Results 1  10
of
494
A 7/8Approximation Algorithm for MAX 3SAT? (Extended Abstract)
, 1997
"... Howard Karloff Uri Zwick April 28, 1997 Modified: August 17, 1997 Abstract We describe a randomized approximation algorithm which takes an instance of MAX 3SAT as input. ..."
Abstract
 Add to MetaCart
Howard Karloff Uri Zwick April 28, 1997 Modified: August 17, 1997 Abstract We describe a randomized approximation algorithm which takes an instance of MAX 3SAT as input.
Privacy Preserving Auctions and Mechanism Design
, 1999
"... We suggest an architecture for executing protocols for auctions and, more generally, mechanism design. Our goal is to preserve the privacy of the inputs of the participants (so that no nonessential information about them is divulged, even a posteriori) while maintaining communication and computation ..."
Abstract

Cited by 250 (13 self)
 Add to MetaCart
We suggest an architecture for executing protocols for auctions and, more generally, mechanism design. Our goal is to preserve the privacy of the inputs of the participants (so that no nonessential information about them is divulged, even a posteriori) while maintaining communication and computational efficiency. We achieve this goal by adding another party  the auction issuer  that generates the programs for computing the auctions but does not take an active part in the protocol. The auction issuer is not a trusted party, but is assumed not to collude with the auctioneer. In the case of auctions, barring collusion between the auctioneer and the auction issuer, neither party gains any information about the bids, even after the auction is over. Moreover, bidders can verify that the auction was performed correctly. The protocols do not require any communication between the bidders and the auction issuer and the computational efficiency is very reasonable. This architecture can be used to implement any mechanism design where the important factor is the complexity of the decision procedure.
The Complexity of Mean Payoff Games on Graphs
 THEORETICAL COMPUTER SCIENCE
, 1996
"... We study the complexity of finding the values and optimal strategies of mean payoff games on graphs, a family of perfect information games introduced by Ehrenfeucht and Mycielski and considered by Gurvich, Karzanov and Khachiyan. We describe a pseudopolynomial time algorithm for the solution of suc ..."
Abstract

Cited by 148 (4 self)
 Add to MetaCart
We study the complexity of finding the values and optimal strategies of mean payoff games on graphs, a family of perfect information games introduced by Ehrenfeucht and Mycielski and considered by Gurvich, Karzanov and Khachiyan. We describe a pseudopolynomial time algorithm for the solution of such games, the decision problem for which is in NP " coNP. Finally, we describe a polynomial reduction from mean payoff games to the simple stochastic games studied by Condon. These games are also known to be in NP " coNP, but no polynomial or pseudopolynomial time algorithm is known for them.
Reachability and Distance Queries via 2Hop Labels
, 2002
"... Reachability and distance queries in graphs are fundamental to numerous applications, ranging from geographic navigation systems to Internet routing. Some of these applications involve huge graphs and yet require fast query answering. We propose a new data structure for representing all distances in ..."
Abstract

Cited by 142 (1 self)
 Add to MetaCart
Reachability and distance queries in graphs are fundamental to numerous applications, ranging from geographic navigation systems to Internet routing. Some of these applications involve huge graphs and yet require fast query answering. We propose a new data structure for representing all distances in a graph. The data structure is distributed in the sense that it may be viewed as assigning labels to the vertices, such that a query involving vertices u and v may be answered using only the labels of u and v.
Modern cryptography, probabilistic proofs and pseudorandomness, volume 17 of Algorithms and Combinatorics
, 1999
"... all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that new copies bear this notice and the full citation on the first page. Abstracting with credit is permitted. IIPreface You can start by put ..."
Abstract

Cited by 131 (13 self)
 Add to MetaCart
all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that new copies bear this notice and the full citation on the first page. Abstracting with credit is permitted. IIPreface You can start by putting the do not disturb sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fascinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat interwoven domains (i.e., cryptography, proofs and randomness). Modern Cryptography. Whereas classical cryptography was confined to
A new approach to the minimum cut problem
 Journal of the ACM
, 1996
"... Abstract. This paper presents a new approach to finding minimum cuts in undirected graphs. The fundamental principle is simple: the edges in a graph’s minimum cut form an extremely small fraction of the graph’s edges. Using this idea, we give a randomized, strongly polynomial algorithm that finds th ..."
Abstract

Cited by 126 (9 self)
 Add to MetaCart
Abstract. This paper presents a new approach to finding minimum cuts in undirected graphs. The fundamental principle is simple: the edges in a graph’s minimum cut form an extremely small fraction of the graph’s edges. Using this idea, we give a randomized, strongly polynomial algorithm that finds the minimum cut in an arbitrarily weighted undirected graph with high probability. The algorithm runs in O(n 2 log 3 n) time, a significant improvement over the previous Õ(mn) time bounds based on maximum flows. It is simple and intuitive and uses no complex data structures. Our algorithm can be parallelized to run in �� � with n 2 processors; this gives the first proof that the minimum cut problem can be solved in ���. The algorithm does more than find a single minimum cut; it finds all of them. With minor modifications, our algorithm solves two other problems of interest. Our algorithm finds all cuts with value within a multiplicative factor of � of the minimum cut’s in expected Õ(n 2 � ) time, or in �� � with n 2 � processors. The problem of finding a minimum multiway cut of a graph into r pieces is solved in expected Õ(n 2(r�1) ) time, or in �� � with n 2(r�1) processors. The “trace ” of the algorithm’s execution on these two problems forms a new compact data structure for representing all small cuts and all multiway cuts in a graph. This data structure can be efficiently transformed into the
Finding and counting given length cycles
 Algorithmica
, 1997
"... We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected graphs. Most of the bounds obtained depend solely on the number of edges in the graph in question, and not on the number of vertices. The bounds obtained improve upon various previ ..."
Abstract

Cited by 124 (12 self)
 Add to MetaCart
We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected graphs. Most of the bounds obtained depend solely on the number of edges in the graph in question, and not on the number of vertices. The bounds obtained improve upon various previously known results. 1
Approximation Algorithms for Constraint Satisfaction Problems Involving at Most Three Variables per Constraint
 In Proceedings of the 9th Annual ACMSIAM Symposium on Discrete Algorithms
, 1997
"... An instance of MAX 3CSP is a collection of m clauses of the form f i (z i1 ; z i2 ; z i3 ), where the z ij 's are literals, or constants, from the set f0; 1; x 1 ; : : : ; xn ; x 1 ; : : : ; xng, and the f i 's are arbitrary Boolean functions depending on (at most) three variables. Eac ..."
Abstract

Cited by 92 (6 self)
 Add to MetaCart
generalization of the MAX 3SAT problem. (In an instance of the MAX 3SAT problem f i (z i1 ; z i2 ; z i3 ) = z i1 z i2 z i3 for every i.) Karloff and Zwick have recently obtained a 8 approximation algorithm for MAX 3SAT. Their algorithm is based on a new semidefinite relaxation of the problem. Hastad
Measuring Beliefs in an Experimental Lost Wallet Game
 Games and Economic Behavior
, 2000
"... this paper, which was initially titled "Efficiency, Reciprocity, and Expectations in an Experimental Game," while we were both at the CentER for Economic Research at Tilburg University. We thank Eric van Damme for his advice, Gary Bolton, Doug DeJong, Werner Guth, Jos Jansen, Jan Potters, ..."
Abstract

Cited by 116 (17 self)
 Add to MetaCart
this paper, which was initially titled "Efficiency, Reciprocity, and Expectations in an Experimental Game," while we were both at the CentER for Economic Research at Tilburg University. We thank Eric van Damme for his advice, Gary Bolton, Doug DeJong, Werner Guth, Jos Jansen, Jan Potters, Ariel Rubinstein, and Oded Stark for
A 7/8Approximation Algorithm for MAX 3SAT?
 IN PROCEEDINGS OF THE 38TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE
, 1997
"... We describe a randomized approximation algorithm which takes an instance of MAX 3SAT as input. If the instancea collection of clauses each of length at most threeis satisfiable, then the expected weight of the assignment found is at least 7=8 of optimal. We provide strong evidence (but not a p ..."
Abstract

Cited by 112 (10 self)
 Add to MetaCart
We describe a randomized approximation algorithm which takes an instance of MAX 3SAT as input. If the instancea collection of clauses each of length at most threeis satisfiable, then the expected weight of the assignment found is at least 7=8 of optimal. We provide strong evidence (but not a proof) that the algorithm performs equally well on arbitrary MAX 3SAT instances. Our algorithm uses semidefinite programming and may be seen as a sequel to the MAXCUT algorithm of Goemans and Williamson and the MAX 2SAT algorithm of Feige and Goemans. Though the algorithm itself is fairly simple, its analysis is quite complicated as it involves the computation of volumes of spherical tetrahedra. Hastad has recently shown that, assuming P != NP , no polynomialtime algorithm for MAX 3SAT can achieve a performance ratio exceeding 7=8, even when restricted to satisfiable instances of the problem. Our algorithm is therefore optimal in this sense. We also describe a method of obtaining direct semi...
Results 1  10
of
494