Catálogo de publicaciones - libros

Compartir en
redes sociales


Automata, Languages and Programming: 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007. Proceedings

Lars Arge ; Christian Cachin ; Tomasz Jurdziński ; Andrzej Tarlecki (eds.)

En conferencia: 34º International Colloquium on Automata, Languages, and Programming (ICALP) . Wrocław, Poland . July 9, 2007 - July 13, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-73419-2

ISBN electrónico

978-3-540-73420-8

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Strong Price of Anarchy for Machine Load Balancing

Amos Fiat; Haim Kaplan; Meital Levy; Svetlana Olonetsky

As defined by Aumann in 1959, a strong equilibrium is a Nash equilibrium that is resilient to deviations by coalitions. We give tight bounds on the strong price of anarchy for load balancing on related machines. We also give tight bounds for -strong equilibria, where the size of a deviating coalition is at most .

- Session A12 | Pp. 583-594

Efficient Algorithms for Constant Well Supported Approximate Equilibria in Bimatrix Games

Spyros C. Kontogiannis; Paul G. Spirakis

In this work we study the tractability of well supported approximate Nash Equilibria (SuppNE in short) in bimatrix games. In view of the apparent intractability of constructing Nash Equilibria (NE in short) in polynomial time, even for bimatrix games, understanding the limitations of the approximability of the problem is of great importance.

We initially prove that SuppNE are immune to the addition of arbitrary real vectors to the rows (columns) of the row (column) player’s payoff matrix. Consequently we propose a polynomial time algorithm (based on linear programming) that constructs a 0.5 −SuppNE for arbitrary win lose games.

We then parameterize our technique for win lose games, in order to apply it to arbitrary (normalized) bimatrix games. Indeed, this new technique leads to a −SuppNE for win lose games, where is the . Nevertheless, this parameterized technique extends nicely to a technique for arbitrary [0,1] −bimatrix games, which assures a 0.658 −SuppNE in polynomial time.

To our knowledge, these are the polynomial time algorithms providing −SuppNE of normalized or win lose bimatrix games, for some nontrivial  ∈ [0,1), bounded away from 1.

- Session A12 | Pp. 595-606

Equational Systems and Free Constructions

Marcelo Fiore; Chung-Kil Hur

The purpose of this paper is threefold: to present a general abstract, yet practical, notion of equational system; to investigate and develop a theory of free constructions for such equational systems; and to illustrate the use of equational systems as needed in modern applications, specifically to the theory of substitution in the presence of variable binding and to models of name-passing process calculi.

- Session B3 | Pp. 607-618

Categorical Views on Computations on Trees (Extended Abstract)

Ichiro Hasuo; Bart Jacobs; Tarmo Uustalu

Computations on trees form a classical topic in computing. These computations can be described in terms of machines (typically called tree transducers), or in terms of functions. This paper focuses on three flavors of bottom-up computations, of increasing generality. It brings categorical clarity by identifying a category of tree transducers together with two different behavior functors. The first sends a tree transducer to a coKleisli or biKleisli map (describing the contribution of each local node in an input tree to the global transformation) and the second to a tree function (the global tree transformation). The first behavior functor has an adjoint realization functor, like in Goguen’s early work on automata. Further categorical structure, in the form of Hughes’s Arrows, appears in properly parameterized versions of these structures.

- Session B3 | Pp. 619-630

Holographic Algorithms: The Power of Dimensionality Resolved

Jin-Yi Cai; Pinyan Lu

Valiant’s theory of holographic algorithms is a novel methodology to achieve exponential speed-ups in computation. A fundamental parameter in holographic algorithms is the dimension of the linear basis vectors. We completely resolve the problem of the power of higher dimensional bases. We prove that 2-dimensional bases are universal for holographic algorithms.

- Session A13 | Pp. 631-642

Reconciling Data Compression and Kolmogorov Complexity

Laurent Bienvenu; Wolfgang Merkle

While data compression and Kolmogorov complexity are both about effective coding of words, the two settings differ in the following respect. A compression algorithm or compressor, for short, has to map a word to a unique code for this word in one shot, whereas with the standard notions of Kolmogorov complexity a word has many different codes and the minimum code for a given word cannot be found effectively. This gap is bridged by introducing decidable Turing machines and a corresponding notion of Kolmogorov complexity, where compressors and suitably normalized decidable machines are essentially the same concept.

Kolmogorov complexity defined via decidable machines yields characterizations in terms of the intial segment complexity of sequences of the concepts of Martin-Löf randomness, Schnorr randomness, Kurtz randomness, and computable dimension. These results can also be reformulated in terms of time-bounded Kolmogorov complexity. Other applications of decidable machines are presented, such as a simplified proof of the Miller-Yu theorem (characterizing Martin-Löf randomness by the plain complexity of the initial segments) and a new characterization of computably traceable sequences via a natural lowness notion for decidable machines.

- Session A13 | Pp. 643-654

Size Competitive Meshing Without Large Angles

Gary L. Miller; Todd Phillips; Donald Sheehy

We present a new meshing algorithm for the plane, Overlay Stitch Meshing (OSM), accepting as input an arbitrary Planar Straight Line Graph and producing a triangulation with all angles smaller than 170°. The output triangulation has competitive size with any optimal size mesh having equally bounded largest angle. The competitive ratio is (log(/)) where and are respectively the largest and smallest features in the input. OSM runs in ( log(/) + ) time/work where is the input size and is the output size. The algorithm first uses Sparse Voronoi Refinement to compute a quality overlay mesh of the input points alone. This triangulation is then combined with the input edges to give the final mesh.

- Session A13 | Pp. 655-666

A Fully Abstract Trace Semantics for General References

James Laird

We describe a fully abstract trace semantics for a functional language with locally declared general references (a fragment of Standard ML). It is based on a bipartite LTS in which states alternate between program and environment configurations and labels carry only (sets of) basic values, location and pointer names. Interaction between programs and environments is either direct (initiating or terminating subprocedures) or indirect (by the overwriting of shared locations): actions reflect this by carrying updates to the shared part of the store.

The trace-sets of programs and contexts may be viewed as deterministic strategies and counter-strategies in the sense of game semantics: we prove soundness of the semantics by showing that the evaluation of a program in an environment tracks the interaction between the corresponding strategies. We establish full abstraction by proving a definability result: every bounded deterministic strategy of a given type is the trace-set of a configuration of that type.

- Session B4 | Pp. 667-679

Aliased Register Allocation for Straight-Line Programs Is NP-Complete

Jonathan K. Lee; Jens Palsberg; Fernando Magno Quintão Pereira

Register allocation is NP-complete in general but can be solved in linear time for straight-line programs where each variable has at most one definition point if the bank of registers is homogeneous. In this paper we study registers which may alias: an aliased register can be used both independently or in combination with an adjacent register. Such registers are found in commonly-used architectures such as x86, the HP PA-RISC, the Sun SPARC processor, and MIPS floating point. In 2004, Smith, Ramsey, and Holloway presented the best algorithm for aliased register allocation so far; their algorithm is based on a heuristic for coloring of general graphs. Most architectures with register aliasing allow only registers to be combined: for example, the low-address register must have an even number. Open until now is the question of whether working with restricted classes of programs can improve the complexity of aliased register allocation with alignment restrictions. In this paper we show that aliased register allocation with alignment restrictions for straight-line programs is NP-complete.

- Session B4 | Pp. 680-691

Conservative Ambiguity Detection in Context-Free Grammars

Sylvain Schmitz

The ability to detect ambiguities in context-free grammars is vital for their use in several fields, but the problem is undecidable in the general case. We present a safe, conservative approach, where the approximations cannot result in overlooked ambiguous cases . We analyze the complexity of the verification, and provide formal comparisons with several other ambiguity detection methods.

- Session B4 | Pp. 692-703