Let A be a lasvegas algorithm, i.e., A is a randomized algorithm that always produces the correct answer when it stops but whose running time is a random variable. We consider the problem of minimizing the expected t...
详细信息
Let A be a lasvegas algorithm, i.e., A is a randomized algorithm that always produces the correct answer when it stops but whose running time is a random variable. We consider the problem of minimizing the expected time required to obtain an answer from A using strategies which simulate A as follows: run A for a fixed amount of time t1, then run A independently for a fixed amount of time t2, etc. The simulation stops if A completes its execution during any of the runs. Let J = (t1, t2, . . .) be a strategy, and let l(A) = inf(J)T(A, J), where T(A, J) is the expected value of the running time of the simulation of A under strategy J. We describe a simple universal strategy J(univ), with the property that, for any algorithm A, T(A, J(univ)) = O(l(A) log(l(A))). Furthermore, we show that this is the best performance that can be achieved, up to a constant factor, by any universal strategy.
In this paper, we present an introduction to Monte Carlo and lasvegas randomized algorithms for systems and control. Specific applications of these algorithms include stability analysis, Lyapunov functions, and distr...
详细信息
In this paper, we present an introduction to Monte Carlo and lasvegas randomized algorithms for systems and control. Specific applications of these algorithms include stability analysis, Lyapunov functions, and distributed consensus problems.
We consider the time (number of communication rounds) and energy (number of non-idle communication rounds per device) complexities of randomized leader election in a multiple-access channel, where the number of device...
详细信息
ISBN:
(纸本)9781450391467
We consider the time (number of communication rounds) and energy (number of non-idle communication rounds per device) complexities of randomized leader election in a multiple-access channel, where the number of devices n >= 2 is unknown. It is well-known that for polynomial-time randomized leader election algorithms with success probability 1 - 1/poly(n), the optimal energy complexity is Theta(log log* n) if receivers can detect collisions, and it is Theta(log* n) otherwise. Without collision detection, all existing randomized leader election algorithms using o(log log n) energy are Monte Carlo in that they might fail with some small probability, and they might consume unbounded energy and never halt when they fail. Although the optimal energy complexity of leader election appears to have been settled, it is still an intriguing open question whether it is possible to attain the optimal O(log* n) energy complexity by an efficient lasvegas algorithm that never fails. In this paper we address this fundamental question. center dot A separation between Monte Carlo and las vegas algorithms: Without collision detection, we prove that any lasvegas leader election algorithm A with finite expected time complexity must use Omega(log log n) energy, establishing a large separation between Monte Carlo and las vegas algorithms. Our lower bound is tight, matching the energy complexity of an existing leader election algorithm that finishes in O(log n) time and uses O(log log n) energy in expectation. center dot An exponential improvement with sender collision detection: In the setting where transmitters can detect collisions, we design a new leader election algorithm that finishes in O(log(1+epsilon) n) time and uses O(epsilon(-1) log log log n) energy in expectation, showing that sender collision detection helps improve the energy complexity exponentially. Before this work, it was only known that sender collision detection is helpful for deterministic leader election. center dot
The shifted number system is presented: a method for detecting and avoiding error producing carries during approximate computations with truncated expansions of rational numbers. Using the shifted number system the hi...
详细信息
The shifted number system is presented: a method for detecting and avoiding error producing carries during approximate computations with truncated expansions of rational numbers. Using the shifted number system the high-order lifting and integrality certification techniques of Storjohann 2003 for polynomial matrices are extended to the integer case. lasvegas reductions to integer matrix multiplication are given for some problems involving integer matrices: the determinant and a solution of a linear system can be computed with about the same number of bit operations as required to multiply together two matrices having the same dimension and size of entries as the input matrix. The algorithms are space efficient. (c) 2005 Elsevier Inc. All rights reserved.
We consider networks of processes which interact with beeps. In the basic model defined by Cornejo and Kuhn [8], which we refer to as the BL variant, processes can choose in each round either to beep or to listen. Tho...
详细信息
We consider networks of processes which interact with beeps. In the basic model defined by Cornejo and Kuhn [8], which we refer to as the BL variant, processes can choose in each round either to beep or to listen. Those who beep are unable to detect simultaneous beeps. Those who listen can only distinguish between silence and the presence of at least one beep. Beeping models are weak in essence and even simple tasks may become difficult or unfeasible with them. In this paper, we address the problem of computing how many participants there are in a one-hop network: the counting problem. We first observe that no algorithm can compute this number with certainty in BL, even if it is randomised (lasvegas). We thus consider the stronger variant where beeping nodes are able to detect simultaneous beeps, referred to as BcdL (cd stands for collision detection). We prove that at least n rounds are necessary in BcdL, and we present an algorithm whose running time is O(n) rounds with high probability. Further experimental results show that its expected running time is less than 10n. Finally, we discuss how this algorithm can be adapted in other beeping models. In particular, we show that the algorithm can be emulated in BL, at the cost of a logarithmic slowdown and of trading its lasvegas nature (certain result, uncertain time) against a Monte Carlo one (certain time, uncertain result). (C) 2019 Published by Elsevier B.V.
We describe a quantum black-box network computing the majority of N bits with zero-sided error the correct answer with probability epsilon using only 2/3 N + O (rootN log(epsilon(-1) log N)) queries: the algorithm ret...
详细信息
We describe a quantum black-box network computing the majority of N bits with zero-sided error the correct answer with probability epsilon using only 2/3 N + O (rootN log(epsilon(-1) log N)) queries: the algorithm returns at least 1 - epsilon, and "I don't know" otherwise. Our algorithm is given as a randomized "XOR decision tree" for which the number of queries on any input is strongly concentrated around a value of at most 2/3 N. We provide a nearly matching lower bound of 2/3 N - O(rootN) on the expected number of queries on a worst-case input in the randomized XOR decision tree model with zero-sided error o(1). Any classical randomized decision tree computing the majority on N bits with zero-sided error 1/2 has cost N.
We present a primality proving algorithm-a probabilistic primality test that produces short certificates of primality on prime inputs. We prove that the test runs in expected polynomial time for all but a vanishingly ...
详细信息
We present a primality proving algorithm-a probabilistic primality test that produces short certificates of primality on prime inputs. We prove that the test runs in expected polynomial time for all but a vanishingly small fraction of the primes. As a corollary, we obtain an algorithm for generating large certified primes with distribution statistically close to uniform. Under the conjecture that the gap between consecutive primes is bounded by some polynomial in their size, the test is shown to run in expected polynomial time for all primes, yielding a lasvegas primality test. Our test is based on a new methodology for applying group theory to the problem of prime certification, and the application of this methodology using groups generated by elliptic curves over finite fields. We note that our methodology and methods have been subsequently used and improved upon, most notably in the primality proving algorithm of Adleman and Huang using hyperelliptic curves and in practical primality provers using elliptic curves.
We propose a method that learns to allocate computation time to a given set of algorithms, of unknown performance, with the aim of solving a given sequence of problem instances in a minimum time. Analogous meta-learni...
详细信息
We propose a method that learns to allocate computation time to a given set of algorithms, of unknown performance, with the aim of solving a given sequence of problem instances in a minimum time. Analogous meta-learning techniques are typically based on models of algorithm performance, learned during a separate offline training sequence, which can be prohibitively expensive. We adopt instead an online approach, named GAMBLETA, in which algorithm performance models are iteratively updated, and used to guide allocation on a sequence of problem instances. GAMBLETA is a general method for selecting among two or more alternative algorithm portfolios. Each portfolio has its own way of allocating computation time to the available algorithms, possibly based on performance models, in which case its performance is expected to improve over time, as more runtime data becomes available. The resulting exploration-exploitation trade-off is represented as a bandit problem. In our previous work, the algorithms corresponded to the arms of the bandit, and allocations evaluated by the different portfolios were mixed, using a solver for the bandit problem with expert advice, but this required the setting of an arbitrary bound on algorithm runtimes, invalidating the optimal regret of the solver. In this paper, we propose a simpler version of GAMBLETA, in which the allocators correspond to the arms, such that a single portfolio is selected for each instance. The selection is represented as a bandit problem with partial information, and an unknown bound on losses. We devise a solver for this game, proving a bound on its expected regret. We present experiments based on results from several solver competitions, in various domains, comparing GAMBLETA with another online method.
暂无评论