Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1347082acmconferencesBook PagePublication PagessodaConference Proceedingsconference-collections
SODA '08: Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms
2008 Proceeding
  • Program Chair:
  • Shang-Hua Teng
Publisher:
  • Society for Industrial and Applied Mathematics
  • 3600 University City Science Center Philadelphia, PA
  • United States
Conference:
SODA08: 19th ACM-SIAM Symposium on Discrete Algorithms San Francisco California January 20 - 22, 2008
Published:
20 January 2008
Sponsors:
SIAM Activity Group on Discrete Mathematics, SIGACT
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 01 Jan 2025Bibliometrics
Abstract

No abstract available.

research-article
Fast dimension reduction using Rademacher series on dual BCH codes
Pages 1–9

The Fast Johnson-Lindenstrauss Transform (FJLT) was recently discovered by Ailon and Chazelle as a novel technique for performing fast dimension reduction with small distortion from ℓd2 to ℓd2 in time O(max{d log d,k3}). For k in [Ω(log d), O(d1/2)] ...

research-article
Estimators and tail bounds for dimension reduction in lα (0 < α ≤ 2) using stable random projections
Pages 10–19

The method of stable random projections is popular in data stream computations, data mining, information retrieval, and machine learning, for efficiently computing the lα (0 < α ≤ 2) distances using a small (memory) space, in one pass of the data.

We ...

research-article
A deterministic sub-linear time sparse fourier algorithm via non-adaptive compressed sensing methods
Pages 20–29

We study the problem of estimating the best B term Fourier representation for a given frequency-sparse signal (i.e., vector) A of length N > B. More precisely, we investigate how to deterministically identify B of the largest magnitude frequencies of Â, ...

research-article
Explicit constructions for compressed sensing of sparse signals
Pages 30–33

Over the recent years, a new approach for obtaining a succinct approximate representation of n-dimensional vectors (or signals) has been discovered. For any signal x, the succinct representation of x is equal to Ax, where A is a carefully chosen R x n ...

research-article
Improved distance sensitivity oracles via random sampling
Pages 34–43

We present improved oracles for the distance sensitivity problem. The goal is to preprocess a graph G = (V,E) with non-negative edge weights to answer queries of the form: what is the length of the shortest path from x to y that does not go through some ...

research-article
Strongly polynomial and fully combinatorial algorithms for bisubmodular function minimization
Pages 44–53

Bisubmodular functions are a natural "directed", or "signed", extension of submodular functions with several applications. Recently Fujishige and Iwata showed how to extend the Iwata, Fleischer, and Fujishige (IFF) algorithm for submodular function ...

research-article
Holographic algorithms with unsymmetric signatures
Pages 54–63

Holographic algorithms were introduced by Valiant as a new methodology to derive polynomial time algorithms. Here information and computation are represented by exponential sums using the so-called signatures. These signatures express superpositions of ...

research-article
The UGC hardness threshold of the ℓp Grothendieck problem
Pages 64–73

For p ≥ 2 we consider the problem of, given an n × n matrix A = (aij) whose diagonal entries vanish, approximating in polynomial time the number {display equation} (where optimization is taken over real numbers).

When p = 2 this is simply the problem of ...

extended-abstract
Succinct approximate convex pareto curves
Pages 74–83

We study the succinct approximation of convex Pareto curves of multiobjective optimization problems. We propose the concept of ε-convex Pareto (ε-CP) set as the appropriate one for the convex setting, and observe that it can offer arbitrarily more ...

research-article
Efficient reductions among lattice problems
Pages 84–93

We give various deterministic polynomial time reductions among approximation problems on point lattices. Our reductions are both efficient and robust, in the sense that they preserve the rank of the lattice and approximation factor achieved. Our main ...

research-article
Delaunay graphs of point sets in the plane with respect to axis-parallel rectangles
Pages 94–101

Given a point set P in the plane, the Delaunay graph with respect to axis-parallel rectangles is a graph defined on the vertex set P, whose two points p,qP are connected by an edge if and only if there is a rectangle parallel to the coordinate axes ...

research-article
Greedy drawings of triangulations
Pages 102–111

Greedy Routing is a class of routing algorithms in which the packets are forwarded in a manner that reduces the distance to the destination at every step. In an attempt to provide theoretical guarantees for a class of greedy routing algorithms, ...

research-article
Maintaining deforming surface meshes
Pages 112–121

We present a method to maintain a mesh approximating a deforming surface, which is specified by a dense set of sample points. We identify a reasonable motion model for which a provably good surface mesh can be maintained. Our algorithm determines the ...

research-article
Exact and efficient 2D-arrangements of arbitrary algebraic curves
Pages 122–131

We show how to compute the planar arrangement induced by segments of arbitrary algebraic curves with the Bentley-Ottmann sweep-line algorithm. The necessary geometric primitives reduce to cylindrical algebraic decompositions of the plane for one or two ...

research-article
On properties of random dissections and triangulations
Pages 132–141

In the past decades the Gn,p model of random graphs, introduced by Erdős and Rényi in the 60's, has led to numerous beautiful and deep theorems. A key feature that is used in basically all proofs is that edges in Gn,p appear independently. The ...

research-article
Graph algorithms for biological systems analysis
Pages 142–151

The post-genomic era has witnessed an explosion in the quality, quantity and variety of biological data---sequence, structure, and networks. However, when building computational models on these data, some abstractions recur often. In particular, graph-...

research-article
Adaptive local ratio
Pages 152–160

Local Ratio is a well-known paradigm for designing approximation algorithms for combinatorial optimization problems. At a very high level, a local ratio algorithm first decomposes the input weight function w into a positive linear combination of simpler ...

research-article
Two-phase greedy algorithms for some classes of combinatorial linear programs
Pages 161–166

We present greedy algorithms for some classes of combinatorial packing and cover problems within the general formal framework of Hoffman and Schwartz' lattice polyhedra. Our algorithms compute in a first phase Monge solutions for the associated dual ...

research-article
Analysis of greedy approximations with nonsubmodular potential functions
Pages 167–175

In this paper, we present two techniques to analyze greedy approximation with nonsubmodular functions restricted submodularity and shifted submodularity. As an application of the restricted submodularity, we present a worst-case analysis of a greedy ...

research-article
Yet another algorithm for dense max cut: go greedy
Pages 176–182

We study dense instances of MaxCut and its generalizations. Following a long list of existing, diverse and often sophisticated approximation schemes, we propose taking the naïve greedy approach; we prove that when the vertices are considered in random ...

research-article
Computing large matchings fast
Pages 183–192

In this paper we present algorithms for computing large matchings in 3-regular graphs, graphs with maximum degree 3, and 3-connected planar graphs. The algorithms give a guarantee on the size of the computed matching and take linear or slightly ...

research-article
A fractional model of the border gateway protocol (BGP)
Pages 193–199

The Border Gateway Protocol (BGP) is the interdomain routing protocol used to exchange routing information between Autonomous Systems (ASes) in the internet today. While intradomain routing protocols such as RIP are basically distributed algorithms for ...

research-article
Minimizing average latency in oblivious routing
Pages 200–207

We consider the problem of minimizing average latency cost while obliviously routing traffic in a network with linear latency functions. This is roughly equivalent to minimizing the function Σe(load(e))2, where for a network link e, load(e) denotes the ...

research-article
Distributed broadcast in unknown radio networks
Pages 208–217

We consider the problem of broadcasting in an unknown radio network modeled as a directed graph G = (V, E), where |V| = n. In unknown networks, every node knows only its own label, while it is unaware of any other parameter of the network, included its ...

research-article
The power of memory in randomized broadcasting
Pages 218–227

In this paper we analyze the runtime and number of message transmissions generated by simple randomized broadcasting algorithms in random-like networks, and show that an apparently minor change in the ability of the nodes implies an exponential decrease ...

research-article
Competitive queue management for latency sensitive packets
Pages 228–237

We consider the online problem of non-preemptive queue management. An online sequence of packets arrive, each of which has an associated intrinsic value. Packets can be accepted to a FIFO queue, or discarded. The profit gained by transmitting a packet ...

research-article
Rapid mixing of Gibbs sampling on graphs that are sparse on average
Pages 238–247

Gibbs sampling also known as Glauber dynamics is a popular technique for sampling high dimensional distributions defined on graphs. Of special interest is the behavior of Gibbs sampling on the Erdös-Rényi random graph G(n, d/n), where each edge is ...

research-article
Product growth and mixing in finite groups
Pages 248–257

We prove the following inequality on the convolution of distributions over a finite group G: {display equation} where X, Y are probability distributions over G, the * denotes convolution, U the uniform distribution over G, and || · || the l2-norm; n is ...

research-article
Concatenated codes can achieve list-decoding capacity
Pages 258–267

We prove that binary linear concatenated codes with an outer algebraic code (specifically, a folded Reed-Solomon code) and independently and randomly chosen linear inner codes achieve the list-decoding capacity with high probability. In particular, for ...

research-article
Noisy sorting without resampling
Pages 268–276

In this paper we study noisy sorting without re-sampling. In this problem there is an unknown order {display equation} where π is a permutation on n elements. The input is the status of (n2) queries of the form q(ai, aj), for i < j, where q(ai, aj) = + (...

Contributors
  • University of Southern California

Recommendations

Acceptance Rates

Overall Acceptance Rate 411 of 1,322 submissions, 31%
YearSubmittedAcceptedRate
SODA '1549513728%
SODA '1044513530%
SODA '0738213936%
Overall1,32241131%