Catálogo de publicaciones - libros

Compartir en
redes sociales


Algorithms and Complexity: 6th Italian Conference, CIAC 2006, Rome, Italy, May 29-31, 2006, Proceedings

Tiziana Calamoneri ; Irene Finocchi ; Giuseppe F. Italiano (eds.)

En conferencia: 6º Italian Conference on Algorithms and Complexity (CIAC) . Rome, Italy . May 29, 2006 - May 31, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Algorithm Analysis and Problem Complexity; Data Structures; Computation by Abstract Devices; Discrete Mathematics in Computer Science; Computer Graphics

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-34375-2

ISBN electrónico

978-3-540-34378-3

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Reliable and Efficient Geometric Computing

Kurt Mehlhorn

Reliable implementation of geometric algorithms is a notoriously difficult task. Algorithms are usually designed for the Real-RAM, capable of computing with real numbers in the sense of mathematics, and for non-degenerate inputs. But, real computers are not Real-RAMs and inputs are frequently degenerate.

In the first part of the talk we illustrate the pitfalls of geometric computing by way of examples [KMP04]. The examples demonstrate in a lucid way that standard and frequently taught algorithms can go completely astray when naively implemented with floating point arithmetic.

- Invited Talks | Pp. 1-2

Beware of the Model: Reflections on Algorithmic Research

Franco P. Preparata

Over the past four decades the design and analysis of algorithms has been a vibrant area of computer science research, since it was early realized that adoption of a superior algorithm could achieve accelerations unattainable by conceivable technological improvements.

- Invited Talks | Pp. 3-4

On Search Problems in Complexity Theory and in Logic (Abstract)

Pavel Pudlák

A search problem is given by a binary relation (,) in , such that ∀  ∃ ,|| ≤ (||) (,). The computational task is for given find such a . We believe that in general this is not possible in polynomial time and oracles are known for which this is the case.

Many-to-one and Turing reductions between search problems are defined in a natural way. We conjecture that there is no complete search problem.

Our aim is to classify search problems and show relations between the computational complexities of them and the proof complexities of the sentences ∀  ∃ ,|| ≤ (||) (,). A typical example of a class of search problems is the class Polynomial Local Search defined as follows.

A problem is given by a -time relation (,) and a -time function (,) such that (,) holds for all . The search problem is for every and ≤ to find a ≤ such that

A typical result relating proof complexity and computational complexity of search problems is the following theorem of Buss and Krajíček.

- Invited Talks | Pp. 5-5

Covering a Set of Points with a Minimum Number of Lines

Magdalene Grantson; Christos Levcopoulos

We consider the minimum line covering problem: given a set of points in the plane, we want to find the smallest number of straight lines needed to cover all points in . We show that this problem can be solved in ( log ) time if ∈ (log), and that this is optimal in the algebraic computation tree model (we show that the Ω(log ) lower bound holds for all values of up to ). Furthermore, a (log )-factor approximation can be found within the same ( log ) time bound if . For the case when ∈ Ω(log ) we suggest how to improve the time complexity of the exact algorithm by a factor exponential in .

- Session 1 | Pp. 6-17

Approximation Algorithms for Capacitated Rectangle Stabbing

Guy Even; Dror Rawitz; Shimon (Moni) Shahar

In the rectangle stabbing problem we are given a set of axis parallel rectangles and a set of horizontal and vertical lines, and our goal is to find a minimum size subset of lines that intersect all the rectangles. We study the capacitated version of this problem in which the input includes an integral capacity for each line that bounds the number of rectangles that the line can cover. We consider two versions of this problem. In the first, one is allowed to use only a single copy of each line (), and in the second, one is allowed to use multiple copies of every line provided that multiplicities are counted in the size of the solution ().

For the case of -dimensional rectangle stabbing with soft capacities, we present a 6-approximation algorithm and a 2-approximation algorithm when = 1. For the case of hard capacities, we present a bi-criteria algorithm that computes 16-approximate solutions that use at most two copies of every line. For the one dimensional case, an 8-approximation algorithm for hard capacities is presented.

- Session 1 | Pp. 18-29

In-Place Randomized Slope Selection

Henrik Blunck; Jan Vahrenhold

is a well-known algorithmic tool used in the context of computing robust estimators for fitting a line to a collection of points in the plane. We demonstrate that it is possible to perform slope selection in expected time using only constant extra space in addition to the space needed for representing the input. Our solution is based upon a space-efficient variant of Matoušek’s , and we believe that the techniques developed in this paper will prove helpful in the design of space-efficient randomized algorithms using samples. To underline this, we also sketch how to compute the repeated median line estimator in an in-place setting.

- Session 1 | Pp. 30-41

Quadratic Programming and Combinatorial Minimum Weight Product Problems

Walter Kern; Gerhard Woeginger

We present a fully polynomial time approximation scheme (FPTAS) for minimizing an objective (+)(+) under linear constraints ≤. Examples of such problems are combinatorial minimum weight product problems such as, e.g., the following: Given a graph =(,) and two edge weights find an – path that minimizes ()(), the product of its edge weights relative to and .

90C20, 90C26, 90C27.

- Session 2 | Pp. 42-49

Counting All Solutions of Minimum Weight Exact Satisfiability

Stefan Porschen

We show that the number of all solutions of minimum weight exact satisfiability can be found in (.||||+2) time, for a CNF formula containing propositional variables equipped with arbitrary real-valued weights. In recent years merely the unweighted counterpart of this problem has been studied [2, 3, 7].

- Session 2 | Pp. 50-59

Clause Shortening Combined with Pruning Yields a New Upper Bound for Deterministic SAT Algorithms

Evgeny Dantsin; Edward A. Hirsch; Alexander Wolpert

We give a deterministic algorithm for testing satisfiability of Boolean formulas in conjunctive normal form with no restriction on clause length. Its upper bound on the worst-case running time matches the best known upper bound for randomized satisfiability-testing algorithms [6]. In comparison with the randomized algorithm in [6], our deterministic algorithm is simpler and more intuitive.

- Session 2 | Pp. 60-68

Network Discovery and Verification with Distance Queries

Thomas Erlebach; Alexander Hall; Michael Hoffmann; Matúš Mihaľák

The network discovery (verification) problem asks for a minimum subset  ⊆  of queries in an undirected graph = (,) such that these queries discover all edges and non-edges of the graph. In the distance query model, a query at node returns the distances from to all other nodes in the graph. In the on-line network discovery problem, the graph is initially unknown, and the algorithm has to select queries one by one based only on the results of previous queries. We give a randomized on-line algorithm with competitive ratio for graphs on nodes. We also show lower bounds of and Ω(log) on the competitive ratio of deterministic and randomized on-line algorithms, respectively. In the off-line network verification problem, the graph is known in advance and the problem is to compute a minimum number of queries that verify all edges and non-edges. We show that the problem is -hard and present an (log)-approximation algorithm.

- Session 3 | Pp. 69-80