987 research outputs found
A Simply Exponential Upper Bound on the Maximum Number of Stable Matchings
Stable matching is a classical combinatorial problem that has been the
subject of intense theoretical and empirical study since its introduction in
1962 in a seminal paper by Gale and Shapley. In this paper, we provide a new
upper bound on , the maximum number of stable matchings that a stable
matching instance with men and women can have. It has been a
long-standing open problem to understand the asymptotic behavior of as
, first posed by Donald Knuth in the 1970s. Until now the best
lower bound was approximately , and the best upper bound was . In this paper, we show that for all , for some
universal constant . This matches the lower bound up to the base of the
exponent. Our proof is based on a reduction to counting the number of downsets
of a family of posets that we call "mixing". The latter might be of independent
interest
Approximately Sampling Elements with Fixed Rank in Graded Posets
Graded posets frequently arise throughout combinatorics, where it is natural
to try to count the number of elements of a fixed rank. These counting problems
are often -complete, so we consider approximation algorithms for
counting and uniform sampling. We show that for certain classes of posets,
biased Markov chains that walk along edges of their Hasse diagrams allow us to
approximately generate samples with any fixed rank in expected polynomial time.
Our arguments do not rely on the typical proofs of log-concavity, which are
used to construct a stationary distribution with a specific mode in order to
give a lower bound on the probability of outputting an element of the desired
rank. Instead, we infer this directly from bounds on the mixing time of the
chains through a method we call .
A noteworthy application of our method is sampling restricted classes of
integer partitions of . We give the first provably efficient Markov chain
algorithm to uniformly sample integer partitions of from general restricted
classes. Several observations allow us to improve the efficiency of this chain
to require space, and for unrestricted integer partitions,
expected time. Related applications include sampling permutations
with a fixed number of inversions and lozenge tilings on the triangular lattice
with a fixed average height.Comment: 23 pages, 12 figure
On the Complexity of Mining Itemsets from the Crowd Using Taxonomies
We study the problem of frequent itemset mining in domains where data is not
recorded in a conventional database but only exists in human knowledge. We
provide examples of such scenarios, and present a crowdsourcing model for them.
The model uses the crowd as an oracle to find out whether an itemset is
frequent or not, and relies on a known taxonomy of the item domain to guide the
search for frequent itemsets. In the spirit of data mining with oracles, we
analyze the complexity of this problem in terms of (i) crowd complexity, that
measures the number of crowd questions required to identify the frequent
itemsets; and (ii) computational complexity, that measures the computational
effort required to choose the questions. We provide lower and upper complexity
bounds in terms of the size and structure of the input taxonomy, as well as the
size of a concise description of the output itemsets. We also provide
constructive algorithms that achieve the upper bounds, and consider more
efficient variants for practical situations.Comment: 18 pages, 2 figures. To be published to ICDT'13. Added missing
acknowledgemen
A Diffie-Hellman based key management scheme for hierarchical access control
All organizations share data in a carefully managed fashion\ud
by using access control mechanisms. We focus on enforcing access control by encrypting the data and managing the encryption keys. We make the realistic assumption that the structure of any organization is a hierarchy of security classes. Data from a certain security class can only be accessed by another security class, if it is higher or at the same level in the hierarchy. Otherwise access is denied. Our solution is based on the Die-Hellman key exchange protocol. We show, that the theoretical worst case performance of our solution is slightly better than that of all other existing solutions. We also show, that our performance in practical cases is linear in the size of the hierarchy, whereas the best results from the literature are quadratic
- …