Results 1  10
of
210
The NPcompleteness column: an ongoing guide
 JOURNAL OF ALGORITHMS
, 1987
"... This is the nineteenth edition of a (usually) quarterly column that covers new developments in the theory of NPcompleteness. The presentation is modeled on that used by M. R. Garey and myself in our book "Computers and Intractability: A Guide to the Theory of NPCompleteness," W. H. Freem ..."
Abstract

Cited by 242 (0 self)
 Add to MetaCart
(Show Context)
This is the nineteenth edition of a (usually) quarterly column that covers new developments in the theory of NPcompleteness. The presentation is modeled on that used by M. R. Garey and myself in our book "Computers and Intractability: A Guide to the Theory of NPCompleteness," W. H. Freeman & Co., New York, 1979 (hereinafter referred to as "[G&J]"; previous columns will be referred to by their dates). A background equivalent to that provided by [G&J] is assumed, and, when appropriate, crossreferences will be given to that book and the list of problems (NPcomplete and harder) presented there. Readers who have results they would like mentioned (NPhardness, PSPACEhardness, polynomialtimesolvability, etc.) or open problems they would like publicized, should
Dynamic and efficient key management for access hierarchies
 In Proceedings of the ACM Conference on Computer and Communications Security
, 2005
"... Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered classes (represented as a directed graph). A user with access privileges for a class obtains access to objects stored at that class and all descendant classes in the hierarchy ..."
Abstract

Cited by 119 (7 self)
 Add to MetaCart
Hierarchies arise in the context of access control whenever the user population can be modeled as a set of partially ordered classes (represented as a directed graph). A user with access privileges for a class obtains access to objects stored at that class and all descendant classes in the hierarchy. The problem of key management for such hierarchies then consists of assigning a key to each class in the hierarchy so that keys for descendant classes can be obtained via efficient key derivation. We propose a solution to this problem with the following properties: (1) the space complexity of the public information is the same as that of storing the hierarchy; (2) the private information at a class consists of a single key associated with that class; (3) updates (i.e., revocations and additions) are handled locally in the hierarchy; (4) the scheme is provably secure against collusion; and (5) each node can derive the key of any of its descendant with a number of symmetrickey operations bounded by the length of the path between the nodes. Whereas many previous schemes had some of these properties, ours is the first that satisfies all of them. The security of our scheme is based on pseudorandom functions, without reliance on the Random Oracle Model. 18 Portions of this work were supported by Grants IIS0325345 and CNS06274488 from the
Modular Decomposition and Transitive Orientation
, 1999
"... A module of an undirected graph is a set X of nodes such for each node x not in X, either every member of X is adjacent to x, or no member of X is adjacent to x. There is a canonical linearspace representation for the modules of a graph, called the modular decomposition. Closely related to modular ..."
Abstract

Cited by 111 (12 self)
 Add to MetaCart
A module of an undirected graph is a set X of nodes such for each node x not in X, either every member of X is adjacent to x, or no member of X is adjacent to x. There is a canonical linearspace representation for the modules of a graph, called the modular decomposition. Closely related to modular decomposition is the transitive orientation problem, which is the problem of assigning a direction to each edge of a graph so that the resulting digraph is transitive. A graph is a comparability graph if such an assignment is possible. We give O(n +m) algorithms for modular decomposition and transitive orientation, where n and m are the number of vertices and edges of the graph. This gives linear time bounds for recognizing permutation graphs, maximum clique and minimum vertex coloring on comparability graphs, and other combinatorial problems on comparability graphs and their complements.
Complexity and Algorithms for Reasoning About Time: A GraphTheoretic Approach
, 1992
"... Temporal events are regarded here as intervals on a time line. This paper deals with problems in reasoning about such intervals when the precise topological relationship between them is unknown or only partially specified. This work unifies notions of interval algebras in artificial intelligence ..."
Abstract

Cited by 100 (11 self)
 Add to MetaCart
Temporal events are regarded here as intervals on a time line. This paper deals with problems in reasoning about such intervals when the precise topological relationship between them is unknown or only partially specified. This work unifies notions of interval algebras in artificial intelligence with those of interval orders and interval graphs in combinatorics. The satisfiability, minimal labeling, all solutions and all realizations problems are considered for temporal (interval) data. Several versions are investigated by restricting the possible interval relationships yielding different complexity results. We show that even when the temporal data comprises of subsets of relations based on intersection and precedence only, the satisfiability question is NPcomplete. On the positive side, we give efficient algorithms for several restrictions of the problem. In the process, the interval graph sandwich problem is introduced, and is shown to be NPcomplete. This problem is als...
Utility Representation of an Incomplete Preference Relation
 Journal of Economic Theory
, 2002
"... We consider the problem of representing a (possibly) incomplete preference relation by means of a vectorvalued utility function. Continuous and semicontinuous representation results are reported in the case of preference relations that are, in a sense, not “too incomplete. ” These results generaliz ..."
Abstract

Cited by 65 (6 self)
 Add to MetaCart
We consider the problem of representing a (possibly) incomplete preference relation by means of a vectorvalued utility function. Continuous and semicontinuous representation results are reported in the case of preference relations that are, in a sense, not “too incomplete. ” These results generalize some of the classical utility representation theorems of the theory of individual choice, and paves the way towards developing a consumer theory that realistically allows individuals to exhibit some “indecisiveness ” on occasion.
PARTITION REFINEMENT TECHNIQUES: AN INTERESTING ALGORITHMIC TOOL KIT
 INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE
, 1999
"... ..."
Temporal Constraints: A Survey
, 1998
"... . Temporal Constraint Satisfaction is an information technology useful for representing and answering queries about the times of events and the temporal relations between them. Information is represented as a Constraint Satisfaction Problem (CSP) where variables denote event times and constraints re ..."
Abstract

Cited by 26 (1 self)
 Add to MetaCart
. Temporal Constraint Satisfaction is an information technology useful for representing and answering queries about the times of events and the temporal relations between them. Information is represented as a Constraint Satisfaction Problem (CSP) where variables denote event times and constraints represent the possible temporal relations between them. The main tasks are two: (i) deciding consistency, and (ii) answering queries about scenarios that satisfy all constraints. This paper overviews results on several classes of Temporal CSPs: qualitative interval, qualitative point, metric point, and some of their combinations. Research has progressed along three lines: (i) identifying tractable subclasses, (ii) developing exact search algorithms, and (iii) developing polynomialtime approximation algorithms. Most available techniques are based on two principles: (i) enforcing local consistency (e.g. pathconsistency), and (ii) enhancing naive backtracking search. Keywords: Temporal Constra...
From decision theory to decision aiding methodology (my very personal version of this history and some related reflections)
, 2003
"... ..."
(Show Context)
Degrees of freedom versus dimension for containment orders, Order 5
 Order
, 1988
"... Given a family of sets S, where the sets in S admit k ‘degrees of freedom’, we prove that not all (k + 1)dimensional posets are containment posets of sets in S. Our results depend on the following enumerative result of independent interest: Let P (n, k) denote the number of partially ordered sets o ..."
Abstract

Cited by 23 (2 self)
 Add to MetaCart
(Show Context)
Given a family of sets S, where the sets in S admit k ‘degrees of freedom’, we prove that not all (k + 1)dimensional posets are containment posets of sets in S. Our results depend on the following enumerative result of independent interest: Let P (n, k) denote the number of partially ordered sets on n labeled elements of dimension k. We show that log P (n, k) ∼ nk log n where k is fixed and n is large. KEY WORDS: partially ordered set, containment order, degrees of freedom, partial order dimension AMS SUBJECT CLASSIFICATION: 06A10 (primary), 14N10 (secondary) 1.