We improve the lower bound on the asymptotic competitive ratio of any online algorithm for bin packing to above 1.54278. We demonstrate for the first time the advantage of branching and the applicability of full adapt...
详细信息
We improve the lower bound on the asymptotic competitive ratio of any online algorithm for bin packing to above 1.54278. We demonstrate for the first time the advantage of branching and the applicability of full adaptivity in the design of lower bounds for the classic online bin packing problem. We apply a new method for weight based analysis, which is usually applied only in proofs of upper bounds. The values of previous lower bounds were approximately 1.5401 and 1.5403.
The overall aim of our research is to develop techniques to reason about the equilibrium properties of multi-agent systems. We model multi-agent systems as concurrent games, in which each player is a process that is a...
详细信息
The overall aim of our research is to develop techniques to reason about the equilibrium properties of multi-agent systems. We model multi-agent systems as concurrent games, in which each player is a process that is assumed to act independently and strategically in pursuit of personal preferences. In this article, we study these games in the context of finite-memory strategies, and we assume players' preferences are defined by a qualitative and a quantitative objective, which are related by a lexicographic order: a player first prefers to satisfy its qualitative objective (given as a formula of linear temporal logic) and then prefers to minimise costs (given by a mean-payoff function). Our main result is that deciding the existence of a strict epsilon Nash equilibrium in such games is 2ExpTime-complete (and hence decidable), even if players' deviations are implemented as infinite-memory strategies.
Given a metric space (X, d), a set of terminals K subset of X, and a parameter 0 < epsilon < 1, we consider metric structures (e.g., spanners, distance oracles, embedding into normed spaces) that preserve distan...
详细信息
Given a metric space (X, d), a set of terminals K subset of X, and a parameter 0 < epsilon < 1, we consider metric structures (e.g., spanners, distance oracles, embedding into normed spaces) that preserve distances for all pairs in K x X up to a factor of 1 + epsilon, and have small size (e.g. number of edges for spanners, dimension for embeddings). While such terminal (aka source-wise) metric structures are known to exist in several settings, no terminal spanner or embedding with distortion close to 1, is currently known. Here we devise such terminal metric structures for doubling metrics, and show that essentially any metric structure with distortion 1 + epsilon and space s(vertical bar X vertical bar) has its terminal counterpart, with distortion 1 + O(epsilon) and space s(vertical bar K vertical bar) + n. In particular, for any doubling metric on n points, a set of k terminals, and constant 0 < epsilon < 1, there exists A spanner with stretch 1 + epsilon for pairs in K x X, with n + O(k) edges. A labeling scheme with stretch 1 + epsilon for pairs in K x X, with label size approximate to log k. An embedding into l(infinity)(d) with distortion 1 + epsilon for pairs in K x X, where d = O(log k). Moreover, surprisingly, the last two results apply if only the metric space on K is doubling, while the metric on X can be arbitrary.
We consider the problem of converting a two-way alternating finite automaton (2AFA) with n states to a 2AFA accepting the complement of its language. Complementing is trivial for halting2AFAs, by swapping the roles of...
详细信息
We consider the problem of converting a two-way alternating finite automaton (2AFA) with n states to a 2AFA accepting the complement of its language. Complementing is trivial for halting2AFAs, by swapping the roles of existential and universal decisions and the roles of accepting and rejecting states. However, since 2AFAs do not have resources to detect infinite loops by counting executed steps, it was not known whether the cost of complementing is polynomial in n in the general case. Here we shall show that 2AFAs can be complemented by using O(n(7)) states.
ZusammenfassungDaten stellen eine strategische Ressource für die Wettbewerbsfähigkeit von Unternehmen und die Prosperität der Gesellschaft dar. Von der Nutzung von Daten vieler einzelner Akteure profiti...
详细信息
Zusammenfassung
Daten stellen eine strategische Ressource für die Wettbewerbsfähigkeit von Unternehmen und die Prosperität der Gesellschaft dar. Von der Nutzung von Daten vieler einzelner Akteure profitieren die Gemeinschaft, aber auch das Individuum. Beispiele hierfür liefern das Gesundheitswesen oder die Mobilität. Dabei sind die Interessen der Individuen in Bezug auf Datenschutz und Datensouveränität über Nutzungsvereinbarungen hinaus zu wahren und bestenfalls technologisch sicherzustellen. Datenräume, basierend auf verteilten Dateninfrastrukturen, stellen Datendienste und Datennutzungsregeln für Individuen und Organisationen bereit. Beispiele hierfür liefern die International-data-Spaces(IDS)-Initiative oder die Initiative Gaia‑X zur Schaffung einer verteilten Dateninfrastruktur in Europa. Instanziierungen in den Bereichen Mobilität oder Smarthome zeigen Vorteile von Datenökosystemen für Individuen, die Gemeinschaft und die Gesamtheit der Dienstanbieter. Gleichzeitig werden Risiken wie die geeignete Interessensvertretung einzelner Nutzender deutlich. Anhand zweier Fallstudien werden offene ethische, rechtliche, betriebswirtschaftliche und technische Fragen bei der verteilten Umsetzung von Datenräumen und Dateninfrastrukturen unter Sicherstellung europäischer Wertevereinbarungen aufgezeigt.
Session-based concurrency is a type-based approach to the analysis of message-passing programs. These programs may be specified in an operational or declarative style: the former defines how interactions are properly ...
详细信息
Session-based concurrency is a type-based approach to the analysis of message-passing programs. These programs may be specified in an operational or declarative style: the former defines how interactions are properly structured;the latter defines governing conditions for correct interactions. In this paper, we study rigorous relationships between operational and declarative models of session-based concurrency. We develop a correct encoding of session pi-calculus processes into the linear concurrent constraint calculus (lcc), a declarative model of concurrency based on partial information (constraints). We exploit session types to ensure that our encoding satisfies precise correctness properties and that it offers a sound basis on which operational and declarative requirements can be jointly specified and reasoned about. We demonstrate the applicability of our results by using our encoding in the specification of realistic communication patterns with time and contextual information.
The possible interactions between a controller and its environment can naturally be modelled as the arena of a two-player game, and adding an appropriate winning condition permits to specify desirable behavior. The cl...
详细信息
The possible interactions between a controller and its environment can naturally be modelled as the arena of a two-player game, and adding an appropriate winning condition permits to specify desirable behavior. The classical model here is the positional game, where both players can (fully or partially) observe the current position in the game graph, which in turn is indicative of their mutual current states. In practice, neither sensing and actuating the environment through physical devices nor data forwarding to and from the controller and signal processing in the controller are instantaneous. The resultant delays force the controller to draw decisions before being aware of the recent history of a play and to submit these decisions well before they can take effect asynchronously. It is known that existence of a winning strategy for the controller in games with such delays is decidable over finite game graphs and with respect to omega regular objectives. The underlying reduction, however, is impractical for non-trivial delays as it incurs a blow-up of the game graph which is exponential in the magnitude of the delay. For safety objectives, we propose a more practical incremental algorithm successively synthesizing a series of controllers handling increasing delays and reducing the game-graph size in between. It is demonstrated using benchmark examples that even a simplistic explicit-state implementation of this algorithm outperforms state-of-the-art symbolic synthesis algorithms as soon as non-trivial delays have to be handled. We furthermore address the practically relevant cases of non-order-preserving delays and bounded message loss, as arising in actual networked control, thereby considerably extending the scope of regular game theory under delay.
Quantum state control including entanglement, and readout of the Josephson persistent-current qubit, flux qubit, are reviewed. First, we mention our single-shot readout of quantum superposition state of a flux qubit b...
详细信息
Quantum state control including entanglement, and readout of the Josephson persistent-current qubit, flux qubit, are reviewed. First, we mention our single-shot readout of quantum superposition state of a flux qubit by a current biased dc-SQUID. Second, we mention entangled state and vacuum Rabi oscillations of a flux-qubit LC-resonator system where qubit-resonator coupled state are controlled by a combination of microwave and DC-shift pulses, resulting in a controlling and measuring sequence analogous to atomic cavity QED. Third, we report our recent progress in high fidelity readout of a flux qubit state via Josephson bifurcation amplifier (JBA).
Specifying budgets and deadlines using a process algebra like CSP requires an explicit notion of time. The tock-CSP encoding embeds a rich and flexible approach for modelling discrete-time behaviours with powerful too...
详细信息
Specifying budgets and deadlines using a process algebra like CSP requires an explicit notion of time. The tock-CSP encoding embeds a rich and flexible approach for modelling discrete-time behaviours with powerful tool support. It uses an event tock, interpreted to mark passage of time. Analysis, however, has traditionally used the standard semantics of CSP, which is inadequate for reasoning about timed refinement. The most recent version of the model checker FDR provides tailored support for tock-CSP, including specific operators, but the standard semantics remains inadequate. In this paper, we characterise tock-CSP as a language in its own right, rich enough to model budgets and deadlines, and reason about Zeno behaviour. We present the first sound tailored semantic model for tock-CSP that captures timewise refinement. It is fully mechanised in Isabelle/HOL and, to enable use of FDR4 to check refinement in this novel model, we use model shifting, which is a technique that explicitly encodes refusals in traces.
暂无评论