New Jersey, October 9-11, 2016 Field of theoretical computer science

Slides:



Advertisements
Similar presentations
Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Indexing DNA Sequences Using q-Grams
all-pairs shortest paths in undirected graphs
Size-estimation framework with applications to transitive closure and reachability Presented by Maxim Kalaev Edith Cohen AT&T Bell Labs 1996.
Router/Classifier/Firewall Tables Set of rules—(F,A)  F is a filter Source and destination addresses. Port number and protocol. Time of day.  A is an.
Motion Planning for Point Robots CS 659 Kris Hauser.
Tight Bounds for Dynamic Convex Hull Queries (Again) Erik DemaineMihai Pătraşcu.
Chapter 3 The Greedy Method 3.
Optimal Merging Of Runs
Creating Difficult Instances of the Post Correspondence Problem Presenter: Ling Zhao Department of Computing Science University of Alberta March 20, 2001.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
CS 326A: Motion Planning Basic Motion Planning for a Point Robot.
Space-Efficient Sequence Alignment Space-Efficient Sequence Alignment Bioinformatics 202 University of California, San Diego Lecture Notes No. 7 Dr. Pavel.
Improved Randomized Algorithms for Path Problems in Graphs PhD Thesis Surender Baswana Department of Computer Science & Engineering, I.I.T. Delhi Research.
Problems and MotivationsOur ResultsTechnical Contributions Membership: Maintain a set S in the universe U with |S| ≤ n. Given an x in U, answer whether.
Tight Bounds for Graph Problems in Insertion Streams Xiaoming Sun and David P. Woodruff Chinese Academy of Sciences and IBM Research-Almaden.
Path Planning for a Point Robot
Compression.  Compression ratio: how much is the size reduced?  Symmetric/asymmetric: time difference to compress, decompress?  Lossless; lossy: any.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
All-Pairs Shortest Paths & Essential Subgraph 01/25/2005 Jinil Han.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
A * Search A* (pronounced "A star") is a best first, graph search algorithm that finds the least-cost path from a given initial node to one goal node out.
Lower Bounds for Embedding Edit Distance into Normed Spaces A. Andoni, M. Deza, A. Gupta, P. Indyk, S. Raskhodnikova.
1.[10] Suppose we have 14 integers: 10, 100, 30, 130, 80, 50, 140, 20, 60, 70, 120, 40, 90, 110. Please create a 2-3 tree by inserting one integer at a.
Data Structures for Emergency Planning Cyril Gavoille (LaBRI, University of Bordeaux) 8 th FoIKS Bordeaux – March 3, 2014.
DS.H.1 Hashing Chapter 5 Overview The General Idea Hash Functions Separate Chaining Open Addressing Rehashing Extendible Hashing Application Example: Geometric.
Hashing (part 2) CSE 2011 Winter March 2018.
New Characterizations in Turnstile Streams with Applications
Lower bounds for approximate membership dynamic data structures
CSCI 210 Data Structures and Algorithms
Hashing Alexandra Stefan.
Approximate Matching of Run-Length Compressed Strings
Courtsey & Copyright: DESIGN AND ANALYSIS OF ALGORITHMS Courtsey & Copyright:
CPSC-608 Database Systems
Hashing Alexandra Stefan.
Review for Final Exam Non-cumulative, covers material since exam 2
Review for Final Exam Non-cumulative, covers material since exam 2
Shortest Path Problems
CS330 Discussion 6.
COMS E F15 Lecture 2: Median trick + Chernoff, Distinct Count, Impossibility Results Left to the title, a presenter can insert his/her own image.
Effcient quantum protocols for XOR functions
Space-for-time tradeoffs
Randomized Algorithms CS648
Lecture 7: Dynamic sampling Dimension Reduction
Dijkstra’s Algorithm We are given a directed weighted graph
Lecture 7 All-Pairs Shortest Paths
CIS 700: “algorithms for Big Data”
Randomized Algorithms CS648
Graphs Chapter 11 Objectives Upon completion you will be able to:
Linear sketching over
CMPT 438 Algorithms Instructor: Tina Tian.
CSCI B609: “Foundations of Data Science”
Introduction Wireless Ad-Hoc Network
Shortest Path Problems
Source Encoding and Compression
Linear sketching with parities
Space-for-time tradeoffs
2018, Spring Pusan National University Ki-Joune Li
Space-for-time tradeoffs
CPSC-608 Database Systems
Lecture 6: Counting triangles Dynamic graphs & sampling
Compact routing schemes with improved stretch
Minwise Hashing and Efficient Search
Clustering.
Space-for-time tradeoffs
CS 3343: Analysis of Algorithms
Heuristic Search Viewed as path Finding in a Graph
Presentation transcript:

Annual IEEE Symposium on Foundations of Computer Science (FOCS) Amela Špica New Jersey, October 9-11, 2016 Field of theoretical computer science 307 submitted papers, 85 accepted

Linear hashing is awesome ℎ(𝑥) = ((𝑎𝑥 + 𝑏) 𝑚𝑜𝑑 𝑝) 𝑚𝑜𝑑 𝑚 𝑎,𝑏 𝜖 [𝑝] are chosen uniformly at random, p is prime (2-independent), p >> m Expected time for insertion is 𝑂(1) and expected length of longest chain is 𝑂(√𝑛) Can‘t improve expected query time Upper bound for expected length of longest chain is not known to be tight for h(x) Paper shows that it is 𝑛 1 3 +𝑜(1) – based on performance of 3-independent hash functions for which upper bound is proved to be 𝑜( 𝑛 1 3 ) Consequence of this proof: Letting 𝑋 = {𝑥1,… ,𝑥𝑛} be set of keys, h(x1) is a minimum hash value with probability 𝑂( 1 √𝑛 ) for min- wise hashing, in the paper this has been improved to 𝑛 (−1+𝑜(1)) For hash tables with linear probing, using a table of size n, and containing (1−𝜀)𝑛 keys worst case query time is 𝑂(√𝑛), this has been improved to 𝑛 𝑜(1)

Edit Distance: Sketching, Streaming and Document Exchange Edit distance – minimum number of insertions, deletions and substitutions to convert string s to string t Given threshold K - ed(s, t) ≤ K Three settings are considered Document exchange – Compute message msg based on string s (encoding) and recover msg with string t (decoding). Goal is to minimize message size and encoding/decoding time. In paper it is shown that message can be of size Ō(𝐾( 𝑙𝑜𝑔 2 𝐾 + 𝑙𝑜𝑔 𝑛)) bits, where Ō(𝑓) = 𝑓 𝑝𝑜𝑙𝑦 (𝑙𝑜𝑔 𝑓) and encoding/decoding can be done in 𝑂(𝑛 + 𝑝𝑜𝑙𝑦(𝐾)) Sketching – Compute sketches sk(s) and sk(t) (encoding) and send to referee to compute ed(s, t) and all edits using sk(s) and sk(t)(decoding). Goal is to minimize sketch size. In the paper, it is shown that sketches can be of size 𝑝𝑜𝑙𝑦(𝐾 𝑙𝑜𝑔 𝑛) bits Streaming - compute 𝑒𝑑(𝑠,𝑡) and all edits with limitations of scanning string s and then t, from left to right once, using a memory of small size. Goal is to minimize memory space. In this paper, it is shown that memory can be 𝑝𝑜𝑙𝑦(𝐾 𝑙𝑜𝑔 𝑛) bits of space.

Popular Conjectures as a Barrier for Dynamic Planar Graph Algorithms The dynamic shortest paths problem on planar graphs is to preprocess a planar graph G so that insertions and deletions of edges and distance queries between two nodes u, v in G, are supported Used in GPS navigation best known algorithm performs queries and updates in Ō( 𝑛 2 3 ) time Conjecture 1 (APSP Conjecture): There exists no algorithm for solving the all pairs shortest paths (APSP) problem in general weighted (static) graphs in time O( 𝑛 3 −ε) for any ε > 0 Using framework from authors of paper it has been shown that there is no algorithm which can support both updates and queries in O( 𝑛 1 2 −ε) for any ε > 0. It shows that if we want to have 𝑛 𝑜(1) for one operation, we likely need 𝑛 1 2 −𝑜(1) for the other.