Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2008
Additive approximation for bounded degree survivable network design
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 759–768https://doi.org/10.1145/1374376.1374485We study a general network design problem with additional degree constraints. Given connectivity requirements ruv for all pairs of vertices, a Steiner network is a graph in which there are at least ruv edge-disjoint paths between u and v for all pairs ...
- research-articleMay 2008
Optimal query complexity bounds for finding graphs
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 749–758https://doi.org/10.1145/1374376.1374484We consider the problem of finding an unknown graph by using two types of queries with an additive property. Given a graph, an additive query asks the number of edges in a set of vertices while a cross-additive query asks the number of edges crossing ...
- research-articleMay 2008
On the constant-depth complexity of k-clique
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 721–730https://doi.org/10.1145/1374376.1374480We prove a lower bound of ω(nk/4) on the size of constant-depth circuits solving the k-clique problem on n-vertex graphs (for every constant k). This improves a lower bound of ω(nk/89d2) due to Beame where d is the circuit depth. Our lower bound has the ...
- research-articleMay 2008
Multi-armed bandits in metric spaces
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 681–690https://doi.org/10.1145/1374376.1374475In a multi-armed bandit problem, an online algorithm chooses from a set of strategies in a sequence of $n$ trials so as to maximize the total payoff of the chosen strategies. While the performance of bandit algorithms with a small finite strategy set is ...
- research-articleMay 2008
On agnostic boosting and parity learning
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 629–638https://doi.org/10.1145/1374376.1374466The motivating problem is agnostically learning parity functions, i.e., parity with arbitrary or adversarial noise. Specifically, given random labeled examples from an *arbitrary* distribution, we would like to produce an hypothesis whose accuracy ...
- research-articleMay 2008
Uniform direct product theorems: simplified, optimized, and derandomized
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 579–588https://doi.org/10.1145/1374376.1374460The classical Direct-Product Theorem for circuits says that if a Boolean function f: {0,1}n -> {0,1} is somewhat hard to compute on average by small circuits, then the corresponding k-wise direct product function fk(x1,...,xk)=(f(x1),...,f(xk)) (where ...
- research-articleMay 2008
Agnostically learning decision trees
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 527–536https://doi.org/10.1145/1374376.1374451We give a query algorithm for agnostically learning decision trees with respect to the uniform distribution on inputs. Given black-box access to an *arbitrary* binary function f on the n-dimensional hypercube, our algorithm finds a function that agrees ...
- research-articleMay 2008
The chow parameters problem
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 517–526https://doi.org/10.1145/1374376.1374450In the 2nd Annual FOCS (1961), C. K. Chow proved that every Boolean threshold function is uniquely determined by its degree-0 and degree-1 Fourier coefficients. These numbers became known as the Chow Parameters. Providing an algorithmic version of Chow'...
- research-articleMay 2008
On hardness of learning intersection of two halfspaces
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 345–354https://doi.org/10.1145/1374376.1374426We show that unless NP = RP, it is hard to (even) weakly PAC-learn intersection of two halfspaces in Rn using a hypothesis which is a function of up to l linear threshold functions for any integer l. Specifically, we show that for every integer l and an ...
- research-articleMay 2008
Randomized k-server on hierarchical binary trees
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 227–234https://doi.org/10.1145/1374376.1374411We design a randomized online algorithm for k-server on binary trees with hierarchical edge lengths, with expected competitive ratio O(log Delta), where Delta is the diameter of the metric. This is one of the first k-server algorithms with competitive ...
- research-articleMay 2008
Trapdoors for hard lattices and new cryptographic constructions
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 197–206https://doi.org/10.1145/1374376.1374407We show how to construct a variety of "trapdoor" cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the shortest nonzero vector to within certain polynomial factors). Our contributions ...
- research-articleMay 2008
Network design for vertex connectivity
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 167–176https://doi.org/10.1145/1374376.1374403We study the survivable network design problem (SNDP) for vertex connectivity. Given a graph G(V,E) with costs on edges, the goal of SNDP is to find a minimum cost subset of edges that ensures a given set of pairwise vertex connectivity requirements. ...
- research-articleMay 2008
Minimum k-way cuts via deterministic greedy tree packing
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 159–166https://doi.org/10.1145/1374376.1374402We present a simple and fast deterministic algorithm for the minimum k-way cut problem in a capacitated graph, that is, finding a set of edges with minimum total capacity whose removal splits the graph into at least k components. The algorithm packs O(...
- research-articleMay 2008
An o(log2 k)-approximation algorithm for the k-vertex connected spanning subgraph problem
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 153–158https://doi.org/10.1145/1374376.1374401We present an O(log n• log k)-approximation algorithm for the problem of finding k-vertex connected spanning subgraph of minimum cost, where n is the number of vertices in the input graph, and k is the connectivity requirement. Our algorithm works for ...
- research-articleMay 2008
The complexity of temporal constraint satisfaction problems
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 29–38https://doi.org/10.1145/1374376.1374382A temporal constraint language is a set of relations that has a first-order definition in (b Q,<), the dense linear order of the rational numbers. We present a complete complexity classification of the constraint satisfaction problem (CSP) for temporal ...
- research-articleMay 2008
Sdp gaps and ugc hardness for multiway cut, 0-extension, and metric labeling
STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computingPages 11–20https://doi.org/10.1145/1374376.1374379The connection between integrality gaps and computational hardness of discrete optimization problems is an intriguing question. In recent years, this connection has prominently figured in several tight UGC-based hardness results. We show in this paper a ...