Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3039686acmconferencesBook PagePublication PagessodaConference Proceedingsconference-collections
SODA '17: Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms
2017 Proceeding
Publisher:
  • Society for Industrial and Applied Mathematics
  • 3600 University City Science Center Philadelphia, PA
  • United States
Conference:
SODA '17: Symposium on Discrete Algorithms Barcelona Spain January 16 - 19, 2017
Published:
16 January 2017
Sponsors:
SIAM Activity Group on Discrete Mathematics, SIGACT

Reflects downloads up to 04 Oct 2024Bibliometrics
Skip Abstract Section
Abstract

The papers in this volume were presented at the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, held January 16--19, 2017 in Barcelona. The Symposium was jointly sponsored by SIGACT (the ACM Special Interest Group on Algorithms and Computation Theory) and by the SIAM Activity Group on Discrete Mathematics.

research-article
Proximity in the age of distraction: robust approximate nearest neighbor search
Pages 1–15

We introduce a new variant of the nearest neighbor search problem, which allows for some coordinates of the dataset to be arbitrarily corrupted or unknown. Formally, given a dataset of n points P = {x1, . . . , xn} in high-dimensions, and a parameter k, ...

research-article
High-dimensional approximate r-nets
Pages 16–30

The construction of r-nets offers a powerful tool in computational and metric geometry. We focus on high-dimensional spaces and present a new randomized algorithm which efficiently computes approximate r-nets with respect to Euclidean distance. For any ...

research-article
A framework for similarity search with space-time tradeoffs using locality-sensitive filtering
Pages 31–46

We present a framework for similarity search based on Locality-Sensitive Filtering (LSF), generalizing the Indyk-Motwani (STOC 1998) Locality-Sensitive Hashing (LSH) framework to support space-time tradeoffs. Given a family of filters, defined as a ...

research-article
Optimal hashing-based time-space trade-offs for approximate near neighbors
Pages 47–66

We show tight upper and lower bounds for time-space trade-offs for the c-approximate Near Neighbor Search problem. For the d-dimensional Euclidean space and n-point datasets, we develop a data structure with space n1+ρu+o(1) + O(dn) and query time nρq+o(...

research-article
LSH forest: practical algorithms made theoretical
Pages 67–78

We analyze LSH Forest [BCG05]---a popular heuristic for the nearest neighbor search---and show that a careful yet simple modification of it outperforms "vanilla" LSH algorithms. The end result is the first instance of a simple, practical algorithm that ...

research-article
Faster approximation schemes for the two-dimensional knapsack problem
Pages 79–98

An important question in theoretical computer science is to determine the best possible running time for solving a problem at hand. For geometric optimization problems, we often understand their complexity on a rough scale, but not very well on a finer ...

research-article
Split packing: an algorithm for packing circles with optimal worst-case density
Pages 99–109

In the classic circle packing problem, one asks whether a given set of circles can be packed into the unit square. This problem is known to be NP-hard. In this paper, we present a new sufficient condition using only the circles' combined area: It is ...

research-article
Stochastic k-center and j-flat-center problems
Pages 110–129

Solving geometric optimization problems over uncertain data has become increasingly important in many applications and has attracted a lot of attentions in recent years. In this paper, we study two important geometric optimization problems, the k-center ...

research-article
Local search for max-sum diversification
Pages 130–142

We provide simple and fast polynomial-time approximation schemes (PTASs) for several variants of the max-sum diversification problem which, in its most basic form, is as follows: given n points p1, . . . , pn ∈ ℝq and an integer k, select k points such ...

research-article
Maximum scatter TSP in doubling metrics
Pages 143–153

We study the problem of finding a tour of n points in which every edge is long. More precisely, we wish to find a tour that visits every point exactly once, maximizing the length of the shortest edge in the tour. The problem is known as Maximum Scatter ...

research-article
Matrix balancing in Lp norms: bounding the convergence rate of osborne's iteration
Pages 154–169

We study an iterative matrix conditioning algorithm due to Osborne (1960). The goal of the algorithm is to convert a square matrix into a balanced matrix where every row and corresponding column have the same norm. The original algorithm was proposed ...

research-article
Decidability of the membership problem for 2 × 2 integer matrices
Pages 170–186

The main result of this paper is the decidability of the membership problem for 2 × 2 nonsingular integer matrices. Namely, we will construct the first algorithm that for any nonsingular 2 × 2 integer matrices M1, . . . , Mn and M decides whether M ...

research-article
The identity problem for matrix semigroups in SL2(ℤ) is NP-complete
Pages 187–206

In this paper, we show that the problem of determining if the identity matrix belongs to a finitely generated semigroup of 2 × 2 matrices from the modular group PSL2(ℤ) and thus the Special Linear group SL2(ℤ) is solvable in NP. From this fact, we can ...

research-article
Exploring an infinite space with finite memory scouts
Pages 207–224

Consider a small number of scouts exploring the infinite d-dimensional grid with the aim of hitting a hidden target point. Each scout is controlled by a probabilistic finite automaton that determines its movement (to a neighboring grid point) based on ...

research-article
Universal shape replicators via self-assembly with attractive and repulsive forces
Pages 225–238

We show how to design a universal shape replicator in a self-assembly system with both attractive and repulsive forces. More precisely, we show that there is a universal set of constant-size objects that, when added to any unknown hole-free polyomino ...

research-article
Parameter-free locality sensitive hashing for spherical range reporting
Pages 239–256

We present a data structure for spherical range reporting on a point set S, i.e., reporting all points in S that lie within radius r of a given query point q (with a small probability of error). Our solution builds upon the Locality-Sensitive Hashing (...

research-article
Distance sensitive bloom filters without false negatives
Pages 257–269

A Bloom filter is a widely used data-structure for representing a set S and answering queries of the form "Is x in S?". By allowing some false positive answers (saying 'yes' when the answer is in fact 'no') Bloom filters use space significantly below ...

research-article
Optimal approximate polytope membership
Pages 270–288

In the polytope membership problem, a convex polytope K in ℝd is given, and the objective is to preprocess K into a data structure so that, given a query point q ∈ ℝd, it is possible to determine efficiently whether qK. We consider this problem in an ...

research-article
Massively-parallel similarity join, edge-isoperimetry, and distance correlations on the hypercube
Pages 289–306

We study distributed protocols for finding all pairs of similar vectors in a large dataset. Our results pertain to a variety of discrete metrics, and we give concrete instantiations for Hamming distance. In particular, we give improved upper bounds on ...

research-article
Even delta-matroids and the complexity of planar boolean CSPs
Pages 307–326

The main result of this paper is a generalization of the classical blossom algorithm for finding perfect matchings. Our algorithm can efficiently solve Boolean CSPs where each variable appears in exactly two constraints (we call it edge CSP) and all ...

research-article
Linear diophantine equations, group CSPs, and graph isomorphism
Pages 327–339

In recent years, we have seen several approaches to the graph isomorphism problem based on "generic" mathematical programming or algebraic (Gröbner basis) techniques. For most of these, lower bounds have been established. In fact, it has been shown that ...

research-article
Robust algorithms with polynomial loss for near-unanimity CSPs
Pages 340–357

An instance of the Constraint Satisfaction Problem (CSP) is given by a family of constraints on overlapping sets of variables, and the goal is to assign values from a fixed domain to the variables so that all constraints are satisfied. In the ...

research-article
Parameterized algorithms for constraint satisfaction problems above average with global cardinality constraints
Pages 358–377

Given a constraint satisfaction problem (CSP) on n variables, x1, x2, . . . , xn ∈ {±1}, and m constraints, a global cardinality constraint has the form of Σni = 1 xi = (1 − 2p)n, where p ∈ (Ω(1), 1 − Ω(1)) and pn is an integer. Let AV G be the expected ...

research-article
Hardness of permutation pattern matching
Pages 387–396

Permutation Pattern Matching (or PPM) is a decision problem whose input is a pair of permutations π and τ, represented as sequences of integers, and the task is to determine whether τ contains a subsequence order-isomorphic to π. Bose, Buss and Lubiw ...

research-article
pBWT: achieving succinct data structures for parameterized pattern matching and related problems
Pages 397–407

The fields of succinct data structures and compressed text indexing have seen quite a bit of progress over the last two decades. An important achievement, primarily using techniques based on the Burrows-Wheeler Transform (BWT), was obtaining the full ...

research-article
Space-efficient construction of compressed indexes in deterministic linear time
Pages 408–424

We show that the compressed suffix array and the compressed suffix tree of a string T can be built in O(n) deterministic time using O(n log σ) bits of space, where n is the string length and σ is the alphabet size. Previously described deterministic ...

research-article
Sparse suffix tree construction in optimal time and space
Pages 425–439

Suffix tree (and the closely related suffix array) are fundamental structures capturing all substrings of a given text essentially by storing all its suffixes in the lexicographical order. In some applications, such as sparse text indexing, we work with ...

research-article
Fully dynamic all-pairs shortest paths with worst-case update-time revisited
Pages 440–452

We revisit the classic problem of dynamically maintaining shortest paths between all pairs of nodes of a directed weighted graph. The allowed updates are insertions and deletions of nodes and their incident edges. We give worst-case guarantees on the ...

research-article
Deterministic partially dynamic single source shortest paths for sparse graphs
Pages 453–469

In this paper we consider the decremental single-source shortest paths (SSSP) problem, where given a graph G and a source node s the goal is to maintain shortest paths between s and all other nodes in G under a sequence of online adversarial edge ...

research-article
Fully dynamic approximate maximum matching and minimum vertex cover in O(log3 n) worst case update time
Pages 470–489

We consider the problem of maintaining an approximately maximum (fractional) matching and an approximately minimum vertex cover in a dynamic graph. Starting with the seminal paper by Onak and Rubinfeld [STOC 2010], this problem has received significant ...

Contributors
  • Brown University

Index Terms

  1. Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Acceptance Rates

        Overall Acceptance Rate 411 of 1,322 submissions, 31%
        YearSubmittedAcceptedRate
        SODA '1549513728%
        SODA '1044513530%
        SODA '0738213936%
        Overall1,32241131%