[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 13, Issue 3July 2017
Reflects downloads up to 13 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Faster and Simpler Sketches of Valuation Functions
Article No.: 30, Pages 1–9https://doi.org/10.1145/3039871

We present fast algorithms for sketching valuation functions. Let N (|N| = n) be some ground set and v:2N→ R be a function. We say that v˜:2N→ R is an α-sketch of v if for every set S we have that v(S)/α ≤ v˜(S) ≤ v(S) and v˜ can be described in poly(n) ...

research-article
Time vs. Information Tradeoffs for Leader Election in Anonymous Trees
Article No.: 31, Pages 1–41https://doi.org/10.1145/3039870

Leader election is one of the fundamental problems in distributed computing. It calls for all nodes of a network to agree on a single node, called the leader. If the nodes of the network have distinct labels, then agreeing on a single node means that ...

research-article
For-All Sparse Recovery in Near-Optimal Time
Article No.: 32, Pages 1–26https://doi.org/10.1145/3039872

An approximate sparse recovery system in ℓ1 norm consists of parameters k, ϵ, N; an m-by-N measurement Φ; and a recovery algorithm R. Given a vector, x, the system approximates x by xˆ = R(Φ x), which must satisfy ‖ xˆ-x‖1 ≤ (1+ϵ)‖ x - xk1. We consider ...

research-article
Public Access
Algorithmic and Enumerative Aspects of the Moser-Tardos Distribution
Article No.: 33, Pages 1–40https://doi.org/10.1145/3039869

Moser and Tardos have developed a powerful algorithmic approach (henceforth MT) to the Lovász Local Lemma (LLL); the basic operation done in MT and its variants is a search for “bad” events in a current configuration. In the initial stage of MT, the ...

research-article
Nearly Optimal Deterministic Algorithm for Sparse Walsh-Hadamard Transform
Article No.: 34, Pages 1–36https://doi.org/10.1145/3029050

For every fixed constant α > 0, we design an algorithm for computing the k-sparse Walsh-Hadamard transform (i.e., Discrete Fourier Transform over the Boolean cube) of an N-dimensional vector x ∈ RN in time k1 + α(log N)O(1). Specifically, the algorithm ...

research-article
Uniform Kernelization Complexity of Hitting Forbidden Minors
Article No.: 35, Pages 1–35https://doi.org/10.1145/3029051

The F-Minor-Free Deletion problem asks, for a fixed set F and an input consisting of a graph G and integer k, whether k vertices can be removed from G such that the resulting graph does not contain any member of F as a minor. At FOCS 2012, Fomin et al. ...

research-article
Representative Families of Product Families
Article No.: 36, Pages 1–29https://doi.org/10.1145/3039243

A subfamily F′ of a set family F is said to q-represent F if for every AF and B of size q such that AB = ∅ there exists a set A′F′ such that A′B = ∅. Recently, we provided an algorithm that, for a given family F of sets of size p together with ...

research-article
Combinatorial Algorithm for Restricted Max-Min Fair Allocation
Article No.: 37, Pages 1–28https://doi.org/10.1145/3070694

We study the basic allocation problem of assigning resources to players to maximize fairness. This is one of the few natural problems that enjoys the intriguing status of having a better estimation algorithm than approximation algorithm. Indeed, a ...

research-article
Public Access
Cost-Oblivious Storage Reallocation
Article No.: 38, Pages 1–20https://doi.org/10.1145/3070693

Databases allocate and free blocks of storage on disk. Freed blocks introduce holes where no data is stored. Allocation systems attempt to reuse such deallocated regions in order to minimize the footprint on disk. When previously allocated blocks cannot ...

research-article
Maximizing Symmetric Submodular Functions
Article No.: 39, Pages 1–36https://doi.org/10.1145/3070685

Symmetric submodular functions are an important family of submodular functions capturing many interesting cases, including cut functions of graphs and hypergraphs. Maximization of such functions subject to various constraints receives little attention ...

research-article
Public Access
Improved Approximation Algorithm for Steiner k-Forest with Nearly Uniform Weights
Article No.: 40, Pages 1–16https://doi.org/10.1145/3077581

In the Steiner k-Forest problem, we are given an edge weighted graph, a collection D of node pairs, and an integer k ⩽ |D|. The goal is to find a min-weight subgraph that connects at least k pairs. The best known ratio for this problem is min {O(√n), O(√...

research-article
Max-Sum Diversification, Monotone Submodular Functions, and Dynamic Updates
Article No.: 41, Pages 1–25https://doi.org/10.1145/3086464

Result diversification is an important aspect in web-based search, document summarization, facility location, portfolio management, and other applications. Given a set of ranked results for a set of objects (e.g., web documents, facilities, etc.) with a ...

research-article
Hollow Heaps
Article No.: 42, Pages 1–27https://doi.org/10.1145/3093240

We introduce the hollow heap, a very simple data structure with the same amortized efficiency as the classical Fibonacci heap. All heap operations except delete and delete-min take O(1) time, worst case as well as amortized; delete and delete-min take O(...

research-article
Tight Kernel Bounds for Problems on Graphs with Small Degeneracy
Article No.: 43, Pages 1–22https://doi.org/10.1145/3108239

Kernelization is a strong and widely applied technique in parameterized complexity. In a nutshell, a kernelization algorithm for a parameterized problem transforms in polynomial time a given instance of the problem into an equivalent instance whose size ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.