No abstract available.
Proceeding Downloads
Combinatorial optimization with rational objective functions
Let A be the problem of minimizing c1x1+...+cnxn subject to certain constraints on x=(x1,...,xn), and let B be the problem of minimizing (a0+a1x1+...+anxn)/(b0+b1x1+...+bnxn) subject to the same constraints, assuming the denominator is always positive. ...
Maximization problems on graphs with edge weights chosen from a normal distribution (Extended Abstract)
we consider optimization problems on complete graphs with edge weights chosen from identical but independent normal distributions. We show some very general techniques for obtaining upper and lower bounds on the asymptotic behavior of these problems. ...
A representation for linear lists with movable fingers
This paper describes a data structure which is useful for representing linear lists when the pattern of accesses to a list exhibits a (perhaps time-varying) locality of reference. The structure has many of the properties of the representation proposed ...
The macro model for data compression (Extended Abstract)
A general model for data compression is presented which includes most data compression systems in the literature as special cases. All macro schemes are based on the principle of finding redundant strings or patterns and replacing them by pointers to a ...
The subgraph homeomorphism problem
We investigate the problem of finding a homeomorphic image of a “pattern” graph H in a larger input graph G. We view this problem as finding specified sets of edge disjoint or node disjoint paths in G. Our main result is a linear time algorithm to ...
On the nlog n isomorphism technique (A Preliminary Report)
Tarjan has given an algorithm for deciding isomorphism of two groups of order n (given as multiplication tables) which runs in O(n(log2n+O(1)) steps where n is the order of the groups. Tarjan uses the fact that a group of n is generated by log n ...
Exact and approximate membership testers
In this paper we consider the question of how much space is needed to represent a set. Given a finite universe U and some subset V (called the vocabulary), an exact membership tester is a procedure that for each element s in U determines if s is in V. ...
Tree transducers, L systems and two-way machines (Extended Abstract)
This extended abstract is a condensed version of the results presented in two technical reports ([16] and [13]). In [16] a systematic treatment of the relationships between parallel rewriting systems (top-down tree transducer, ETOL system) and two-way ...
Operational and semantic equivalence between recursive programs.
In this paper, we show that two widely different notions of program equivalence coincide for the language of recursive definitions with simplification rules. The first one is the now classical equivalence for fixed-point semantics. The other one is ...
A new solution to the critical section problem
A classical problem in concurrent program control is to provide a mechanism whereby several processes running concurrently can gain exclusive control of a resource. For each process, the section of its program in which it accesses the resource is called ...
A unified approach to models of synchronous parallel machines
A number of different models of synchronous, unbounded parallel computers have appeared in recent literature. Without exception, running time on these models has been shown to be polynomially related to the classical space complexity measure. The ...
Computability theory in admissible domains
Denotational semantics was introduced by Strachey as a means of defining semantics of programming languages. It's mathematical foundation was justified by Scott [14] in 1969 when he introduced continuous lattices to model data types and showed how to ...
On formulating simultaneity for studying parallelism and synchronization
When studying parallel computation and synchronization one is faced with the problem of modeling the simultaneous execution of processes. Although there has been a multitude of formal means for representing such problems [2, 6, 9, 10, 13, 14, 15], ...
Parallelism in random access machines
A model of computation based on random access machines operating in parallel and sharing a common memory is presented. The computational power of this model is related to that of traditional models. In particular, deterministic parallel RAM's can accept ...
Data type specification: Parameterization and the power of specification techniques
This paper extends our earlier work on abstract data types by providing an algebraic treatment of parametrized data types (e.g., sets-of-(), stacks-of-(), etc.), as well as answering a number of questions on the power and limitations of algebraic ...
An efficient algorithm for determining whether a cubic graph is toroidal
The algorithm of the title is presented. It runs in time bounded by a polynomial in the number of the edges of the graph.
Switching functions whose monotone complexity
A sequence of monotone switching functions fn:{0,1}n →{0,1}n is constructed, such that the monotone complexity of fn grows faster than O(n2-ε) for any ε>O. Previously the best lower bounds of this nature were several O(n3/2) bounds due to Pratt, ...
Straight-line program length as a parameter for complexity measures
This paper represents a continuation of work in [LBI] and [LB2] directed toward the development of a unified, relative model for complexity theory. The earlier papers establish a simple, natural and fairly general model, and demonstrated its ...
Computational complexity of computing polynomials over the fields of real and complex numbers
Fast computation of polynomials of 1 variable in the fields R and C of real and complex numbers is considered. The optimal schemes of computation with preconditioning (that is, the schemes involving the minimal number of arithmetic operations without ...
Optimal evaluation of pairs of bilinear forms
A large class of multiplication problems in arithmetic complexity can be viewed as the simultaneous evaluation of a set of bilinear forms. This class includes the multiplication of matrices, polynomials, quaternions, Cayley and complex numbers. ...
Algorithms for edge coloring bipartite graphs
A minimum edge coloring of a bipartite graph is a partition of the edges into Δ matchings, where Δ is the maximum degree in the graph. Coloring algorithms are presented that use time O(min(¦E¦ Δ log n, ¦E¦ @@@@n log n, n2log Δ)) and space O(nΔ). This ...
On the parallel evaluation of multivariate polynomials
We prove that any multivariate polynomial P of degree d that can be computed with C(P) multiplications-divisions can be computed in O(log d.log C(P)) parallel steps and O(log d) parallel multiplicative steps.
Time-space tradeoffs for computing functions, using connectivity properties of their circuits
Recent research has investigated time-space tradeoffs for register allocation strategies of certain fixed sets of expressions. This paper is concerned with the time-space tradeoff for register allocation strategies of any set of expressions which ...
An NP-complete number-theoretic problem
Systems of nonlinear equations of the form D: Ay = σ.(x), where A is an m×n matrix of rational constants and y = (Y1,...,yn), σ(x) = (σ1(x),..., σm (x)) are column vectors are considered. Each σi(x) is of the form ri(x) or @@@@ri(x)@@@@, where ri(x) is ...
The complexity of satisfiability problems
The problem of deciding whether a given propositional formula in conjunctive normal form is satisfiable has been widely studied. I t is known that, when restricted to formulas having only two literals per clause, this problem has an efficient (...
Coping with errors in binary search procedures (Preliminary Report)
We consider the problem of identifying an unknown value xε{1,2,...,n} using only comparisons of x to constants when as many as E of 'the comparisons may receive erroneous answers. For a continuous analogue of this problem we show that there is a unique ...
On time-space classes and their relation to the theory of real addition
A new lower bound on the computational complexity of the theory of real addition and several related theories is established: any decision procedure for these theories requires either space 2εn or nondeterministic time 2εn2 for some constant ε > O and ...
On the completeness of a generalized matching problem
A perfect matching in a graph H may be viewed as a collection of subgraphs of H, each of which is isomorphic to K2, whose vertex sets partition the vertex set of H. This is naturally generalized by replacing K2 by an arbitrary graph G. We show that if G ...
Propositional representation of arithmetic proofs (Preliminary Version)
Equations f@@@@ = g@@@@ between polynomial time computable functions can be represented by sets of propositional formulas. If f@@@@ = g@@@@ is provable in certain arithmetic systems, then polynomial length proofs of the representing formulas exist in ...
Node-and edge-deletion NP-complete problems
If π is a graph property, the general node(edge) deletion problem can be stated as follows: Find the minimum number of nodes(edges), whose deletion results in a subgraph satisfying property π. In this paper we show that if π belongs to a rather broad ...
Index Terms
- Proceedings of the tenth annual ACM symposium on Theory of computing
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
STOC '15 | 347 | 93 | 27% |
STOC '14 | 319 | 91 | 29% |
STOC '13 | 360 | 100 | 28% |
STOC '11 | 304 | 84 | 28% |
STOC '08 | 325 | 80 | 25% |
STOC '03 | 270 | 80 | 30% |
STOC '02 | 287 | 91 | 32% |
STOC '01 | 230 | 83 | 36% |
STOC '00 | 182 | 85 | 47% |
STOC '98 | 169 | 75 | 44% |
STOC '97 | 211 | 75 | 36% |
STOC '96 | 201 | 74 | 37% |
STOC '89 | 196 | 56 | 29% |
STOC '88 | 192 | 53 | 28% |
STOC '87 | 165 | 50 | 30% |
STOC '80 | 125 | 47 | 38% |
STOC '79 | 111 | 37 | 33% |
STOC '78 | 120 | 38 | 32% |
STOC '77 | 87 | 31 | 36% |
STOC '76 | 83 | 30 | 36% |
STOC '75 | 87 | 31 | 36% |
STOC '74 | 95 | 35 | 37% |
STOC '71 | 50 | 23 | 46% |
STOC '70 | 70 | 27 | 39% |
Overall | 4,586 | 1,469 | 32% |