Omega(N)$ steps. We also show that in 2 dimensions it is sufficient to have a two-dimensional coin-space to achieve the time $O(\sqrt{N} \log N)$.
[ { "version": "v1", "created": "Mon, 16 Feb 2004 23:32:23 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Ambainis", "Andris", "" ], [ "Kempe", "Julia", "" ], [ "Rivosh", "Alexander", "" ] ]
quant-ph/0403120
Andris Ambainis
Andris Ambainis
Quantum walks and their algorithmic applications
11 pages, 3 figures, short survey on applications of quantum walks, v2: added a reference
International Journal of Quantum Information, 1:507-518, 2003.
null
null
quant-ph cs.DS
null
Quantum walks are quantum counterparts of Markov chains. In this article, we give a brief overview of quantum walks, with emphasis on their algorithmic applications.
[ { "version": "v1", "created": "Tue, 16 Mar 2004 21:49:43 GMT" }, { "version": "v2", "created": "Wed, 31 Mar 2004 18:54:08 GMT" }, { "version": "v3", "created": "Thu, 6 May 2004 20:23:43 GMT" } ]
"2008-05-12T00:00:00"
[ [ "Ambainis", "Andris", "" ] ]
quant-ph/0404060
Chris Lomont
Chris Lomont
A quantum Fourier transform algorithm
18 pages. Minor corrections were made, and some new material was added. Particularly, simulation results were added to show output of the algorithm, and to suggest possible improvements
null
null
null
quant-ph cs.DS
null
Algorithms to compute the quantum Fourier transform over a cyclic group are fundamental to many quantum algorithms. This paper describes such an algorithm and gives a proof of its correctness, tightening some claimed performance bounds given earlier. Exact bounds are given for the number of qubits needed to achieve a desired tolerance, allowing simulation of the algorithm.
[ { "version": "v1", "created": "Fri, 9 Apr 2004 17:02:50 GMT" }, { "version": "v2", "created": "Thu, 17 Jun 2004 16:05:54 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Lomont", "Chris", "" ] ]
quant-ph/0412033
Francois Le Gall
Yoshifumi Inui and Francois Le Gall
Efficient Quantum Algorithms for the Hidden Subgroup Problem over a Class of Semi-direct Product Groups
10 pages, final version. Algorithms modified to work with black-box groups too
Quantum Information and Computation, Vol. 7, No. 5&6 (2007), 559-570
10.26421/QIC7.5-6-9
null
quant-ph cs.DS
null
In this paper, we consider the hidden subgroup problem (HSP) over the class of semi-direct product groups $\mathbb{Z}_{p^r}\rtimes\mathbb{Z}_q$, for p and q prime. We first present a classification of these groups in five classes. Then, we describe a polynomial-time quantum algorithm solving the HSP over all the groups of one of these classes: the groups of the form $\mathbb{Z}_{p^r}\rtimes\mathbb{Z}_p$, where p is an odd prime. Our algorithm works even in the most general case where the group is presented as a black-box group with not necessarily unique encoding. Finally, we extend this result and present an efficient algorithm solving the HSP over the groups $\mathbb{Z}^m_{p^r}\rtimes\mathbb{Z}_p$.
[ { "version": "v1", "created": "Sat, 4 Dec 2004 13:55:28 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 07:04:06 GMT" }, { "version": "v3", "created": "Mon, 3 Dec 2007 04:26:58 GMT" } ]
"2021-10-05T00:00:00"
[ [ "Inui", "Yoshifumi", "" ], [ "Gall", "Francois Le", "" ] ]
quant-ph/0503238
Vladimir Korepin
Vladimir Korepin
Optimization of Partial Search
5 pages
Journal of Physics A: Math. Gen. vol 38, pages L731-L738, 2005
10.1088/0305-4470/38/44/L02
YITP-SB-05-08
quant-ph cs.DS
null
Quantum Grover search algorithm can find a target item in a database faster than any classical algorithm. One can trade accuracy for speed and find a part of the database (a block) containing the target item even faster, this is partial search. A partial search algorithm was recently suggested by Grover and Radhakrishnan. Here we optimize it. Efficiency of the search algorithm is measured by number of queries to the oracle. The author suggests new version of Grover-Radhakrishnan algorithm which uses minimal number of queries to the oracle. The algorithm can run on the same hardware which is used for the usual Grover algorithm.
[ { "version": "v1", "created": "Thu, 31 Mar 2005 13:50:47 GMT" }, { "version": "v2", "created": "Mon, 5 Sep 2005 23:28:57 GMT" } ]
"2015-06-26T00:00:00"
[ [ "Korepin", "Vladimir", "" ] ]
quant-ph/0504012
Andris Ambainis
Andris Ambainis
Quantum search algorithms
12 pages, short survey on selected topics for SIGACT News Complexity Column, published in June 2004
SIGACT News, 35 (2):22-35, 2004.
null
null
quant-ph cs.CC cs.DS
null
We review some of quantum algorithms for search problems: Grover's search algorithm, its generalization to amplitude amplification, the applications of amplitude amplification to various problems and the recent quantum algorithms based on quantum walks.
[ { "version": "v1", "created": "Sun, 3 Apr 2005 19:03:49 GMT" } ]
"2008-05-12T00:00:00"
[ [ "Ambainis", "Andris", "" ] ]
quant-ph/0506265
Ashwin Nayak
Frederic Magniez (CNRS-LRI) and Ashwin Nayak (U. Waterloo and Perimeter Inst.)
Quantum Complexity of Testing Group Commutativity
10 pages, requires fullpage,amsthm,amsfonts,amsmath; To appear in Algorithmica; earlier version appeared in ICALP 2005; corrects minor typos, results are unchanged
null
null
null
quant-ph cs.DS
null
We consider the problem of testing the commutativity of a black-box group specified by its k generators. The complexity (in terms of k) of this problem was first considered by Pak, who gave a randomized algorithm involving O(k) group operations. We construct a quite optimal quantum algorithm for this problem whose complexity is in O (k^{2/3}). The algorithm uses and highlights the power of the quantization method of Szegedy. For the lower bound of Omega(k^{2/3}), we give a reduction from a special case of Element Distinctness to our problem. Along the way, we prove the optimality of the algorithm of Pak for the randomized model.
[ { "version": "v1", "created": "Thu, 30 Jun 2005 12:23:10 GMT" }, { "version": "v2", "created": "Thu, 4 Aug 2005 20:57:09 GMT" }, { "version": "v3", "created": "Thu, 22 Jun 2006 22:04:49 GMT" }, { "version": "v4", "created": "Tue, 8 May 2007 02:33:02 GMT" } ]
"2018-03-22T00:00:00"
[ [ "Magniez", "Frederic", "", "CNRS-LRI" ], [ "Nayak", "Ashwin", "", "U. Waterloo and\n Perimeter Inst." ] ]
quant-ph/0608026
J\'er\'emie Roland
Fr\'ed\'eric Magniez, Ashwin Nayak, J\'er\'emie Roland and Miklos Santha
Search via Quantum Walk
21 pages. Various modifications and improvements, especially in Section 4
SIAM Journal on Computing, 40(1):142-164, 2011
10.1137/090745854
null
quant-ph cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new method for designing quantum search algorithms for finding a "marked" element in the state space of a classical Markov chain. The algorithm is based on a quantum walk \'a la Szegedy (2004) that is defined in terms of the Markov chain. The main new idea is to apply quantum phase estimation to the quantum walk in order to implement an approximate reflection operator. This operator is then used in an amplitude amplification scheme. As a result we considerably expand the scope of the previous approaches of Ambainis (2004) and Szegedy (2004). Our algorithm combines the benefits of these approaches in terms of being able to find marked elements, incurring the smaller cost of the two, and being applicable to a larger class of Markov chains. In addition, it is conceptually simple and avoids some technical difficulties in the previous analyses of several algorithms based on quantum walk.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 18:43:09 GMT" }, { "version": "v2", "created": "Mon, 7 Aug 2006 18:09:10 GMT" }, { "version": "v3", "created": "Tue, 28 Nov 2006 08:57:20 GMT" }, { "version": "v4", "created": "Mon, 14 Feb 2011 21:10:39 GMT" } ]
"2018-03-22T00:00:00"
[ [ "Magniez", "Frédéric", "" ], [ "Nayak", "Ashwin", "" ], [ "Roland", "Jérémie", "" ], [ "Santha", "Miklos", "" ] ]
quant-ph/0609205
Vladimir Korepin
Vladimir E. Korepin and Brenno C. Vallilo
Group Theoretical Formulation of Quantum Partial Search Algorithm
12 pages
Prog. Theor. Phys. Vol. 116, No. 5 (2006), p. 783
10.1143/PTP.116.783
YIPT-SB-06-41
quant-ph cs.DS math.GR
null
Searching and sorting used as a subroutine in many important algorithms. Quantum algorithm can find a target item in a database faster than any classical algorithm. One can trade accuracy for speed and find a part of the database (a block) containing the target item even faster, this is partial search. An example is the following: exact address of the target item is given by a sequence of many bits, but we need to know only some of them. More generally partial search considers the following problem: a database is separated into several blocks. We want to find a block with the target item, not the target item itself. In this paper we reformulate quantum partial search algorithm in terms of group theory.
[ { "version": "v1", "created": "Wed, 27 Sep 2006 00:32:33 GMT" } ]
"2009-11-13T00:00:00"
[ [ "Korepin", "Vladimir E.", "" ], [ "Vallilo", "Brenno C.", "" ] ]
quant-ph/9607014
Christophe Durr
Christoph Durr and Peter Hoyer
A Quantum Algorithm for Finding the Minimum
2 pages
null
null
null
quant-ph cs.DS
null
We give a quantum algorithm to find the index y in a table T of size N such that in time O(c sqrt N), T[y] is minimum with probability at least 1-1/2^c.
[ { "version": "v1", "created": "Thu, 18 Jul 1996 19:12:42 GMT" }, { "version": "v2", "created": "Thu, 7 Jan 1999 16:50:45 GMT" } ]
"2008-02-03T00:00:00"
[ [ "Durr", "Christoph", "" ], [ "Hoyer", "Peter", "" ] ]
quant-ph/9703009
null
Ming Li (University of Waterloo), John Tromp (CWI), Paul Vitanyi (CWI and University of Amsterdam)
Reversible Simulation of Irreversible Computation by Pebble Games
11 pages, Latex, Submitted to Physica D
Physica D120 (1998) 168-176
10.1016/S0167-2789(98)00052-9
CWI Tech Report 1996
quant-ph cs.CC cs.DS
null
Reversible simulation of irreversible algorithms is analyzed in the stylized form of a `reversible' pebble game. While such simulations incur little overhead in additional computation time, they use a large amount of additional memory space during the computation. The reacheable reversible simulation instantaneous descriptions (pebble configurations) are characterized completely. As a corollary we obtain the reversible simulation by Bennett and that among all simulations that can be modelled by the pebble game, Bennett's simulation is optimal in that it uses the least auxiliary space for the greatest number of simulated steps. One can reduce the auxiliary storage overhead incurred by the reversible simulation at the cost of allowing limited erasing leading to an irreversibility-space tradeoff. We show that in this resource-bounded setting the limited erasing needs to be performed at precise instants during the simulation. We show that the reversible simulation can be modified so that it is applicable also when the simulated computation time is unknown.
[ { "version": "v1", "created": "Thu, 6 Mar 1997 17:32:23 GMT" }, { "version": "v2", "created": "Thu, 10 Apr 1997 17:56:23 GMT" }, { "version": "v3", "created": "Fri, 11 Apr 1997 15:02:42 GMT" } ]
"2009-10-30T00:00:00"
[ [ "Li", "Ming", "", "University of Waterloo" ], [ "Tromp", "John", "", "CWI" ], [ "Vitanyi", "Paul", "", "CWI\n and University of Amsterdam" ] ]
quant-ph/9703022
null
Ming Li (University of Waterloo), Paul Vitanyi (CWI and University of Amsterdam)
Reversibility and Adiabatic Computation: Trading Time and Space for Energy
30 pages, Latex. Lemma 2.3 should be replaced by the slightly better ``There is a winning strategy with $n+2$ pebbles and $m-1$ erasures for pebble games $G$ with $T_G= m2^n$, for all $m \geq 1$'' with appropriate further changes (as pointed out by Wim van Dam). This and further work on reversible simulations as in Section 2 appears in quant-ph/9703009
Proc. Royal Society of London, Series A, 452(1996), 769-789
10.1098/rspa.1996.0039
null
quant-ph cs.CC cs.CE cs.DS
null
Future miniaturization and mobilization of computing devices requires energy parsimonious `adiabatic' computation. This is contingent on logical reversibility of computation. An example is the idea of quantum computations which are reversible except for the irreversible observation steps. We propose to study quantitatively the exchange of computational resources like time and space for irreversibility in computations. Reversible simulations of irreversible computations are memory intensive. Such (polynomial time) simulations are analysed here in terms of `reversible' pebble games. We show that Bennett's pebbling strategy uses least additional space for the greatest number of simulated steps. We derive a trade-off for storage space versus irreversible erasure. Next we consider reversible computation itself. An alternative proof is provided for the precise expression of the ultimate irreversibility cost of an otherwise reversible computation without restrictions on time and space use. A time-irreversibility trade-off hierarchy in the exponential time region is exhibited. Finally, extreme time-irreversibility trade-offs for reversible computations in the thoroughly unrealistic range of computable versus noncomputable time-bounds are given.
[ { "version": "v1", "created": "Thu, 13 Mar 1997 18:24:42 GMT" } ]
"2009-10-30T00:00:00"
[ [ "Li", "Ming", "", "University of Waterloo" ], [ "Vitanyi", "Paul", "", "CWI and University of\n Amsterdam" ] ]
quant-ph/9902053
Andris Ambainis
Andris Ambainis
A better lower bound for quantum algorithms searching an ordered list
10 pages, LaTeX
null
null
null
quant-ph cs.CC cs.DS
null
We show that any quantum algorithm searching an ordered list of n elements needs to examine at least 1/12 log n-O(1) of them. Classically, log n queries are both necessary and sufficient. This shows that quantum algorithms can achieve only a constant speedup for this problem. Our result improves lower bounds of Buhrman and de Wolf(quant-ph/9811046) and Farhi, Goldstone, Gutmann and Sipser (quant-ph/9812057).
[ { "version": "v1", "created": "Sun, 14 Feb 1999 01:20:11 GMT" } ]
"2007-05-23T00:00:00"
[ [ "Ambainis", "Andris", "" ] ]