19 results
Search Results
2. Robustness of stochastic bandit policies.
- Author
-
Salomon, Antoine and Audibert, Jean-Yves
- Subjects
- *
ROBUST control , *STOCHASTIC analysis , *PROBABILITY theory , *DISTRIBUTION (Probability theory) , *COMPUTER systems , *COMPUTER science - Abstract
Abstract: This paper studies the deviations of the regret in a stochastic multi-armed bandit problem. When the total number of plays n is known beforehand by the agent, Audibert et al. [2] exhibit a policy such that with probability at least , the regret of the policy is of order log n. They have also shown that such a property is not shared by the popular ucb1 policy of Auer et al. [3]. This work first answers an open question: it extends this negative result to any anytime policy (i.e. any policy that does not take the number of plays n into account). Another contribution of this paper is to design robust anytime policies for specific multi-armed bandit problems in which some restrictions are put on the set of possible distributions of the different arms. We also show that, for any policy (i.e. even when the number of plays n is known), the regret is of order log n with probability at least , so that the policy of Audibert et al. has the best possible deviation properties. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
3. The complexity of the stamp folding problem.
- Author
-
Umesato, Takuya, Saitoh, Toshiki, Uehara, Ryuhei, Ito, Hiro, and Okamoto, Yoshio
- Subjects
- *
COMPUTATIONAL complexity , *POLYNOMIAL time algorithms , *COMPUTER algorithms , *COMBINATORIAL optimization , *COMPUTER systems , *COMPUTER science - Abstract
Abstract: There are many folded states consistent with a given mountain–valley pattern of equidistant creases on a long paper strip. We would like to fold a paper strip such that the number of paper layers between each pair of hinged paper segments, called the crease width at the crease point, is minimized. This problem is called the stamp folding problem and there are two variants of this problem: minimization of the maximum crease width, and minimization of the total crease width. This optimization problem was recently introduced and investigated from the viewpoint of the counting problem. However, its computational complexity is not known. In this paper, we first show that the minimization problem of the maximum crease width is strongly NP-complete. Hence we cannot solve the problem in polynomial time unless P=NP. We next propose an algorithm that solves the minimization problem. The algorithm itself is a straightforward one, but its analysis is not trivial. We show that this algorithm runs in time where is the number of creases and is the total crease width. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
4. A note on models for graph representations
- Author
-
Korman, Amos and Kutten, Shay
- Subjects
- *
REPRESENTATIONS of graphs , *COMPUTER simulation , *GRAPH labelings , *COMPUTER systems , *DISTRIBUTED algorithms , *ROUTING (Computer network management) , *COMPUTER science - Abstract
Abstract: This paper is intended more to ask questions than give answers. Specifically, we consider models for labeling schemes, and discuss issues regarding the number of labels consulted vs. the sizes of the labels. Recently, quite a few papers studied methods for representing network properties by assigning informative labels to the vertices of a network. Consider a graph function on pairs of vertices (for example, can be the distance function). In an -labeling scheme, the labels are constructed in such a way so that given the labels of any two vertices and , one can compute the function (e.g. the graph distance between and ) just by looking at these two labels. Some very involved lower bounds for the sizes of the labels were proven. Also, some highly sophisticated labeling schemes were developed to ensure short labels. In this paper, we demonstrate that such lower bounds are very sensitive to the number of vertices consulted. That is, we show several constructions of such labeling schemes that beat the lower bounds by large margins. Moreover, as opposed to the strong technical skills that were needed to develop the traditional labeling schemes, most of our schemes are almost trivial. The catch is that in our model, one needs to consult the labels of three vertices instead of two. That is, a query about vertices and can access also the label of some third vertex ( is determined by the labels of and ). More generally, we address the model in which a query about vertices and can access also the labels of other vertices. We term our generalized model labeling schemes with queries. The main importance of this model is theoretical. Specifically, this paper may serve as a first step towards investigating different tradeoffs between the amount of labels consulted and the amount of information stored at each vertex. As we show, if all vertices can be consulted then the problem almost reduces to the corresponding sequential problem. On the other hand, consulting just the labels of and (or even just the label of ) reduces the problem to a purely distributed one. Therefore, in a sense, our model spans a range of intermediate notions between the sequential and the distributed settings. In addition to the theoretical interest, we also show cases that schemes constructed for our model can be translated to the traditional model or to the sequential model, thus, simplifying the construction for those models as well. For implementing query labeling schemes in a distributed environment directly, we point at a potential usage for some new paradigms that became common recently, such as P2P and overlay networks. [Copyright &y& Elsevier]
- Published
- 2009
- Full Text
- View/download PDF
5. A uniform solution to SAT using membrane creation
- Author
-
Gutiérrez-Naranjo, Miguel A., Pérez-Jiménez, Mario J., and Romero-Campero, Francisco J.
- Subjects
- *
POLYNOMIALS , *COMPUTATIONAL complexity , *COMPUTER science , *AUTOPOIESIS , *COMPUTER systems - Abstract
Abstract: In living cells, new membranes are produced basically through two processes: mitosis and autopoiesis. These two processes have inspired two variants of cell-like membrane systems, namely P systems with active membranes and P systems with membrane creation. In this paper, we provide the first uniform, efficient solution to the SAT problem in the framework of recogniser P systems with membrane creation using dissolution rules. Recently the authors have proved that if the dissolution rules are not allowed to be used, then the polynomial complexity class associated with this variant of P systems is the standard complexity class P. This result, together with the main result of this paper, shows the surprising role of the apparently “innocent” operation of membrane dissolution. The use of this type of rule establishes the difference between efficiency and non-efficiency for P systems with membrane creation, and provides a barrier between P and NP (assuming ). [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
6. Small (purely) catalytic P systems simulating register machines.
- Author
-
Sosík, Petr and Langer, Miroslav
- Subjects
- *
SIMULATION methods & models , *BIOLOGICALLY inspired computing , *COMPUTATIONAL complexity , *MATHEMATICAL analysis , *COMPUTER science , *COMPUTER systems - Abstract
The paper contributes to the topic of (purely) catalytic P systems. Catalytic P systems represent the original and likely the simplest class of membrane computing models. It is known that (purely) catalytic P systems with two (respectively three) catalysts and one membrane can simulate any Minsky register machine and, hence, they are computationally complete. However, the problem of minimal size of such a universal catalytic P system remains open for about ten years. We improve known results about small catalytic P systems simulating register machines in three different modes (generating, accepting, computing functions). Together with some specific universal register machine [7] , one could eventually construct a small universal catalytic P system. As a consequence, we also improve the previous construction of a minimal catalytic P system generating a non-semilinear set, diminishing the number of necessary rules from 29 to 24. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
7. A description based on languages of the final non-deterministic automaton.
- Author
-
Ballester-Bolinches, A., Cosme-Llópez, E., and Esteban-Romero, R.
- Subjects
- *
PROGRAMMING languages , *MACHINE theory , *COMPUTER systems , *ALGEBRA , *INFORMATION theory , *COMPUTER science - Abstract
Abstract: The study of the behaviour of non-deterministic automata has traditionally focused on the languages which can be associated to the different states. Under this interpretation, the different branches that can be taken at every step are ignored. However, we can also take into account the different decisions which can be made at every state, that is, the branches that can be taken, and these decisions might change the possible future behaviour. In this case, the behaviour of the automata can be described with the help of the concept of bisimilarity. This is the kind of description that is usually obtained when the automata are regarded as labelled transition systems or coalgebras. Contrarily to what happens with deterministic automata, it is not possible to describe the behaviour up to bisimilarity of states of a non-deterministic automaton by considering just the languages associated to them. In this paper we present a description of a final object for the category of non-deterministic automata, regarded as labelled transition systems, with the help of some structures defined in terms of languages. As a consequence, we obtain a characterisation of bisimilarity of states of automata in terms of languages and a method to minimise non-deterministic automata with respect to bisimilarity of states. This confirms that languages can be considered as the natural objects to describe the behaviour of automata. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
8. General time consistent discounting.
- Author
-
Lattimore, Tor and Hutter, Marcus
- Subjects
- *
COMPUTER science , *ECONOMICS , *TIME series analysis , *EQUILIBRIUM , *COMPUTER systems - Abstract
Abstract: Modeling inter-temporal choice is a key problem in both computer science and economic theory. The discounted utility model of Samuelson is currently the most popular model for measuring the global utility of a time-series of local utilities. The model is limited by not allowing the discount function to change with the age of the agent. This is despite the fact that many agents, in particular humans, are best modelled with age-dependent discount functions. It is well known that discounting can lead to time-inconsistent behaviour where agents change their preferences over time. In this paper we generalise the discounted utility model to allow age-dependent discount functions. We then extend previous work in time-inconsistency to our new setting, including a complete characterisation of time-(in)consistent discount functions, the existence of sub-game perfect equilibrium policies where the discount function is time-inconsistent and a continuity result showing that “nearly” time-consistent discount rates lead to “nearly” time-consistent behaviour. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
9. Supervised learning and Co-training.
- Author
-
Darnstädt, Malte, Simon, Hans Ulrich, and Szörényi, Balázs
- Subjects
- *
MACHINE learning , *DATA analysis , *COMPUTER systems , *PRESUPPOSITION (Logic) , *COMPUTER science - Abstract
Abstract: Co-training under the Conditional Independence Assumption is among the models which demonstrate how radically the need for labeled data can be reduced if a huge amount of unlabeled data is available. In this paper, we explore how much credit for this saving must be assigned solely to the extra assumptions underlying the Co-training Model. To this end, we compute general (almost tight) upper and lower bounds on the sample size needed to achieve the success criterion of PAC-learning in the realizable case within the model of Co-training under the Conditional Independence Assumption in a purely supervised setting. The upper bounds lie significantly below the lower bounds for PAC-learning without Co-training. Thus, Co-training saves labeled data even when not combined with unlabeled data. On the other hand, the saving is much less radical than the known savings in the semi-supervised setting. [Copyright &y& Elsevier]
- Published
- 2014
- Full Text
- View/download PDF
10. State complexity of star of union and square of union on k regular languages.
- Author
-
Gao, Yuan and Kari, Lila
- Subjects
- *
COMPUTATIONAL complexity , *PROGRAMMING languages , *COMPUTER science , *COMPUTER systems , *MATHEMATICAL models , *ELECTRONIC data processing - Abstract
Abstract: In this paper, we investigate the state complexities of and , where , , are regular languages. We establish exact bounds for both of these general combined operations and show that they are much lower than the mathematical compositions of the state complexities of their basic individual component operations, but have similar forms with the state complexities of some participating combined operations. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
11. A complete proof system for propositional projection temporal logic.
- Author
-
Duan, Zhenhua, Zhang, Nan, and Koutny, Maciej
- Subjects
- *
COMPUTER systems , *SYNTAX in programming languages , *SEMANTICS , *AXIOMS , *PROOF theory , *COMPUTER science - Abstract
Abstract: The paper presents a proof system for Propositional Projection Temporal Logic (PPTL) with projection-plus. The syntax, semantics, and logical laws of PPTL are introduced together with an axiom system consisting of axioms and inference rules. To facilitate proofs, some of the frequently used theorems are proved. A normal form of PPTL formulas is presented, and the soundness and completeness of the proof system are demonstrated. To show how the axiom system works, a full omega regular property for the mutual exclusion problem is specified by a PPTL formula and then a deductive proof of the property is performed. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
12. Approximation algorithms for a bi-level knapsack problem.
- Author
-
Chen, Lin and Zhang, Guochuan
- Subjects
- *
APPROXIMATION algorithms , *KNAPSACK problems , *PROBABILITY theory , *SET theory , *COMPUTER science , *COMPUTER systems - Abstract
Abstract: In this paper, we consider a variant of the knapsack problem. There are two knapsacks with probably different capacities, owned by two agents respectively. Given a set of items, each with a fixed size and a profit. The two agents select items and pack them into their own knapsacks under the capacity constraint. Same items can be packed simultaneously to different knapsacks. However, in this case the profit of such items may vary. One agent packs items into his knapsack to maximize the total profit, while another agent can only pack items into his knapsack as well but he cares about the total profits of items packed into two knapsacks. The latter agent is a leader while the former is a follower. We aim at designing an approximation algorithm for the leader assuming that the follower is selfish. For different settings we provide approximation results. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
13. Semi-online scheduling problems on two uniform machines under a grade of service provision.
- Author
-
Lu, Xinrong and Liu, Zhaohui
- Subjects
- *
COMPUTER scheduling , *MATHEMATICAL optimization , *COMPUTER science , *COMPUTER systems , *COMPUTER algorithms , *SEQUENTIAL scheduling - Abstract
Abstract: This paper studies the semi-online scheduling on two uniform machines under a grade of service (GoS) provision, where one machine is available for all jobs and the other one is only available for partial jobs. The objective is to minimize the makespan. We consider three variants, where the optimal makespan, the total size of jobs, and the largest job size are known in advance respectively, and design optimal algorithms for all of them. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
14. On parallel complexity of analytic functions.
- Author
-
Yu, Fuxiang and Ko, Ker-I
- Subjects
- *
COMPUTATIONAL complexity , *INTEGRALS , *LOGIC circuits , *LOGARITHMS , *COMPUTER science , *COMPUTER systems - Abstract
Abstract: In this paper, we study the parallel complexity of analytic functions. We investigate the complexity of computing the derivatives, integrals, and zeros of or logarithmic-space computable analytic functions, where denotes the complexity class of sets acceptable by polynomial-size, polylogarithmic-depth, uniform Boolean circuits. It is shown that the derivatives and integrals of (or logarithmic-space) computable analytic functions remain (or, respectively, logarithmic-space) computable. We also study the problem of finding all zeros of an computable analytic function inside an computable Jordan curve, and show that, under a uniformity condition on the function values on the Jordan curve, all zeros can be found in . [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
15. Information flow in systems with schedulers, Part II: Refinement.
- Author
-
van der Meyden, Ron and Zhang, Chenyi
- Subjects
- *
INFORMATION storage & retrieval systems , *COMPUTER systems , *COMPUTER scheduling , *MACHINE theory , *COMPUTER security , *COMPUTER science - Abstract
Abstract: Refinement is a relation on system models: a concrete model is a refinement of a more abstract model if it has fewer behaviors. When properties of the abstract model are guaranteed to be preserved in the concrete model, refinement supports a top-down development process. This paper considers preservation of a range of information flow security properties in synchronous systems with schedulers, when these schedulers are refined. Notions of refinement are defined for both an abstract notion of scheduler as well as for their concrete representation as automata. The security properties that are preserved by refinement over schedulers are then characterized. The results are applied to characterize a number of scheduler independent security properties, which state that a system is secure with respect to all schedulers. [Copyright &y& Elsevier]
- Published
- 2013
- Full Text
- View/download PDF
16. Improving the Hadamard extractor
- Author
-
Bouda, Jan, Pivoluska, Matej, and Plesch, Martin
- Subjects
- *
DISTRIBUTION (Probability theory) , *UNIFORM distribution (Probability theory) , *INPUT-output analysis , *COMPARATIVE studies , *COMPUTER systems , *COMPUTER science - Abstract
Abstract: In this paper we construct a strong randomness extractor with two independent -bit input distributions with min entropies (the probability of any particular output is upper bounded by and , respectively). For , our extractor produces one bit which is by the factor of closer to the uniform distribution, when compared to the Hadamard extractor. What is more, this distance drops to zero if at least one of the min entropies raises to . This is in sharp contrast to the Hadamard extractor which fails to produce even a single unbiased bit, even if one of the input distributions is uniform. We also extend our construction to produce bits of output with a bias that is by the factor of smaller than that of the corresponding Hadamard extractor and retains the ability to produce unbiased bits if one of the input distributions is uniform. The strongness property of the extractor is maintained in both cases, however, in the multi-bit scenario the bias is increased by the factor of . [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
17. Transfer of trust in event-based reputation systems
- Author
-
Nielsen, Mogens and Krukow, Karl
- Subjects
- *
COMPUTER science , *INFORMATION technology , *RECOMMENDER systems , *SECURITY systems , *COMPUTER systems , *ELECTRONIC data processing - Abstract
Abstract: In the Global Computing scenario, trust-based systems have been proposed and studied as an alternative to traditional security mechanisms. A promising line of research concerns the so-called reputation-based computational trust. The approach here is that trust in a computing agent is defined in terms of evidence of future behaviour based on interactions in the past with its environment. We have previously argued how concepts and models from concurrency theory can answer some fundamental challenges in the representation of such interaction behaviour over time, using event structures as our choice of model from concurrency theory. In this paper, we continue this line of research, addressing the problem on how to transfer trust from one behavioural context to another. Our proposed frameworks build on morphisms between event structures, and we prove some generic results guaranteeing formal properties of transfers in the frameworks. [Copyright &y& Elsevier]
- Published
- 2012
- Full Text
- View/download PDF
18. Compressed data structures: Dictionaries and data-aware measures
- Author
-
Gupta, Ankur, Hon, Wing-Kai, Shah, Rahul, and Vitter, Jeffrey Scott
- Subjects
- *
DATA compression , *COMPUTER systems , *COMPUTER science , *ENCYCLOPEDIAS & dictionaries , *ELECTRONIC dictionaries - Abstract
In this paper, we propose measures for compressed data structures, in which space usage is measured in a data-aware manner. In particular, we consider the fundamental dictionary problem on set data, where the task is to construct a data structure for representing a set of items out of a universe and supporting various queries on . We use a well-known data-aware measure for set data called gap to bound the space of our data structures. We describe a novel dictionary structure that requires bits. Under the RAM model, our dictionary supports membership, rank, and predecessor queries in nearly optimal time, matching the time bound of Andersson and Thorup’s predecessor structure [A. Andersson, M. Thorup, Tight(er) worst-case bounds on dynamic searching and priority queues, in: ACM Symposium on Theory of Computing, STOC, 2000], while simultaneously improving upon their space usage. We support select queries even faster in time. Our dictionary structure uses exactly bits in the leading term (i.e., the constant factor is 1) and answers queries in near-optimal time. When seen from the worst-case perspective, we present the first -bit dictionary structure that supports these queries in near-optimal time under the RAM model. We also build a dictionary which requires the same space and supports membership, select, and partial rank queries even more quickly in time. We go on to show that for many (real-world) datasets, data-aware methods lead to a worthwhile compression over combinatorial methods. To the best of our knowledge, these are the first results that achieve data-aware space usage and retain near-optimal time. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
19. Quorum sensing P systems
- Author
-
Bernardini, Francesco, Gheorghe, Marian, and Krasnogor, Natalio
- Subjects
- *
COMPUTER science , *TURING machines , *COMPUTER systems , *MACHINE theory , *COMPUTER simulation - Abstract
Abstract: This paper continues the investigation of population P systems model [F. Bernardini, M. Gheorghe, Population P systems, Journal of Universal Computer Science 10 (5) (2004) 509–539] by considering bacterium quorum sensing (QS) phenomena as the basis of the new approach. A new computational model called QS P system is introduced. It is proved that QS P systems are able to simulate counter machines, and hence they are equivalent in power to Turing machines. An example of a QS P system modelling the behaviour of Vibrio fischeri bacteria colonies is also presented and the emergence of the QS mechanism is illustrated. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.