13,628 research outputs found
Efficient pebbling for list traversal synopses
We show how to support efficient back traversal in a unidirectional list,
using small memory and with essentially no slowdown in forward steps. Using
memory for a list of size , the 'th back-step from the
farthest point reached so far takes time in the worst case, while
the overhead per forward step is at most for arbitrary small
constant . An arbitrary sequence of forward and back steps is
allowed. A full trade-off between memory usage and time per back-step is
presented: vs. and vice versa. Our algorithms are based on a
novel pebbling technique which moves pebbles on a virtual binary, or -ary,
tree that can only be traversed in a pre-order fashion. The compact data
structures used by the pebbling algorithms, called list traversal synopses,
extend to general directed graphs, and have other interesting applications,
including memory efficient hash-chain implementation. Perhaps the most
surprising application is in showing that for any program, arbitrary rollback
steps can be efficiently supported with small overhead in memory, and marginal
overhead in its ordinary execution. More concretely: Let be a program that
runs for at most steps, using memory of size . Then, at the cost of
recording the input used by the program, and increasing the memory by a factor
of to , the program can be extended to support an
arbitrary sequence of forward execution and rollback steps: the 'th rollback
step takes time in the worst case, while forward steps take O(1)
time in the worst case, and amortized time per step.Comment: 27 page
Evanescent-wave coupled right angled buried waveguide: Applications in carbon nanotube mode-locking
In this paper we present a simple but powerful subgraph sampling primitive
that is applicable in a variety of computational models including dynamic graph
streams (where the input graph is defined by a sequence of edge/hyperedge
insertions and deletions) and distributed systems such as MapReduce. In the
case of dynamic graph streams, we use this primitive to prove the following
results:
-- Matching: First, there exists an space algorithm that
returns an exact maximum matching on the assumption the cardinality is at most
. The best previous algorithm used space where is the
number of vertices in the graph and we prove our result is optimal up to
logarithmic factors. Our algorithm has update time. Second,
there exists an space algorithm that returns an
-approximation for matchings of arbitrary size. (Assadi et al. (2015)
showed that this was optimal and independently and concurrently established the
same upper bound.) We generalize both results for weighted matching. Third,
there exists an space algorithm that returns a constant
approximation in graphs with bounded arboricity.
-- Vertex Cover and Hitting Set: There exists an space
algorithm that solves the minimum hitting set problem where is the
cardinality of the input sets and is an upper bound on the size of the
minimum hitting set. We prove this is optimal up to logarithmic factors. Our
algorithm has update time. The case corresponds to minimum
vertex cover.
Finally, we consider a larger family of parameterized problems (including
-matching, disjoint paths, vertex coloring among others) for which our
subgraph sampling primitive yields fast, small-space dynamic graph stream
algorithms. We then show lower bounds for natural problems outside this family
Fair Leader Election for Rational Agents in Asynchronous Rings and Networks
We study a game theoretic model where a coalition of processors might collude
to bias the outcome of the protocol, where we assume that the processors always
prefer any legitimate outcome over a non-legitimate one. We show that the
problems of Fair Leader Election and Fair Coin Toss are equivalent, and focus
on Fair Leader Election.
Our main focus is on a directed asynchronous ring of processors, where we
investigate the protocol proposed by Abraham et al.
\cite{abraham2013distributed} and studied in Afek et al.
\cite{afek2014distributed}. We show that in general the protocol is resilient
only to sub-linear size coalitions. Specifically, we show that
randomly located processors or
adversarially located processors can force any outcome. We complement this by
showing that the protocol is resilient to any adversarial coalition of size
.
We propose a modification to the protocol, and show that it is resilient to
every coalition of size , by exhibiting both an attack and a
resilience result. For every , we define a family of graphs
that can be simulated by trees where each node in the tree
simulates at most processors. We show that for every graph in
, there is no fair leader election protocol that is
resilient to coalitions of size . Our result generalizes a previous result
of Abraham et al. \cite{abraham2013distributed} that states that for every
graph, there is no fair leader election protocol which is resilient to
coalitions of size .Comment: 48 pages, PODC 201
On spectral distribution of sample covariance matrices from large dimensional and large k-fold tensor products
We study the eigenvalue distributions for sums of independent rank-one k-fold tensor products of large n-dimensional vectors. Previous results in the literature assume that k=o(n) and show that the eigenvalue distributions converge to the celebrated Marčenko-Pastur law under appropriate moment conditions on the base vectors. In this paper, motivated by quantum information theory, we study the regime where k grows faster, namely k=O(n). We show that the moment sequences of the eigenvalue distributions have a limit, which is different from the Marčenko-Pastur law, and the Marčenko-Pastur law limit holds if and only if k=o(n) for this tensor model. The approach is based on the method of moments
Convexity-Increasing Morphs of Planar Graphs
We study the problem of convexifying drawings of planar graphs. Given any
planar straight-line drawing of an internally 3-connected graph, we show how to
morph the drawing to one with strictly convex faces while maintaining planarity
at all times. Our morph is convexity-increasing, meaning that once an angle is
convex, it remains convex. We give an efficient algorithm that constructs such
a morph as a composition of a linear number of steps where each step either
moves vertices along horizontal lines or moves vertices along vertical lines.
Moreover, we show that a linear number of steps is worst-case optimal.
To obtain our result, we use a well-known technique by Hong and Nagamochi for
finding redrawings with convex faces while preserving y-coordinates. Using a
variant of Tutte's graph drawing algorithm, we obtain a new proof of Hong and
Nagamochi's result which comes with a better running time. This is of
independent interest, as Hong and Nagamochi's technique serves as a building
block in existing morphing algorithms.Comment: Preliminary version in Proc. WG 201
- …