共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
We consider the question of constructing cryptographic pseudorandom generators (PRGs) in NC0, namely ones in which each bit of the output depends on just a constant number of input bits. Previous constructions of such
PRGs were limited to stretching a seed of n bits to n + o(n) bits. This leaves open the existence of a PRG with a linear (let alone superlinear) stretch in NC0. In this work we study this question and obtain the following main results:
相似文献
1. | We show that the existence of a linear-stretch PRG in NC0 implies non-trivial hardness of approximation results without relying on PCP machinery. In particular, it implies that Max3SAT is hard to approximate to within some multiplicative constant. |
2. | We construct a linear-stretch PRG in NC0 under a specific intractability assumption related to the hardness of decoding “sparsely generated” linear codes. Such an assumption was previously conjectured by Alekhnovich (FOCS 2003). |
4.
5.
Hubie Chen 《Computational Complexity》2008,17(1):94-118
The inverse problem relative to a verifier V of proofs of membership for a NP language is the problem of deciding, given a set π of proofs, whether or not there exists
a string x having exactly π as its set of proofs. In this paper, we study the complexity of inverse problems.
We develop a new notion of reduction which allows one to compare the complexity of inverse problems. Using this notion, we
classify as coNP-complete the inverse problems for the “natural” verifiers of many NP-complete problems. We also show that
the inverse complexity of a verifier for a language L cannot be predicted solely from the complexity of L, but rather, is highly dependent upon the choice of verifier used to accept L. In this context, a verifier with a Σ2
p
-complete inverse problem is exhibited, giving a new and natural example of a Σ2
p
-complete problem.
相似文献
6.
7.
Alexander D. Healy 《Computational Complexity》2008,17(1):3-37
We construct a randomness-efficient averaging sampler that is computable by uniform constant-depth circuits with parity gates (i.e., in uniform AC
0[⊕]). Our sampler matches the parameters achieved by random walks on constant-degree expander graphs, allowing us to apply
a variety expander-based techniques within NC
1. For example, we obtain the following results:
Our sampler is based on the zig-zag graph product of Reingold, Vadhan & Wigderson (Annals of Math 2002) and as part of our analysis we givean elementary proof of a generalization of Gillman’s Chernoff Bound for Expander Walks (SIAM Journal on Computing 1998).
相似文献
• | Randomness-efficient error-reduction for uniform probabilistic NC 1, TC 0, AC 0[⊕] and AC 0: Any function computable by uniform probabilistic circuits with error 1/3 using r random bits is computable by circuits of the same type with error δ using r + O(log(1/δ)) random bits. |
• | An optimal bitwise ϵ-biased generator in AC 0[⊕]: There exists a 1/2Ω(n)-biased generator G : {0, 1} O(n) → {0, 1}2n for which poly(n)-size uniform AC 0[⊕] circuits can compute G(s) i given (s, i) ∈ {0, 1} O(n) × {0, 1} n . This resolves question raised by Gutfreund and Viola (Random 2004). |
• | uniform BP · AC 0 ⊆ uniform AC 0/O(n). |
8.
Richard Cleve William Slofstra Falk Unger Sarvagya Upadhyay 《Computational Complexity》2008,17(2):282-299
We consider a class of two-prover interactive proof systems where each prover returns a single bit to the verifier and the
verifier’s verdict is a function of the XOR of the two bits received. We show that, when the provers are allowed to coordinate
their behavior using a shared entangled quantum state, a perfect parallel repetition theorem holds in the following sense.
The prover’s optimal success probability for simultaneously playing a collection of XOR proof systems is exactly the product
of the individual optimal success probabilities. This property is remarkable in view of the fact that, in the classical case
(where the provers can only utilize classical information), it does not hold. The theorem is proved by analyzing parities
of XOR proof systems using semidefinite programming techniques, which we then relate to parallel repetitions of XOR games
via Fourier analysis.
相似文献
9.
10.
11.
12.
Context-awareness is emerging as a central issue in ubiquitous computing research. Context-aware computing refers to the idea
that computing devices can sense and react to the physical environment where they are deployed. A great deal of research on
context-awareness has been conducted to explore and address the various challenges related to context acquisition, representation,
distribution, and abstraction. This paper surveys the most relevant approaches to modeling context for ubiquitous computing.
It also evaluates how the existing works utilize contextual information, with respect to the query processing approaches used
to access and manage that information. We also discuss typical problems, shortcomings, and challenges posed by context modeling
at large, and highlight some proposals to address some of them.
相似文献
Ichiro SatohEmail: |
13.
Consideration was given to the queuing system with Poisson flows of incoming positive and negative customers. For the positive customers, there is an infinite-capacity buffer. The arriving negative customer knocks out a positive customer queued in the buffer and moves it to an infinite-capacity buffer of ousted customers (bunker). If the buffer is empty, then the negative customer discharges the system without affecting it. After servicing the current customer, the server receives a customer from the buffer or, if the buffer is empty, the bunker. The customers arriving from both the buffer and bunker are distributed exponentially with the same parameter. Relations for calculation of the stationary distributions of the queues in the buffer and bunker were obtained. 相似文献
14.
For the parallel computer systems, a new formulation of the problem of constructing parallel asynchronous abstract programs of the desired length was proposed. The conditions for the problem of planning were represented as a system of Boolean equations (constraints) whose solutions define the feasible plans for activation of the program modules specified in the planner’s knowledge base. The constraints on the number of processors and time delays arising at execution of the program modules were taken into consideration. 相似文献
15.
N. V. Voropaeva 《Automation and Remote Control》2008,69(6):920-928
Consideration was given to the linear-quadratic problem of optimal control for the discrete linear system with fast and slow variables under incomplete information about system state. Decomposition of the discrete matrix Riccati equations was carried out. The proposed decomposition algorithm relies on a geometrical approach using the properties of the invariant manifolds of slow and fast motions of the nonlinear multirate discrete systems as basis. The splitting transformation was constructed in the form of asymptotic decomposition in the degrees of a small parameter. 相似文献
16.
M. G. Zotov 《Automation and Remote Control》2009,70(3):375-388
In practice of design of control systems, the cases occur when some of the roots of the transfer function of a controllable object are disposed on the imaginary axis of the complex plane. The optimal controller constructed for such objects, despite its realizability, will not afford the robustness properties in the system. The methods of removal of this phenomenon are given. The comparative estimate of the solution of this problem is provided both in the space of states and in the input-output relations (in the space of operators). 相似文献
17.
The conventional concepts of invariance are extended in this article to include impulsive control systems represented by measure driven differential inclusions. Invariance conditions and some of their main features are derived. The solution concept plays a critical role in the extension of the conditions for conventional problems to the impulsive control context. 相似文献
18.
We consider hypotheses about nondeterministic computation that have been studied in different contexts and shown to have interesting
consequences:
We show that the NP-machine hypothesis is implied by each of the first two. Previously, no relationships were known among
these three hypotheses. Moreover, we unify previous work by showing that several derandomizations and circuit-size lower bounds
that are known to follow from the first two hypotheses also follow from the NP-machine hypothesis. In particular, the NP-machine
hypothesis becomes the weakest known uniform hardness hypothesis that derandomizes AM. We also consider UP versions of the
above hypotheses as well as related immunity and scaled dimension hypotheses.
相似文献
• | The measure hypothesis: NP does not have p-measure 0. |
• | The pseudo-NP hypothesis: there is an NP language that can be distinguished from any DTIME language by an NP refuter. |
• | The NP-machine hypothesis: there is an NP machine accepting 0* for which no -time machine can find infinitely many accepting computations. |
19.
20.
A new form of a partial frequency criterion of absolute stability for nonlinear automatic control systems is obtained basing on a quadratic transformation of the state vector. As is shown, the obtained criterion is stronger than V.M. Popov’s one. An alternative formulation of the criterion is given in terms excluding the notions of quadratic transformation. 相似文献