首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
We consider the question of constructing cryptographic pseudorandom generators (PRGs) in NC0, namely ones in which each bit of the output depends on just a constant number of input bits. Previous constructions of such PRGs were limited to stretching a seed of n bits to no(n) bits. This leaves open the existence of a PRG with a linear (let alone superlinear) stretch in NC0. In this work we study this question and obtain the following main results:
1.  We show that the existence of a linear-stretch PRG in NC0 implies non-trivial hardness of approximation results without relying on PCP machinery. In particular, it implies that Max3SAT is hard to approximate to within some multiplicative constant.
2.  We construct a linear-stretch PRG in NC0 under a specific intractability assumption related to the hardness of decoding “sparsely generated” linear codes. Such an assumption was previously conjectured by Alekhnovich (FOCS 2003).
  相似文献   

4.
5.
The inverse problem relative to a verifier V of proofs of membership for a NP language is the problem of deciding, given a set π of proofs, whether or not there exists a string x having exactly π as its set of proofs. In this paper, we study the complexity of inverse problems. We develop a new notion of reduction which allows one to compare the complexity of inverse problems. Using this notion, we classify as coNP-complete the inverse problems for the “natural” verifiers of many NP-complete problems. We also show that the inverse complexity of a verifier for a language L cannot be predicted solely from the complexity of L, but rather, is highly dependent upon the choice of verifier used to accept L. In this context, a verifier with a Σ2 p -complete inverse problem is exhibited, giving a new and natural example of a Σ2 p -complete problem.   相似文献   

6.
7.
We construct a randomness-efficient averaging sampler that is computable by uniform constant-depth circuits with parity gates (i.e., in uniform AC 0[⊕]). Our sampler matches the parameters achieved by random walks on constant-degree expander graphs, allowing us to apply a variety expander-based techniques within NC 1. For example, we obtain the following results:
•  Randomness-efficient error-reduction for uniform probabilistic NC 1, TC 0, AC 0[⊕] and AC 0: Any function computable by uniform probabilistic circuits with error 1/3 using r random bits is computable by circuits of the same type with error δ using r + O(log(1/δ)) random bits.
•  An optimal bitwise ϵ-biased generator in AC 0[⊕]: There exists a 1/2Ω(n)-biased generator G : {0, 1} O(n) → {0, 1}2n for which poly(n)-size uniform AC 0[⊕] circuits can compute G(s) i given (s, i) ∈ {0, 1} O(n)  ×  {0, 1} n . This resolves question raised by Gutfreund and Viola (Random 2004).
•  uniform BP · AC 0 ⊆ uniform AC 0/O(n).
Our sampler is based on the zig-zag graph product of Reingold, Vadhan & Wigderson (Annals of Math 2002) and as part of our analysis we givean elementary proof of a generalization of Gillman’s Chernoff Bound for Expander Walks (SIAM Journal on Computing 1998).   相似文献   

8.
We consider a class of two-prover interactive proof systems where each prover returns a single bit to the verifier and the verifier’s verdict is a function of the XOR of the two bits received. We show that, when the provers are allowed to coordinate their behavior using a shared entangled quantum state, a perfect parallel repetition theorem holds in the following sense. The prover’s optimal success probability for simultaneously playing a collection of XOR proof systems is exactly the product of the individual optimal success probabilities. This property is remarkable in view of the fact that, in the classical case (where the provers can only utilize classical information), it does not hold. The theorem is proved by analyzing parities of XOR proof systems using semidefinite programming techniques, which we then relate to parallel repetitions of XOR games via Fourier analysis.   相似文献   

9.
10.
11.
12.
Modeling and Processing Information for Context-Aware Computing: A Survey   总被引:1,自引:0,他引:1  
Context-awareness is emerging as a central issue in ubiquitous computing research. Context-aware computing refers to the idea that computing devices can sense and react to the physical environment where they are deployed. A great deal of research on context-awareness has been conducted to explore and address the various challenges related to context acquisition, representation, distribution, and abstraction. This paper surveys the most relevant approaches to modeling context for ubiquitous computing. It also evaluates how the existing works utilize contextual information, with respect to the query processing approaches used to access and manage that information. We also discuss typical problems, shortcomings, and challenges posed by context modeling at large, and highlight some proposals to address some of them.
Ichiro SatohEmail:
  相似文献   

13.
Consideration was given to the queuing system with Poisson flows of incoming positive and negative customers. For the positive customers, there is an infinite-capacity buffer. The arriving negative customer knocks out a positive customer queued in the buffer and moves it to an infinite-capacity buffer of ousted customers (bunker). If the buffer is empty, then the negative customer discharges the system without affecting it. After servicing the current customer, the server receives a customer from the buffer or, if the buffer is empty, the bunker. The customers arriving from both the buffer and bunker are distributed exponentially with the same parameter. Relations for calculation of the stationary distributions of the queues in the buffer and bunker were obtained.  相似文献   

14.
For the parallel computer systems, a new formulation of the problem of constructing parallel asynchronous abstract programs of the desired length was proposed. The conditions for the problem of planning were represented as a system of Boolean equations (constraints) whose solutions define the feasible plans for activation of the program modules specified in the planner’s knowledge base. The constraints on the number of processors and time delays arising at execution of the program modules were taken into consideration.  相似文献   

15.
Consideration was given to the linear-quadratic problem of optimal control for the discrete linear system with fast and slow variables under incomplete information about system state. Decomposition of the discrete matrix Riccati equations was carried out. The proposed decomposition algorithm relies on a geometrical approach using the properties of the invariant manifolds of slow and fast motions of the nonlinear multirate discrete systems as basis. The splitting transformation was constructed in the form of asymptotic decomposition in the degrees of a small parameter.  相似文献   

16.
In practice of design of control systems, the cases occur when some of the roots of the transfer function of a controllable object are disposed on the imaginary axis of the complex plane. The optimal controller constructed for such objects, despite its realizability, will not afford the robustness properties in the system. The methods of removal of this phenomenon are given. The comparative estimate of the solution of this problem is provided both in the space of states and in the input-output relations (in the space of operators).  相似文献   

17.
The conventional concepts of invariance are extended in this article to include impulsive control systems represented by measure driven differential inclusions. Invariance conditions and some of their main features are derived. The solution concept plays a critical role in the extension of the conditions for conventional problems to the impulsive control context.  相似文献   

18.
We consider hypotheses about nondeterministic computation that have been studied in different contexts and shown to have interesting consequences:
•  The measure hypothesis: NP does not have p-measure 0.
•  The pseudo-NP hypothesis: there is an NP language that can be distinguished from any DTIME language by an NP refuter.
•  The NP-machine hypothesis: there is an NP machine accepting 0* for which no -time machine can find infinitely many accepting computations.
We show that the NP-machine hypothesis is implied by each of the first two. Previously, no relationships were known among these three hypotheses. Moreover, we unify previous work by showing that several derandomizations and circuit-size lower bounds that are known to follow from the first two hypotheses also follow from the NP-machine hypothesis. In particular, the NP-machine hypothesis becomes the weakest known uniform hardness hypothesis that derandomizes AM. We also consider UP versions of the above hypotheses as well as related immunity and scaled dimension hypotheses.   相似文献   

19.
20.
A new form of a partial frequency criterion of absolute stability for nonlinear automatic control systems is obtained basing on a quadratic transformation of the state vector. As is shown, the obtained criterion is stronger than V.M. Popov’s one. An alternative formulation of the criterion is given in terms excluding the notions of quadratic transformation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号