21 research outputs found

    User interface design principles for Finnish websites’ localization in China based on cultural dimensions

    Get PDF
    Globalization has enabled distribution of market over multiple cultures around the world. For international businesses, they need to bring culture elements into consideration while doing websites’ localization. Studies have been done in carrying out cross-cultural UI design principles. Finland has big potential of increase exportation to China since there are more and more Chinese visitors arriving in Finland these years. The research question of this thesis is how can Finnish companies’ websites do better localization on their websites by applying cross-cultural UI design principles. Previous researches have been studying on general cross-cultural UI design principles. But no one has done specific research between two cultures, we assume general study cannot cover all situations, neither accurate, since it might have compromised some specific detail while generating a general introduction. However, businesses need specific and accurate guidelines. In this thesis, based on previous researches on general cross-cultural UI design principles, a case study will be carried out to study Finnish websites and Chinese websites. After that we will be able to review and modify general cross-cultural UI design principles to introduce guidelines for Finnish businesses doing better localization in China. Conclusion is while narrowing down to specific culture, general cross-cultural UI design principles need to be modified

    Faster Matrix Multiplication via Asymmetric Hashing

    Full text link
    Fast matrix multiplication is one of the most fundamental problems in algorithm research. The exponent of the optimal time complexity of matrix multiplication is usually denoted by ω\omega. This paper discusses new ideas for improving the laser method for fast matrix multiplication. We observe that the analysis of higher powers of the Coppersmith-Winograd tensor [Coppersmith & Winograd 1990] incurs a "combination loss", and we partially compensate for it using an asymmetric version of CW's hashing method. By analyzing the eighth power of the CW tensor, we give a new bound of ω<2.37188\omega<2.37188, which improves the previous best bound of ω<2.37286\omega<2.37286 [Alman & Vassilevska Williams 2020]. Our result breaks the lower bound of 2.37252.3725 in [Ambainis, Filmus & Le Gall 2015] because of the new method for analyzing component (constituent) tensors.Comment: 67 page

    Dynamic "Succincter"

    Full text link
    Augmented B-trees (aB-trees) are a broad class of data structures. The seminal work "succincter" by Patrascu showed that any aB-tree can be stored using only two bits of redundancy, while supporting queries to the tree in time proportional to its depth. It has been a versatile building block for constructing succinct data structures, including rank/select data structures, dictionaries, locally decodable arithmetic coding, storing balanced parenthesis, etc. In this paper, we show how to "dynamize" an aB-tree. Our main result is the design of dynamic aB-trees (daB-trees) with branching factor two using only three bits of redundancy (with the help of lookup tables that are of negligible size in applications), while supporting updates and queries in time polynomial in its depth. As an application, we present a dynamic rank/select data structure for nn-bit arrays, also known as a dynamic fully indexable dictionary (FID). It supports updates and queries in O(logn/loglogn)O(\log n/\log\log n) time, and when the array has mm ones, the data structure occupies log(nm)+O(n/2log0.199n) \log\binom{n}{m} + O(n/2^{\log^{0.199}n}) bits. Note that the update and query times are optimal even without space constraints due to a lower bound by Fredman and Saks. Prior to our work, no dynamic FID with near-optimal update and query times and redundancy o(n/logn)o(n/\log n) was known. We further show that a dynamic sequence supporting insertions, deletions and rank/select queries can be maintained in (optimal) O(logn/loglogn)O(\log n/\log\log n) time and with O(npolyloglogn/log2n)O(n \cdot \text{poly}\log\log n/\log^2 n) bits of redundancy.Comment: 33 pages, 1 figure; in FOCS 202

    Dynamic Dictionary with Subconstant Wasted Bits per Key

    Full text link
    Dictionaries have been one of the central questions in data structures. A dictionary data structure maintains a set of key-value pairs under insertions and deletions such that given a query key, the data structure efficiently returns its value. The state-of-the-art dictionaries [Bender, Farach-Colton, Kuszmaul, Kuszmaul, Liu 2022] store nn key-value pairs with only O(nlog(k)n)O(n \log^{(k)} n) bits of redundancy, and support all operations in O(k)O(k) time, for klognk \leq \log^* n. It was recently shown to be optimal [Li, Liang, Yu, Zhou 2023b]. In this paper, we study the regime where the redundant bits is R=o(n)R=o(n), and show that when RR is at least n/polylognn/\text{poly}\log n, all operations can be supported in O(logn+log(n/R))O(\log^* n + \log (n/R)) time, matching the lower bound in this regime [Li, Liang, Yu, Zhou 2023b]. We present two data structures based on which range RR is in. The data structure for R<n/log0.1nR<n/\log^{0.1} n utilizes a generalization of adapters studied in [Berger, Kuszmaul, Polak, Tidor, Wein 2022] and [Li, Liang, Yu, Zhou 2023a]. The data structure for Rn/log0.1nR \geq n/\log^{0.1} n is based on recursively hashing into buckets with logarithmic sizes.Comment: 46 pages; SODA 202

    Tight Cell-Probe Lower Bounds for Dynamic Succinct Dictionaries

    Full text link
    A dictionary data structure maintains a set of at most nn keys from the universe [U][U] under key insertions and deletions, such that given a query x[U]x \in [U], it returns if xx is in the set. Some variants also store values associated to the keys such that given a query xx, the value associated to xx is returned when xx is in the set. This fundamental data structure problem has been studied for six decades since the introduction of hash tables in 1953. A hash table occupies O(nlogU)O(n\log U) bits of space with constant time per operation in expectation. There has been a vast literature on improving its time and space usage. The state-of-the-art dictionary by Bender, Farach-Colton, Kuszmaul, Kuszmaul and Liu [BFCK+22] has space consumption close to the information-theoretic optimum, using a total of log(Un)+O(nlog(k)n) \log\binom{U}{n}+O(n\log^{(k)} n) bits, while supporting all operations in O(k)O(k) time, for any parameter klognk \leq \log^* n. The term O(log(k)n)=O(loglogkn)O(\log^{(k)} n) = O(\underbrace{\log\cdots\log}_k n) is referred to as the wasted bits per key. In this paper, we prove a matching cell-probe lower bound: For U=n1+Θ(1)U=n^{1+\Theta(1)}, any dictionary with O(log(k)n)O(\log^{(k)} n) wasted bits per key must have expected operational time Ω(k)\Omega(k), in the cell-probe model with word-size w=Θ(logU)w=\Theta(\log U). Furthermore, if a dictionary stores values of Θ(logU)\Theta(\log U) bits, we show that regardless of the query time, it must have Ω(k)\Omega(k) expected update time. It is worth noting that this is the first cell-probe lower bound on the trade-off between space and update time for general data structures.Comment: 35 page

    On the Perturbation Function of Ranking and Balance for Weighted Online Bipartite Matching

    Get PDF
    Ranking and Balance are arguably the two most important algorithms in the online matching literature. They achieve the same optimal competitive ratio of 1-1/e for the integral version and fractional version of online bipartite matching by Karp, Vazirani, and Vazirani (STOC 1990) respectively. The two algorithms have been generalized to weighted online bipartite matching problems, including vertex-weighted online bipartite matching and AdWords, by utilizing a perturbation function. The canonical choice of the perturbation function is f(x) = 1-e^{x-1} as it leads to the optimal competitive ratio of 1-1/e in both settings. We advance the understanding of the weighted generalizations of Ranking and Balance in this paper, with a focus on studying the effect of different perturbation functions. First, we prove that the canonical perturbation function is the unique optimal perturbation function for vertex-weighted online bipartite matching. In stark contrast, all perturbation functions achieve the optimal competitive ratio of 1-1/e in the unweighted setting. Second, we prove that the generalization of Ranking to AdWords with unknown budgets using the canonical perturbation function is at most 0.624 competitive, refuting a conjecture of Vazirani (2021). More generally, as an application of the first result, we prove that no perturbation function leads to the prominent competitive ratio of 1-1/e by establishing an upper bound of 1-1/e-0.0003. Finally, we propose the online budget-additive welfare maximization problem that is intermediate between AdWords and AdWords with unknown budgets, and we design an optimal 1-1/e competitive algorithm by generalizing Balance

    Listing 6-Cycles

    Full text link
    Listing copies of small subgraphs (such as triangles, 44-cycles, small cliques) in the input graph is an important and well-studied problem in algorithmic graph theory. In this paper, we give a simple algorithm that lists tt (non-induced) 66-cycles in an nn-node undirected graph in O~(n2+t)\tilde O(n^2+t) time. This nearly matches the fastest known algorithm for detecting a 66-cycle in O(n2)O(n^2) time by Yuster and Zwick (1997). Previously, a folklore O(n2+t)O(n^2+t)-time algorithm was known for the task of listing 44-cycles.Comment: 10 pages; SOSA 202

    On the Perturbation Function of Ranking and Balance for Weighted Online Bipartite Matching

    Full text link
    Ranking and Balance are arguably the two most important algorithms in the online matching literature. They achieve the same optimal competitive ratio of 11/e1-1/e for the integral version and fractional version of online bipartite matching by Karp, Vazirani, and Vazirani (STOC 1990) respectively. The two algorithms have been generalized to weighted online bipartite matching problems, including vertex-weighted online bipartite matching and AdWords, by utilizing a perturbation function. The canonical choice of the perturbation function is f(x)=1ex1f(x)=1-e^{x-1} as it leads to the optimal competitive ratio of 11/e1-1/e in both settings. We advance the understanding of the weighted generalizations of Ranking and Balance in this paper, with a focus on studying the effect of different perturbation functions. First, we prove that the canonical perturbation function is the \emph{unique} optimal perturbation function for vertex-weighted online bipartite matching. In stark contrast, all perturbation functions achieve the optimal competitive ratio of 11/e1-1/e in the unweighted setting. Second, we prove that the generalization of Ranking to AdWords with unknown budgets using the canonical perturbation function is at most 0.6240.624 competitive, refuting a conjecture of Vazirani (2021). More generally, as an application of the first result, we prove that no perturbation function leads to the prominent competitive ratio of 11/e1-1/e by establishing an upper bound of 11/e0.00031-1/e-0.0003. Finally, we propose the online budget-additive welfare maximization problem that is intermediate between AdWords and AdWords with unknown budgets, and we design an optimal 11/e1-1/e competitive algorithm by generalizing Balance.Comment: Conference version to appear at the European Symposium on Algorithms (ESA 2023). 16 pages, 2 figures, 8 pages appendi
    corecore