Results 1  10
of
29
A PolynomialTime Approximation Algorithm for the Permanent of a Matrix with NonNegative Entries
 Journal of the ACM
, 2004
"... Abstract. We present a polynomialtime randomized algorithm for estimating the permanent of an arbitrary n ×n matrix with nonnegative entries. This algorithm—technically a “fullypolynomial randomized approximation scheme”—computes an approximation that is, with high probability, within arbitrarily ..."
Abstract

Cited by 438 (26 self)
 Add to MetaCart
Abstract. We present a polynomialtime randomized algorithm for estimating the permanent of an arbitrary n ×n matrix with nonnegative entries. This algorithm—technically a “fullypolynomial randomized approximation scheme”—computes an approximation that is, with high probability, within arbitrarily small specified relative error of the true value of the permanent. Categories and Subject Descriptors: F.2.2 [Analysis of algorithms and problem complexity]: Nonnumerical
Limits on the Provable Consequences of Oneway Permutations
, 1989
"... We present strong evidence that the implication, "if oneway permutations exist, then secure secret key agreement is possible" is not provable by standard techniques. Since both sides of this implication are widely believed true in real life, to show that the implication is false requir ..."
Abstract

Cited by 205 (0 self)
 Add to MetaCart
We present strong evidence that the implication, "if oneway permutations exist, then secure secret key agreement is possible" is not provable by standard techniques. Since both sides of this implication are widely believed true in real life, to show that the implication is false requires a new model. We consider a world where dl parties have access to a black box or a randomly selected permutation. Being totally random, this permutation will be strongly oneway in provable, informationthevretic way. We show that, if P = NP, no protocol for secret key agreement is secure in such setting. Thus, to prove that a secret key greement protocol which uses a oneway permutation as a black box is secure is as hrd as proving F NP. We also obtain, as corollary, that there is an oracle relative to which the implication is false, i.e., there is a oneway permutation, yet secretexchange is impossible. Thus, no technique which relativizes can prove that secret exchange can be based on any oneway permutation. Our results present a general framework for proving statements of the form, "Cryptographic application X is not likely possible based solely on complexity assumption Y." 1
On Counting Independent Sets in Sparse Graphs
, 1998
"... We prove two results concerning approximate counting of independent sets in graphs with constant maximum degree \Delta. The first implies that the Monte Carlo Markov chain technique is likely to fail if \Delta 6. The second shows that no fully polynomial randomized approximation scheme can exist if ..."
Abstract

Cited by 86 (13 self)
 Add to MetaCart
We prove two results concerning approximate counting of independent sets in graphs with constant maximum degree \Delta. The first implies that the Monte Carlo Markov chain technique is likely to fail if \Delta 6. The second shows that no fully polynomial randomized approximation scheme can exist if \Delta 25, unless RP = NP. 1 Introduction Counting independent sets in graphs is one of several combinatorial counting problems which have received recent attention. The problem is known to be #Pcomplete, even for low degree graphs [3]. On the other hand, it has been shown that, for graphs of maximum degree \Delta = 4, randomized approximate counting is possible [7, 3]. This success has been achieved using the Monte Carlo Markov chain method to construct a fully polynomial randomized approximation scheme (fpras). This has led to a natural question as to how far this success might extend. Here we consider in more detail this question of counting independent sets in graphs with constant m...
Oracles and Queries that are Sufficient for Exact Learning
 Journal of Computer and System Sciences
, 1996
"... We show that the class of all circuits is exactly learnable in randomized expected polynomial time using weak subset and weak superset queries. This is a consequence of the following result which we consider to be of independent interest: circuits are exactly learnable in randomized expected poly ..."
Abstract

Cited by 85 (5 self)
 Add to MetaCart
We show that the class of all circuits is exactly learnable in randomized expected polynomial time using weak subset and weak superset queries. This is a consequence of the following result which we consider to be of independent interest: circuits are exactly learnable in randomized expected polynomial time with equivalence queries and the aid of an NPoracle. We also show that circuits are exactly learnable in deterministic polynomial time with equivalence queries and a \Sigma 3 oracle. The hypothesis class for the above learning algorithms is the class of circuits of largerbut polynomially relatedsize. Also, the algorithms can be adapted to learn the class of DNF formulas with hypothesis class consisting of depth3  formulas (by the work of Angluin [A90], this is optimal in the sense that the hypothesis class cannot be reduced to DNF formulas, i.e. depth2  formulas).
OneWay Functions are Essential for NonTrivial ZeroKnowledge(Extended Abstract)
 IN PROC. 2ND ISRAEL SYMP. ON THEORY OF COMPUTING AND SYSTEMS (ISTCS93), IEEE COMPUTER
, 1993
"... It was known that if oneway functions exist, then there are zeroknowledge proofs for every language in PSPACE. We prove that unless very weak oneway functions exist, ZeroKnowledge proofs can be given only for languages in BPP. For averagecase definitions of BPP we prove an analogous result und ..."
Abstract

Cited by 44 (12 self)
 Add to MetaCart
It was known that if oneway functions exist, then there are zeroknowledge proofs for every language in PSPACE. We prove that unless very weak oneway functions exist, ZeroKnowledge proofs can be given only for languages in BPP. For averagecase definitions of BPP we prove an analogous result under the assumption that uniform oneway functions do not exist. Thus, very loosely speaking, zeroknowledge is either useless (exists only for "easy" languages), or universal (exists for every provable language).
Limits on the Provable Consequences of Oneway Functions
, 1989
"... This technical point will prevent the reader from suspecting any measuretheoretic fallacy. ..."
Abstract

Cited by 38 (2 self)
 Add to MetaCart
This technical point will prevent the reader from suspecting any measuretheoretic fallacy.
Uniform Generation of NPwitnesses using an NPoracle
 Information and Computation
, 1997
"... A Uniform Generation procedure for NP is an algorithm which given any input in a fixed NPlanguage, outputs a uniformly distributed NPwitness for membership of the input in the language. We present a Uniform Generation procedure for NP that runs in probabilistic polynomialtime with an NPoracle. T ..."
Abstract

Cited by 30 (1 self)
 Add to MetaCart
A Uniform Generation procedure for NP is an algorithm which given any input in a fixed NPlanguage, outputs a uniformly distributed NPwitness for membership of the input in the language. We present a Uniform Generation procedure for NP that runs in probabilistic polynomialtime with an NPoracle. This improves upon results of Jerrum, Valiant and Vazirani, which either require a \Sigma P 2 oracle or obtain only almost uniform generation. Our procedure utilizes ideas originating in the works of Sipser, Stockmeyer, and Jerrum, Valiant and Vazirani. Dept. of Computer Science & Engineering, University of California at San Diego, 9500 Gilman Drive, La Jolla, California 92093, USA. EMail: mihir@cs.ucsd.edu. URL: http://wwwcse.ucsd.edu/users/mihir. Supported in part by NSF CAREER Award CCR9624439 and a 1996 Packard Foundation Fellowship in Science and Engineering. y Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel. EMail: oded@wis...
A mildly exponential time algorithm for approximating the number of solutions to a multidimensional knapsack problem
, 2006
"... ..."
Expected Solution Quality
 In Proceedings of the 14th International Joint Conference on Artificial Intelligence
, 1995
"... This paper presents the Expected Solution Quality (esq) method for statistically characterizing scheduling problems and the performance of schedulers. The esq method is demonstrated by applying it to a practical telescope scheduling problem. The method addresses the important and difficult issue of ..."
Abstract

Cited by 9 (2 self)
 Add to MetaCart
This paper presents the Expected Solution Quality (esq) method for statistically characterizing scheduling problems and the performance of schedulers. The esq method is demonstrated by applying it to a practical telescope scheduling problem. The method addresses the important and difficult issue of how to meaningfully evaluate the performance of a scheduler on a constrained optimization problem for which an optimal solution is not known. At the heart of esq is a Monte Carlo algorithm that estimates a problem's probability density function with respect to solution quality. This "quality density function" provides a useful characterization of a scheduling problem, and it also provides a background against which scheduler performance can be meaningfully evaluated. esq provides a unitless measure that combines both schedule quality and the amount of time to generate a schedule. 1 Introduction This paper presents a method for statistically characterizing both scheduling problems and the p...