572 research outputs found
Data-Oblivious Graph Algorithms in Outsourced External Memory
Motivated by privacy preservation for outsourced data, data-oblivious
external memory is a computational framework where a client performs
computations on data stored at a semi-trusted server in a way that does not
reveal her data to the server. This approach facilitates collaboration and
reliability over traditional frameworks, and it provides privacy protection,
even though the server has full access to the data and he can monitor how it is
accessed by the client. The challenge is that even if data is encrypted, the
server can learn information based on the client data access pattern; hence,
access patterns must also be obfuscated. We investigate privacy-preserving
algorithms for outsourced external memory that are based on the use of
data-oblivious algorithms, that is, algorithms where each possible sequence of
data accesses is independent of the data values. We give new efficient
data-oblivious algorithms in the outsourced external memory model for a number
of fundamental graph problems. Our results include new data-oblivious
external-memory methods for constructing minimum spanning trees, performing
various traversals on rooted trees, answering least common ancestor queries on
trees, computing biconnected components, and forming open ear decompositions.
None of our algorithms make use of constant-time random oracles.Comment: 20 page
Amortised resource analysis with separation logic
Type-based amortised resource analysis following Hofmann and Jost—where resources are associated with individual elements of data structures and doled out to the programmer under a linear typing discipline—have been successful in providing concrete resource bounds for functional programs, with good support for inference. In this work we translate the idea of amortised resource analysis to imperative languages by embedding a logic of resources, based on Bunched Implications, within Separation Logic. The Separation Logic component allows us to assert the presence and shape of mutable data structures on the heap, while the resource component allows us to state the resources associated with each member of the structure. We present the logic on a small imperative language with procedures and mutable heap, based on Java bytecode. We have formalised the logic within the Coq proof assistant and extracted a certified verification condition generator. We demonstrate the logic on some examples, including proving termination of in-place list reversal on lists with cyclic tails
Exact Algorithms for Maximum Independent Set
We show that the maximum independent set problem (MIS) on an -vertex graph
can be solved in time and polynomial space, which even is
faster than Robson's -time exponential-space algorithm
published in 1986. We also obtain improved algorithms for MIS in graphs with
maximum degree 6 and 7, which run in time of and
, respectively. Our algorithms are obtained by using fast
algorithms for MIS in low-degree graphs in a hierarchical way and making a
careful analyses on the structure of bounded-degree graphs
Complexity of Coloring Graphs without Paths and Cycles
Let and denote a path on vertices and a cycle on
vertices, respectively. In this paper we study the -coloring problem for
-free graphs. Maffray and Morel, and Bruce, Hoang and Sawada,
have proved that 3-colorability of -free graphs has a finite forbidden
induced subgraphs characterization, while Hoang, Moore, Recoskie, Sawada, and
Vatshelle have shown that -colorability of -free graphs for
does not. These authors have also shown, aided by a computer search, that
4-colorability of -free graphs does have a finite forbidden induced
subgraph characterization. We prove that for any , the -colorability of
-free graphs has a finite forbidden induced subgraph
characterization. We provide the full lists of forbidden induced subgraphs for
and . As an application, we obtain certifying polynomial time
algorithms for 3-coloring and 4-coloring -free graphs. (Polynomial
time algorithms have been previously obtained by Golovach, Paulusma, and Song,
but those algorithms are not certifying); To complement these results we show
that in most other cases the -coloring problem for -free
graphs is NP-complete. Specifically, for we show that -coloring is
NP-complete for -free graphs when and ; for we show that -coloring is NP-complete for -free graphs
when , ; and additionally, for , we show that
-coloring is also NP-complete for -free graphs if and
. This is the first systematic study of the complexity of the
-coloring problem for -free graphs. We almost completely
classify the complexity for the cases when , and
identify the last three open cases
Exponential Time Complexity of Weighted Counting of Independent Sets
We consider weighted counting of independent sets using a rational weight x:
Given a graph with n vertices, count its independent sets such that each set of
size k contributes x^k. This is equivalent to computation of the partition
function of the lattice gas with hard-core self-repulsion and hard-core pair
interaction. We show the following conditional lower bounds: If counting the
satisfying assignments of a 3-CNF formula in n variables (#3SAT) needs time
2^{\Omega(n)} (i.e. there is a c>0 such that no algorithm can solve #3SAT in
time 2^{cn}), counting the independent sets of size n/3 of an n-vertex graph
needs time 2^{\Omega(n)} and weighted counting of independent sets needs time
2^{\Omega(n/log^3 n)} for all rational weights x\neq 0.
We have two technical ingredients: The first is a reduction from 3SAT to
independent sets that preserves the number of solutions and increases the
instance size only by a constant factor. Second, we devise a combination of
vertex cloning and path addition. This graph transformation allows us to adapt
a recent technique by Dell, Husfeldt, and Wahlen which enables interpolation by
a family of reductions, each of which increases the instance size only
polylogarithmically.Comment: Introduction revised, differences between versions of counting
independent sets stated more precisely, minor improvements. 14 page
Numerical Construction of LISS Lyapunov Functions under a Small Gain Condition
In the stability analysis of large-scale interconnected systems it is
frequently desirable to be able to determine a decay point of the gain
operator, i.e., a point whose image under the monotone operator is strictly
smaller than the point itself. The set of such decay points plays a crucial
role in checking, in a semi-global fashion, the local input-to-state stability
of an interconnected system and in the numerical construction of a LISS
Lyapunov function. We provide a homotopy algorithm that computes a decay point
of a monotone op- erator. For this purpose we use a fixed point algorithm and
provide a function whose fixed points correspond to decay points of the
monotone operator. The advantage to an earlier algorithm is demonstrated.
Furthermore an example is given which shows how to analyze a given perturbed
interconnected system.Comment: 30 pages, 7 figures, 4 table
Conjunctions of Among Constraints
Many existing global constraints can be encoded as a conjunction of among
constraints. An among constraint holds if the number of the variables in its
scope whose value belongs to a prespecified set, which we call its range, is
within some given bounds. It is known that domain filtering algorithms can
benefit from reasoning about the interaction of among constraints so that
values can be filtered out taking into consideration several among constraints
simultaneously. The present pa- per embarks into a systematic investigation on
the circumstances under which it is possible to obtain efficient and complete
domain filtering algorithms for conjunctions of among constraints. We start by
observing that restrictions on both the scope and the range of the among
constraints are necessary to obtain meaningful results. Then, we derive a
domain flow-based filtering algorithm and present several applications. In
particular, it is shown that the algorithm unifies and generalizes several
previous existing results.Comment: 15 pages plus appendi
On the probabilistic min spanning tree Problem
We study a probabilistic optimization model for min spanning tree, where any vertex vi of the input-graph G(V,E) has some presence probability pi in the final instance G′ ⊂ G that will effectively be optimized. Suppose that when this “real” instance G′ becomes known, a spanning tree T, called anticipatory or a priori spanning tree, has already been computed in G and one can run a quick algorithm (quicker than one that recomputes from scratch), called modification strategy, that modifies the anticipatory tree T in order to fit G ′. The goal is to compute an anticipatory spanning tree of G such that, its modification for any G ′ ⊆ G is optimal for G ′. This is what we call probabilistic min spanning tree problem. In this paper we study complexity and approximation of probabilistic min spanning tree in complete graphs under two distinct modification strategies leading to different complexity results for the problem. For the first of the strategies developed, we also study two natural subproblems of probabilistic min spanning tree, namely, the probabilistic metric min spanning tree and the probabilistic min spanning tree 1,2 that deal with metric complete graphs and complete graphs with edge-weights either 1, or 2, respectively
Computing the vertices of tropical polyhedra using directed hypergraphs
We establish a characterization of the vertices of a tropical polyhedron
defined as the intersection of finitely many half-spaces. We show that a point
is a vertex if, and only if, a directed hypergraph, constructed from the
subdifferentials of the active constraints at this point, admits a unique
strongly connected component that is maximal with respect to the reachability
relation (all the other strongly connected components have access to it). This
property can be checked in almost linear-time. This allows us to develop a
tropical analogue of the classical double description method, which computes a
minimal internal representation (in terms of vertices) of a polyhedron defined
externally (by half-spaces or hyperplanes). We provide theoretical worst case
complexity bounds and report extensive experimental tests performed using the
library TPLib, showing that this method outperforms the other existing
approaches.Comment: 29 pages (A4), 10 figures, 1 table; v2: Improved algorithm in section
5 (using directed hypergraphs), detailed appendix; v3: major revision of the
article (adding tropical hyperplanes, alternative method by arrangements,
etc); v4: minor revisio
Ordered phase in the two-dimensional randomly coupled ferromagnet
True ground states are evaluated for a 2d Ising model with random near
neighbor interactions and ferromagnetic second neighbor interactions (the
Randomly Coupled Ferromagnet). The spin glass stiffness exponent is positive
when the absolute value of the random interaction is weaker than the
ferromagnetic interaction. This result demonstrates that in this parameter
domain the spin glass like ordering temperature is non-zero for these systems,
in strong contrast to the 2d Edwards-Anderson spin glass.Comment: 7 pages; 9 figures; revtex; new version much extende
- …