149 research outputs found

    Weighted Random Popular Matchings

    Full text link
    For a set A of n applicants and a set I of m items, we consider a problem of computing a matching of applicants to items, i.e., a function M mapping A to I; here we assume that each applicant x∈Ax \in A provides a preference list on items in I. We say that an applicant x∈Ax \in A prefers an item p than an item q if p is located at a higher position than q in its preference list, and we say that x prefers a matching M over a matching M' if x prefers M(x) over M'(x). For a given matching problem A, I, and preference lists, we say that M is more popular than M' if the number of applicants preferring M over M' is larger than that of applicants preferring M' over M, and M is called a popular matching if there is no other matching that is more popular than M. Here we consider the situation that A is partitioned into A1,A2,...,AkA_{1},A_{2},...,A_{k}, and that each AiA_{i} is assigned a weight wi>0w_{i}>0 such that w_{1}>w_{2}>...>w_{k}>0.Forsuchamatchingproblem,wesaythatMismorepopularthanMβ€²ifthetotalweightofapplicantspreferringMoverMβ€²islargerthanthatofapplicantspreferringMβ€²overM,andwecallMankβˆ’weightedpopularmatchingifthereisnoothermatchingthatismorepopularthanM.Inthispaper,weanalyzethe2βˆ’weightedmatchingproblem,andweshowthat(lowerbound)if. For such a matching problem, we say that M is more popular than M' if the total weight of applicants preferring M over M' is larger than that of applicants preferring M' over M, and we call M an k-weighted popular matching if there is no other matching that is more popular than M. In this paper, we analyze the 2-weighted matching problem, and we show that (lower bound) if m/n^{4/3}=o(1),thenarandominstanceofthe2βˆ’weightedmatchingproblemwith, then a random instance of the 2-weighted matching problem with w_{1} \geq 2w_{2}hasa2βˆ’weightedpopularmatchingwithprobabilityo(1);and(upperbound)if has a 2-weighted popular matching with probability o(1); and (upper bound) if n^{4/3}/m = o(1),thenarandominstanceofthe2βˆ’weightedmatchingproblemwith, then a random instance of the 2-weighted matching problem with w_{1} \geq 2w_{2}$ has a 2-weighted popular matching with probability 1-o(1).Comment: 13 pages, 2 figure

    Improved Approximation Lower Bounds for TSP with Distances One and Two

    Get PDF
    The metric travelling salesman problem Ξ”-Tsp is the traveling salesman problem in which the distances among cities satisfy the triangle inequality. In this paper, we consider the matric traveling salesman problem Ξ”(1,2)-Tsp with distances one and two and Ξ”(1,2,3)-Tsp with distances one, two, and three as the special cases of Ξ”-Tsp. Since Ξ”(1,2)-Tsp is NP-complete, it is NP-hard to find an optimal solution for Ξ”(1,2)-Tsp. So in polynomial time, we with to find an approximate solution for Ξ”(1,2)-Tsp. owever Ξ”(1,2)-Tsp is APX-complete, there is a nontrivial approximation lower bound for Ξ”(1,2)-Tsp. For any Ξ΅>0, Engebretsen showed that it is NP-hard to approximate the symmetric Ξ”(1,2)-Tsp within 5381/5380-Ξ΅; the asymmetric Ξ”(1,2)-Tsp within 2805/2804-Ξ΅, and Bochenhauer, et al. showed that it is NP-hard to approximate the symmetric Ξ”(1,2,3)-Tsp within 3813/3812-Ξ΅. In this paper, we improve those lower bounds and show that for any Ξ΅>0, it is NP-hard to approximate the symmetric Ξ”(1,2)-Tsp within 1027/1026-Ξ΅ (Corollary 4.5); the asymmetric Ξ”(1,2)-Tsp within 535/534-Ξ΅ (Corollary 4.7); the symmetric Ξ”(1,2,3)-Tsp within 817/816-Ξ΅ (Theorem 5.2); the asymmetric Ξ”(1,2,3)-Tsp within 364/363-Ξ΅ (Theorem 5.3). We also show that for any Ξ΅>0, it is NP-hard to approximate Shortest-Superstring within 1279/1278-Ξ΅ (Corollary 6.3)

    New Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length

    Full text link
    A (k,Ξ΄,Ο΅)(k,\delta,\epsilon)-locally decodable code C:Fqnβ†’FqNC: F_{q}^{n} \to F_{q}^{N} is an error-correcting code that encodes each message xβƒ—=(x1,x2,...,xn)∈Fqn\vec{x}=(x_{1},x_{2},...,x_{n}) \in F_{q}^{n} to C(xβƒ—)∈FqNC(\vec{x}) \in F_{q}^{N} and has the following property: For any yβƒ—βˆˆFqN\vec{y} \in {\bf F}_{q}^{N} such that d(yβƒ—,C(xβƒ—))≀δNd(\vec{y},C(\vec{x})) \leq \delta N and each 1≀i≀n1 \leq i \leq n, the symbol xix_{i} of xβƒ—\vec{x} can be recovered with probability at least 1βˆ’Ο΅1-\epsilon by a randomized decoding algorithm looking only at kk coordinates of yβƒ—\vec{y}. The efficiency of a (k,Ξ΄,Ο΅)(k,\delta,\epsilon)-locally decodable code C:Fqnβ†’FqNC: F_{q}^{n} \to F_{q}^{N} is measured by the code length NN and the number kk of queries. For any kk-query locally decodable code C:Fqnβ†’FqNC: F_{q}^{n} \to F_{q}^{N}, the code length NN is conjectured to be exponential of nn, however, this was disproved. Yekhanin [In Proc. of STOC, 2007] showed that there exists a 3-query locally decodable code C:F2nβ†’F2NC: F_{2}^{n} \to F_{2}^{N} such that N=exp⁑(n(1/log⁑log⁑n))N=\exp(n^{(1/\log \log n)}) assuming that the number of Mersenne primes is infinite. For a 3-query locally decodable code C:Fqnβ†’FqNC: F_{q}^{n} \to F_{q}^{N}, Efremenko [ECCC Report No.69, 2008] reduced the code length further to N=exp⁑(nO((log⁑log⁑n/log⁑n)1/2))N=\exp(n^{O((\log \log n/ \log n)^{1/2})}), and also showed that for any integer r>1r>1, there exists a kk-query locally decodable code C:Fqnβ†’FqNC: F_{q}^{n} \to F_{q}^{N} such that k≀2rk \leq 2^{r} and N=exp⁑(nO((log⁑log⁑n/log⁑n)1βˆ’1/r))N=\exp(n^{O((\log \log n/ \log n)^{1-1/r})}). In this paper, we present a query-efficient locally decodable code and show that for any integer r>1r>1, there exists a kk-query locally decodable code C:Fqnβ†’FqNC: F_{q}^{n} \to F_{q}^{N} such that k≀3β‹…2rβˆ’2k \leq 3 \cdot 2^{r-2} and N=exp⁑(nO((log⁑log⁑n/log⁑n)1βˆ’1/r))N=\exp(n^{O((\log \log n/ \log n)^{1-1/r})}).Comment: 13 pages, 1 figure, 2 table

    Physical Zero-Knowledge Proof for Numberlink

    Get PDF
    Numberlink is a logic puzzle for which the player has to connect all pairs of cells with the same numbers by non-crossing paths in a rectangular grid. In this paper, we propose a physical protocol of zero-knowledge proof for Numberlink using a deck of cards, which allows a player to physically show that he/she knows a solution without revealing it. In particular, we develop a physical protocol to count the number of elements in a list that are equal to a given secret value without revealing that value, the positions of elements in the list that are equal to it, or the value of any other element in the list. Our protocol can also be applied to verify the existence of vertex-disjoint paths connecting all given pairs of endpoints in any undirected graph

    Greedy Algorithms for Multi-Queue Buffer Management with Class Segregation

    Full text link
    In this paper, we focus on a multi-queue buffer management in which packets of different values are segregated in different queues. Our model consists of m packets values and m queues. Recently, Al-Bawani and Souza (arXiv:1103.6049v2 [cs.DS] 30 Mar 2011) presented an online multi-queue buffer management algorithm Greedy and showed that it is 2-competitive for the general m-valued case, i.e., m packet values are 0 < v_{1} < v_{2} < ... < v_{m}, and (1+v_{1}/v_{2})-competitive for the two-valued case, i.e., two packet values are 0 < v_{1} < v_{2}. For the general m-valued case, let c_i = (v_{i} + \sum_{j=1}^{i-1} 2^{j-1} v_{i-j})/(v_{i+1} + \sum_{j=1}^{i-1}2^{j-1}v_{i-j}) for 1 \leq i \leq m-1, and let c_{m}^{*} = \max_{i} c_{i}. In this paper, we precisely analyze the competitive ratio of Greedy for the general m-valued case, and show that the algorithm Greedy is (1+c_{m}^{*})-competitive.Comment: 19 page
    • …
    corecore