Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2008
Balanced outcomes in social exchange networks
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 295–304https://doi.org/10.1145/1374376.1376994The study of bargaining has a long history, but many basic settings are still rich with unresolved questions. In particular, consider a set of agents who engage in bargaining with one another,but instead of pairs of agents interacting in isolation,...
- research-articleMay 2008
Additive guarantees for degree bounded directed network design
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 769–778https://doi.org/10.1145/1374376.1374486We present polynomial-time approximation algorithms for some degree-bounded directed network design problems. Our main result is for intersecting supermodular connectivity with degree bounds: given a directed graph G=(V,E) with non-negative edge-costs, ...
- research-articleMay 2008
Additive approximation for bounded degree survivable network design
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 759–768https://doi.org/10.1145/1374376.1374485We study a general network design problem with additional degree constraints. Given connectivity requirements ruv for all pairs of vertices, a Steiner network is a graph in which there are at least ruv edge-disjoint paths between u and v for all pairs ...
- research-articleMay 2008
Optimal query complexity bounds for finding graphs
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 749–758https://doi.org/10.1145/1374376.1374484We consider the problem of finding an unknown graph by using two types of queries with an additive property. Given a graph, an additive query asks the number of edges in a set of vertices while a cross-additive query asks the number of edges crossing ...
- research-articleMay 2008
Hardness-randomness tradeoffs for bounded depth arithmetic circuits
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 741–748https://doi.org/10.1145/1374376.1374482In this paper we show that lower bounds for bounded depth arithmetic circuits imply derandomization of polynomial identity testing for bounded depth arithmetic circuits. More formally, if there exists an explicit polynomial f(x1,...,xm) that cannot be ...
-
- research-articleMay 2008
Algebrization: a new barrier in complexity theory
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 731–740https://doi.org/10.1145/1374376.1374481Any proof of P!=NP will have to overcome two barriers: relativization and natural proofs. Yet over the last decade, we have seen circuit lower bounds (for example, that PP does not have linear-size circuits) that overcome both barriers simultaneously. ...
- research-articleMay 2008
On the constant-depth complexity of k-clique
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 721–730https://doi.org/10.1145/1374376.1374480We prove a lower bound of ω(nk/4) on the size of constant-depth circuits solving the k-clique problem on n-vertex graphs (for every constant k). This improves a lower bound of ω(nk/89d2) due to Beame where d is the circuit depth. Our lower bound has the ...
- research-articleMay 2008
Elusive functions and lower bounds for arithmetic circuits
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 711–720https://doi.org/10.1145/1374376.1374479A basic fact in linear algebra is that the image of the curve f(x)=(x1,x2,x3,...,xm), say over C, is not contained in any m-1 dimensional affine subspace of Cm. In other words, the image of f is not contained in the image of any polynomial-mapping Γ:Cm-...
- research-articleMay 2008
Towards an optimal separation of space and length in resolution
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 701–710https://doi.org/10.1145/1374376.1374478Most state-of-the-art satisfiability algorithms today are variants of the DPLL procedure augmented with clause learning. The main bottleneck for such algorithms, other than the obvious one of time, is the amount of memory used. In the field of proof ...
- research-articleMay 2008
Stateless distributed gradient descent for positive linear programs
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 691–700https://doi.org/10.1145/1374376.1374476We develop a framework of distributed and stateless solutions for packing and covering linear programs, which are solved by multiple agents operating in a cooperative but uncoordinated manner. Our model has a separate "agent" controlling each variable ...
- research-articleMay 2008
Multi-armed bandits in metric spaces
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 681–690https://doi.org/10.1145/1374376.1374475In a multi-armed bandit problem, an online algorithm chooses from a set of strategies in a sequence of $n$ trials so as to maximize the total payoff of the chosen strategies. While the performance of bandit algorithms with a small finite strategy set is ...
- research-articleMay 2008
A discriminative framework for clustering via similarity functions
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 671–680https://doi.org/10.1145/1374376.1374474Problems of clustering data from pairwise similarity information are ubiquitous in Computer Science. Theoretical treatments typically view the similarity information as ground-truth and then design algorithms to (approximately) optimize various graph-...
- research-articleMay 2008
Communication in the presence of replication
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 661–670https://doi.org/10.1145/1374376.1374472We consider the following problem. Suppose that a big amount of data is distributed among several parties, so that each party misses only few pieces of data. The parties wish to perform some global computation on the data while minimizing the ...
- research-articleMay 2008
Sketching in adversarial environments
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 651–660https://doi.org/10.1145/1374376.1374471We formalize a realistic model for computations over massive data sets. The model, referred to as the {\em adversarial sketch model}, unifies the well-studied sketch and data stream models together with a cryptographic flavor that considers the ...
- research-articleMay 2008
Robust lower bounds for communication and stream computation
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 641–650https://doi.org/10.1145/1374376.1374470We study the communication complexity of evaluating functions when the input data is randomly allocated (according to some known distribution) amongst two or more players, possibly with information overlap. This naturally extends previously studied ...
- research-articleMay 2008
On agnostic boosting and parity learning
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 629–638https://doi.org/10.1145/1374376.1374466The motivating problem is agnostically learning parity functions, i.e., parity with arbitrary or adversarial noise. Specifically, given random labeled examples from an *arbitrary* distribution, we would like to produce an hypothesis whose accuracy ...
- research-articleMay 2008
Evolvability from learning algorithms
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 619–628https://doi.org/10.1145/1374376.1374465Valiant has recently introduced a framework for analyzing the capabilities and the limitations of the evolutionary process of random change guided by selection. In his framework the process of acquiring a complex functionality is viewed as a ...
- research-articleMay 2008
A learning theory approach to non-interactive database privacy
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 609–618https://doi.org/10.1145/1374376.1374464We demonstrate that, ignoring computational constraints, it is possible to release privacy-preserving databases that are useful for all queries over a discretized domain from any given concept class with polynomial VC-dimension. We show a new lower ...
- research-articleMay 2008
Direct product theorems for classical communication complexity via subdistribution bounds: extended abstract
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 599–608https://doi.org/10.1145/1374376.1374462A basic question in complexity theory is whether the computational resources required for solving k independent instances of the same problem scale as k times the resources required for one instance. We investigate this question in various models of ...
- research-articleMay 2008
Hardness amplification proofs require majority
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 589–598https://doi.org/10.1145/1374376.1374461Hardness amplification is the fundamental task of converting a δ-hard function f : (0, 1)n -> (0, 1) into a (1/2-ε)-hard function Amp(f), where f is γ-hard if small circuits fail to compute f on at least a γ fraction of the inputs. Typically, ε,δ are ...