Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/28395.28414acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Imperfect random sources and discrete controlled processes

Published: 01 January 1987 Publication History

Abstract

We consider a simple model for a class of discrete control processes, motivated in part by recent work about the behavior of imperfect random sources in computer algorithms. The process produces a string of characters from {0, 1} of length n and is a “success” or “failure” depending on whether the string produced belongs to a prespecified set L. In an uninfluenced process each character is chosen by a fair coin toss, and hence the probability of success is |L|/2n. We are interested in the effect on the probability of success in the presence of a player (controller) who can intervene in the process by specifying the value of certain characters in the string. We answer the following questions in both worst and average case: (1) how much can the player increase the probability of success given a fixed number of interventions? (2) in terms of |L| what is the expected number of interventions needed to guarantee success? In particular our results imply that if |L|/2n = 1/w(n) where w(n) tends to infinity with n (so the probability of success with no interventions is o(1)) then with Ο(√nlogw(n)) interventions the probability of success is 1-o(1).
Our main results and the proof techniques are related to a well-known theorem of Kruskal, Katona, and Harper in extremal set theory.

References

[1]
N. Aton and M. O. Rabin, manuscript MiT 1985.
[2]
M. Ben-Or and N. Linial, Collective Coin Flipping, robust voting schemes and minimal of Banzhaf values, Proceedings of the 2$th Annual IEEE Symposium on Foundations of Computer Science, 1985, 408-416.
[3]
B. Chor and O. Goldreich, Unbiased bits from sources of weak randomness and probabilistie communication complexity, Proceedings of the 26th Annual {EEE Symposium on Foundations of Computer Science, 1985, 429-442.
[4]
D. E. Daykin, Ordered ranked posets, repre,~entations of integers and inequalities from extremal ranked posets, in Graphs and Order (I. Rival, ed.), D. Reidel Publishing, 1985, 395-412.
[5]
C. Greene and D. J. Kleitman, Proof techniques in the theory of finite sets, in Studies in Combinatorics (G.-C. Rota, ed.), .MAA Studies i:n Mathematics, Vol. 17, 1978, 22-79.
[6]
L. Harper, Optimal numberings and isoperimetric problems on graphs, J. Comb. Th. 1 (1966), 385-393.
[7]
G. Katona, A theorem for finite sets, in Theory of Graphs (P. Erdos and G. Katona, eds.), Hungarian Academy of Science, Budapest, 1966, 187-207.
[8]
J. B. Kruskal, The number of simplices in a complex, in Mathematical Optimization Techniques (R. Bellman, ed.), University of California Press, Berkeley, 1963, 251-278.
[9]
M. Saks, A robust noncryptographic protocol for collective coin flipping, preprint.
[10]
M. Santha and U. V. Vazirani, Generating quasi random sequences from slightly random sources, Proceedings of the 25th Annual IEEE Symposium on the Foundations of Computer Science, 1984, 434-440.
[11]
U.V. Vazirani, Towards a strong communication complexity theory or generating quasirandom sequences from two communicating; slightly-random sources, Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985, 366-378.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '87: Proceedings of the nineteenth annual ACM symposium on Theory of computing
January 1987
471 pages
ISBN:0897912217
DOI:10.1145/28395
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 1987

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC87
Sponsor:

Acceptance Rates

STOC '87 Paper Acceptance Rate 50 of 165 submissions, 30%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)70
  • Downloads (Last 6 weeks)20
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2015)End-to-End Verifiable Elections in the Standard ModelAdvances in Cryptology - EUROCRYPT 201510.1007/978-3-662-46803-6_16(468-498)Online publication date: 14-Apr-2015
  • (1994)On randomization in sequential and distributed algorithmsACM Computing Surveys10.1145/174666.17466726:1(7-86)Online publication date: 1-Mar-1994
  • (1991)Simulating BPP using a general weak random sourceProceedings of the 32nd annual symposium on Foundations of computer science10.1109/SFCS.1991.185351(79-89)Online publication date: 1-Sep-1991
  • (1990)General weak random sourcesProceedings of the 31st Annual Symposium on Foundations of Computer Science10.1109/FSCS.1990.89574(534-543 vol.2)Online publication date: 22-Oct-1990
  • (1989)Dispersers, deterministic amplification, and weak random sourcesProceedings of the 30th Annual Symposium on Foundations of Computer Science10.1109/SFCS.1989.63449(14-19)Online publication date: 30-Oct-1989

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media