Results 1  10
of
14
The Computational Complexity of Propositional STRIPS Planning
 Artificial Intelligence
, 1994
"... I present several computational complexity results for propositional STRIPS planning, i.e., STRIPS planning restricted to ground formulas. Different planning problems can be defined by restricting the type of formulas, placing limits on the number of pre and postconditions, by restricting negation ..."
Abstract

Cited by 293 (3 self)
 Add to MetaCart
I present several computational complexity results for propositional STRIPS planning, i.e., STRIPS planning restricted to ground formulas. Different planning problems can be defined by restricting the type of formulas, placing limits on the number of pre and postconditions, by restricting negation in pre and postconditions, and by requiring optimal plans. For these types of restrictions, I show when planning is tractable (polynomial) and intractable (NPhard) . In general, it is PSPACEcomplete to determine if a given planning instance has any solutions. Extremely severe restrictions on both the operators and the formulas are required to guarantee polynomial time or even NPcompleteness. For example, when only ground literals are permitted, determining plan existence is PSPACEcomplete even if operators are limited to two preconditions and two postconditions. When definite Horn ground formulas are permitted, determining plan existence is PSPACEcomplete even if operators are limited t...
Studies in Secure Multiparty Computation and Applications
, 1996
"... Consider a set of parties who do not trust each other, nor the channels by which they communicate. Still, the parties wish to correctly compute some common function of their local inputs, while keeping their local data as private as possible. This, in a nutshell, is the problem of secure multiparty ..."
Abstract

Cited by 76 (8 self)
 Add to MetaCart
Consider a set of parties who do not trust each other, nor the channels by which they communicate. Still, the parties wish to correctly compute some common function of their local inputs, while keeping their local data as private as possible. This, in a nutshell, is the problem of secure multiparty computation. This problem is fundamental in cryptography and in the study of distributed computations. It takes many different forms, depending on the underlying network, on the function to be computed, and on the amount of distrust the parties have in each other and in the network. We study several aspects of secure multiparty computation. We first present new definitions of this problem in various settings. Our definitions draw from previous ideas and formalizations, and incorporate aspects that were previously overlooked. Next we study the problem of dealing with adaptive adversaries. (Adaptive adversaries are adversaries that corrupt parties during the course of the computation, based on...
Linear Time 1/2Approximation Algorithm for Maximum Weighted Matching in General Graphs
 IN GENERAL GRAPHS, SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, STACS 99
, 1998
"... A new approximation algorithm for maximum weighted matching in general edgeweighted graphs is presented. It calculates a matching with an edge weight of at least 1/2 of the edge weight of a maximum weighted matching. Its time complexity is O(E), with E being the number of edges in the graph. T ..."
Abstract

Cited by 36 (0 self)
 Add to MetaCart
A new approximation algorithm for maximum weighted matching in general edgeweighted graphs is presented. It calculates a matching with an edge weight of at least 1/2 of the edge weight of a maximum weighted matching. Its time complexity is O(E), with E being the number of edges in the graph. This improves over the previously known 1/2approximation algorithms for maximum weighted matching which require O(E log(V)) steps, where V is the number of vertices.
Quality Matching and Local Improvement for Multilevel GraphPartitioning
, 1999
"... Multilevel strategies have proven to be very powerful approaches in order to partition graphs efficiently. Their efficiency is dominated by two parts; the coarsening and the local improvement strategies. Several methods have been developed to solve these problems, but their efficiency has only been ..."
Abstract

Cited by 29 (9 self)
 Add to MetaCart
Multilevel strategies have proven to be very powerful approaches in order to partition graphs efficiently. Their efficiency is dominated by two parts; the coarsening and the local improvement strategies. Several methods have been developed to solve these problems, but their efficiency has only been proven on an experimental basis. In this paper we present new and efficient methods for both problems, while satisfying certain quality measurements. For the coarsening part we develop a new approximation algorithm for maximum weighted matching in general edgeweighted graphs. It calculates a matching with an edge weight of at least 1 2 of the edge weight of a maximum weighted matching. Its time complexity is O(jEj), with jEj being the number of edges in the graph. Furthermore, we use the HelpfulSet strategy for the local improvement of partitions. For partitioning graphs with a regular degree of 2k into 2 parts, it guarantees an upper bound of k\Gamma1 2 jV j + 1 on the cut size of th...
A Comprehensive Study of the Complexity of Multiparty Interaction
 Journal of the ACM
, 1996
"... A multiparty interaction is a set of I/O actions executed jointly by a number of processes, each of which must be ready to execute its own action for any of the actions in the set to occur. An attempt to participate in an interaction delays a process until all other participants are available. Altho ..."
Abstract

Cited by 26 (8 self)
 Add to MetaCart
A multiparty interaction is a set of I/O actions executed jointly by a number of processes, each of which must be ready to execute its own action for any of the actions in the set to occur. An attempt to participate in an interaction delays a process until all other participants are available. Although a relatively new concept, the multiparty interaction has found its way into a number of distributed programming languages and algebraic models of concurrency. In this paper, we present a taxonomy of languages for multiparty interaction that covers all proposals of which we are aware. Based on this taxonomy, we then present a comprehensive analysis of the computational complexity of the multiparty interaction scheduling problem, the problem of scheduling multiparty interactions in a given execution environment. 1 Introduction A multiparty interaction is a set of I/O actions executed jointly by a number of processes, each of which must be ready to execute its own action for any of the act...
Reducing Randomness Via Irrational Numbers
 In Proceedings of the TwentyNinth Annual ACM Symposium on Theory of Computing
, 1997
"... . We propose a general methodology for testing whether a given polynomial with integer coefficients is identically zero. The methodology evaluates the polynomial at efficiently computable approximations of suitable irrational points. In contrast to the classical technique of DeMillo, Lipton, Schwart ..."
Abstract

Cited by 24 (0 self)
 Add to MetaCart
. We propose a general methodology for testing whether a given polynomial with integer coefficients is identically zero. The methodology evaluates the polynomial at efficiently computable approximations of suitable irrational points. In contrast to the classical technique of DeMillo, Lipton, Schwartz, and Zippel, this methodology can decrease the error probability by increasing the precision of the approximations instead of using more random bits. Consequently, randomized algorithms that use the classical technique can generally be improved using the new methodology. To demonstrate the methodology, we discuss two nontrivial applications. The first is to decide whether a graph has a perfect matching in parallel. Our new NC algorithm uses fewer random bits while doing less work than the previously best NC algorithm by Chari, Rohatgi, and Srinivasan. The second application is to test the equality of two multisets of integers. Our new algorithm improves upon the previously best algorithms ...
A Simplified Realization of the HopcroftKarp Approach to Maximum Matching in General Graphs
, 1999
"... In [2, 3], we have reduced the problem of finding an augmenting path in a general graph to a reachability problem in a directed, bipartite graph, and we have shown that a slight modification of depthfirst search leads to an algorithm for finding such paths. This new point of view enables us to ..."
Abstract

Cited by 8 (2 self)
 Add to MetaCart
In [2, 3], we have reduced the problem of finding an augmenting path in a general graph to a reachability problem in a directed, bipartite graph, and we have shown that a slight modification of depthfirst search leads to an algorithm for finding such paths. This new point of view enables us to give a simplified realization of the HopcroftKarp approach for the computation of a maximum cardinality matching in general graphs. We show, how to get an O(n+ m) implementation of one phase leading to an O( p nm) algorithm for the computation of a maximum cardinality matching in general graphs.
Finite Domain Constraint Satisfaction Using Quantum Computation
 PROCEEDINGS OF THE 27TH INTERNATIONAL SYMPOSIUM MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE MFCS’2002
, 2002
"... We present a quantum algorithm for finite domain constraint solving, where the constraints have arity 2. It is complete and runs in O((dd=2e) ) time, where d is size of the domain of the variables and n the number of variables. For the case of d = 3 we provide a method to obtain an upper time ..."
Abstract

Cited by 6 (0 self)
 Add to MetaCart
We present a quantum algorithm for finite domain constraint solving, where the constraints have arity 2. It is complete and runs in O((dd=2e) ) time, where d is size of the domain of the variables and n the number of variables. For the case of d = 3 we provide a method to obtain an upper time bound of O(8 ). Also for d = 5 the upper bound has been improved. Using this method in a slightly different way we can decide 3colourability in O(1:2185 ) time.
Computing Fair and Bottleneck Matchings in Geometric Graphs
 In Proceedings of the 7th International Symposium on Algorithms and Computation
, 1996
"... Let A and B be two sets of n points in the plane, and let M be a (onetoone) matching between A and B. Let min(M ), max(M ), and \Sigma(M ) denote the length of the shortest edge, the length of the longest edge, and the sum of the lengths of the edges of M respectively. The uniform matching prob ..."
Abstract

Cited by 5 (1 self)
 Add to MetaCart
Let A and B be two sets of n points in the plane, and let M be a (onetoone) matching between A and B. Let min(M ), max(M ), and \Sigma(M ) denote the length of the shortest edge, the length of the longest edge, and the sum of the lengths of the edges of M respectively. The uniform matching problem (also called the balanced assignment problem, or the fair matching problem) is to find M U , a matching that minimizes max(M ) \Gamma min(M ). A minimum deviation matching M D is a matching that minimizes (1=n)\Sigma(M ) \Gamma min(M ). We present algorithms for computing M U and M D in roughly O(n 10=3 ) time. These algorithms are more efficient than the previous O(n 4 )time algorithms of Martello and Toth [19] and Gupta and Punnen [11], who studied these problems for general bipartite graphs. We also consider the (nonbipartite version of the) Euclidean bottleneck matching problem in higher dimensions. We extend the planar results of Chang et al. [4] and Su and Chang [22], and show that given a set A of 2n points in dspace, it is possible to compute a bottleneck matching of A in roughly O(n 3=2 ) time, for d 6, and in subquadratic time, for any fixed dimension d. School of Mathematical Sciences, TelAviv University, TelAviv 69982, Israel. alone@cs.tau.ac.il y Department of Computer Science, Utrecht University, P.O.Box 80.089, 3508 TB Utrecht, The Netherlands. matya@cs.ruu.nl 0
Simple Competitive Request Scheduling Strategies
 in 11th ACM Symposium on Parallel Architectures and Algorithms
, 1999
"... In this paper we study the problem of scheduling realtime requests in distributed data servers. We assume the time to be divided into time steps of equal length called rounds. During every round a set of requests arrives at the system, and every resource is able to fulfill one request per round. Ev ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
In this paper we study the problem of scheduling realtime requests in distributed data servers. We assume the time to be divided into time steps of equal length called rounds. During every round a set of requests arrives at the system, and every resource is able to fulfill one request per round. Every request specifies two (distinct) resources and requires to get access to one of them. Furthermore, every request has a deadline of d, i.e. a request that arrives in round t has to be fulfilled during round t +d 1 at the latest. The number of requests which arrive during some round and the two alternative resources of every request are selected by an adversary. The goal is to maximize the number of requests that are fulfilled before their deadlines expire. We examine the scheduling problem in an online setting, i.e. new requests continuously arrive at the system, and we have to determine online an assignment of the requests to the resources in such a way that every resource has to fulfil...