9,364 research outputs found
A Discrete and Bounded Envy-free Cake Cutting Protocol for Four Agents
We consider the well-studied cake cutting problem in which the goal is to
identify a fair allocation based on a minimal number of queries from the
agents. The problem has attracted considerable attention within various
branches of computer science, mathematics, and economics. Although, the elegant
Selfridge-Conway envy-free protocol for three agents has been known since 1960,
it has been a major open problem for the last fifty years to obtain a bounded
envy-free protocol for more than three agents. We propose a discrete and
bounded envy-free protocol for four agents
Weak Fourier-Schur sampling, the hidden subgroup problem, and the quantum collision problem
Schur duality decomposes many copies of a quantum state into subspaces
labeled by partitions, a decomposition with applications throughout quantum
information theory. Here we consider applying Schur duality to the problem of
distinguishing coset states in the standard approach to the hidden subgroup
problem. We observe that simply measuring the partition (a procedure we call
weak Schur sampling) provides very little information about the hidden
subgroup. Furthermore, we show that under quite general assumptions, even a
combination of weak Fourier sampling and weak Schur sampling fails to identify
the hidden subgroup. We also prove tight bounds on how many coset states are
required to solve the hidden subgroup problem by weak Schur sampling, and we
relate this question to a quantum version of the collision problem.Comment: 21 page
Classes of Terminating Logic Programs
Termination of logic programs depends critically on the selection rule, i.e.
the rule that determines which atom is selected in each resolution step. In
this article, we classify programs (and queries) according to the selection
rules for which they terminate. This is a survey and unified view on different
approaches in the literature. For each class, we present a sufficient, for most
classes even necessary, criterion for determining that a program is in that
class. We study six classes: a program strongly terminates if it terminates for
all selection rules; a program input terminates if it terminates for selection
rules which only select atoms that are sufficiently instantiated in their input
positions, so that these arguments do not get instantiated any further by the
unification; a program local delay terminates if it terminates for local
selection rules which only select atoms that are bounded w.r.t. an appropriate
level mapping; a program left-terminates if it terminates for the usual
left-to-right selection rule; a program exists-terminates if there exists a
selection rule for which it terminates; finally, a program has bounded
nondeterminism if it only has finitely many refutations. We propose a
semantics-preserving transformation from programs with bounded nondeterminism
into strongly terminating programs. Moreover, by unifying different formalisms
and making appropriate assumptions, we are able to establish a formal hierarchy
between the different classes.Comment: 50 pages. The following mistake was corrected: In figure 5, the first
clause for insert was insert([],X,[X]
Quantum algorithms for highly non-linear Boolean functions
Attempts to separate the power of classical and quantum models of computation
have a long history. The ultimate goal is to find exponential separations for
computational problems. However, such separations do not come a dime a dozen:
while there were some early successes in the form of hidden subgroup problems
for abelian groups--which generalize Shor's factoring algorithm perhaps most
faithfully--only for a handful of non-abelian groups efficient quantum
algorithms were found. Recently, problems have gotten increased attention that
seek to identify hidden sub-structures of other combinatorial and algebraic
objects besides groups. In this paper we provide new examples for exponential
separations by considering hidden shift problems that are defined for several
classes of highly non-linear Boolean functions. These so-called bent functions
arise in cryptography, where their property of having perfectly flat Fourier
spectra on the Boolean hypercube gives them resilience against certain types of
attack. We present new quantum algorithms that solve the hidden shift problems
for several well-known classes of bent functions in polynomial time and with a
constant number of queries, while the classical query complexity is shown to be
exponential. Our approach uses a technique that exploits the duality between
bent functions and their Fourier transforms.Comment: 15 pages, 1 figure, to appear in Proceedings of the 21st Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA'10). This updated version of
the paper contains a new exponential separation between classical and quantum
query complexit
Black-Box Complexity: Breaking the Barrier of LeadingOnes
We show that the unrestricted black-box complexity of the -dimensional
XOR- and permutation-invariant LeadingOnes function class is . This shows that the recent natural looking bound is
not tight.
The black-box optimization algorithm leading to this bound can be implemented
in a way that only 3-ary unbiased variation operators are used. Hence our bound
is also valid for the unbiased black-box complexity recently introduced by
Lehre and Witt (GECCO 2010). The bound also remains valid if we impose the
additional restriction that the black-box algorithm does not have access to the
objective values but only to their relative order (ranking-based black-box
complexity).Comment: 12 pages, to appear in the Proc. of Artificial Evolution 2011, LNCS
7401, Springer, 2012. For the unrestricted black-box complexity of
LeadingOnes there is now a tight bound, cf.
http://eccc.hpi-web.de/report/2012/087
- …