53 results on '"Zimand P"'
Search Results
2. A tale of two paths to vaccine acceptance: self-interest and collective interest effect, mediated by institutional trust, and moderated by gender
- Author
-
Ofrit Kol, Dorit Zimand-Sheiner, and Shalom Levy
- Subjects
History of scholarship and learning. The humanities ,AZ20-999 ,Social Sciences - Abstract
Abstract Coronavirus and other prevailing viruses continue to remain a health threat and challenge the efforts of institutions to promote vaccination acceptance. The current study’s aim is to propose a conceptual framework explaining the role of individual motivators (such as self-interest and collective interest) in shaping attitudes toward vaccination while emphasizing the pivotal role of institutional trust as a mediator and gender as a moderator. Data were collected via an online panel survey among Israelis (N = 464), and SEM statistics were used to test the model empirically. The path analysis model supports the positive direct effect of collective interest and the negative effect of self-interest. Additionally, it shows an indirect effect through the mediation effect of institutional trust and gender moderation. Therefore, institutional trust may significantly influence self-interest people’s attitudes toward vaccines. Furthermore, since females process information more comprehensively, their developed trustworthiness in institutions has an increased impact on vaccine acceptance. Theoretical and practical implications are discussed.
- Published
- 2024
- Full Text
- View/download PDF
3. Optimal Coding Theorems in Time-Bounded Kolmogorov Complexity
- Author
-
Lu, Zhenjian, Oliveira, Igor C., and Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
The classical coding theorem in Kolmogorov complexity states that if an $n$-bit string $x$ is sampled with probability $\delta$ by an algorithm with prefix-free domain then K$(x) \leq \log(1/\delta) + O(1)$. In a recent work, Lu and Oliveira [LO21] established an unconditional time-bounded version of this result, by showing that if $x$ can be efficiently sampled with probability $\delta$ then rKt$(x) = O(\log(1/\delta)) + O(\log n)$, where rKt denotes the randomized analogue of Levin's Kt complexity. Unfortunately, this result is often insufficient when transferring applications of the classical coding theorem to the time-bounded setting, as it achieves a $O(\log(1/\delta))$ bound instead of the information-theoretic optimal $\log(1/\delta)$. We show a coding theorem for rKt with a factor of $2$. As in previous work, our coding theorem is efficient in the sense that it provides a polynomial-time probabilistic algorithm that, when given $x$, the code of the sampler, and $\delta$, it outputs, with probability $\ge 0.99$, a probabilistic representation of $x$ that certifies this rKt complexity bound. Assuming the security of cryptographic pseudorandom generators, we show that no efficient coding theorem can achieve a bound of the form rKt$(x) \leq (2 - o(1)) \cdot \log(1/\delta) +$ poly$(\log n)$. Under a weaker assumption, we exhibit a gap between efficient coding theorems and existential coding theorems with near-optimal parameters. We consider pK$^t$ complexity [GKLO22], a variant of rKt where the randomness is public and the time bound is fixed. We observe the existence of an optimal coding theorem for pK$^t$, and employ this result to establish an unconditional version of a theorem of Antunes and Fortnow [AF09] which characterizes the worst-case running times of languages that are in average polynomial-time over all P-samplable distributions., Comment: Full version of a paper to be presented at ICALP 2022
- Published
- 2022
4. Online matching games in bipartite expanders and applications
- Author
-
Bauwens, Bruno and Zimand, Marius
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
We study connections between expansion in bipartite graphs and efficient online matching modeled via several games. In the basic game, an opponent switches {\em on} and {\em off} nodes on the left side and, at any moment, at most $K$ nodes may be on. Each time a node is switched on, it must be irrevocably matched with one of its neighbors. A bipartite graph has $e$-expansion up to $K$ if every set $S$ of at most $K$ left nodes has at least $e\#S$ neighbors. If all left nodes have degree $D$ and $e$ is close to $D$, then the graph is a lossless expander. We show that lossless expanders allow for a polynomial time strategy in the above game, and, furthermore, with a slight modification, they allow a strategy running in time $O(D \log N)$, where $N$ is the number of left nodes. Using this game and a few related variants, we derive applications in data structures and switching networks. Namely, (a) 1-query bitprobe storage schemes for dynamic sets (previous schemes work only for static sets),(b) explicit space- and time-efficient storage schemes for static and dynamic sets with non-adaptive access to memory (the first fully dynamic dictionary with non-adaptive probing using almost optimal space), and (c) non-explicit constant depth non-blocking $N$-connectors with poly$(\log N)$ time path finding algorithms whose size is optimal within a factor of $O(\log N)$ (previous connectors are double-exponentially slower)., Comment: The exposition has been improved and a few minor issues have been fixed
- Published
- 2022
5. 27 Open Problems in Kolmogorov Complexity
- Author
-
Romashchenko, Andrei, Shen, Alexander, and Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity - Abstract
The paper proposes open problems in classical Kolmogorov complexity. Each problem is presented with background information and thus the article also surveys some recent studies in the area., Comment: The paper has appeared in the Open Problems column of SIGACT News
- Published
- 2022
6. Online matching in lossless expanders
- Author
-
Zimand, Marius
- Subjects
Computer Science - Data Structures and Algorithms - Abstract
Bauwens and Zimand [BZ 2019] have shown that lossless expanders have an interesting online matching property. The result appears in an implicit form in [BZ 2019]. We present an explicit version of this property which is directly amenable to typical applications, prove it in a self-contained manner that clarifies the role of some parameters, and give two applications. A $(K, \epsilon)$ lossless expander is a bipartite graph such that any subset $S$ of size at most $K$ of nodes on the left side of the bipartition has at least $(1-\epsilon) D |S|$ neighbors, where $D$ is the left degree.The main result is that any such graph, after a slight modification, admits $(1-O(\epsilon)D, 1)$ online matching up to size $K$. This means that for any sequence $S=(x_1, \ldots, x_K)$ of nodes on the left side of the bipartition, one can assign in an online manner to each node $x_i$ in $S$ a set $A_i$ consisting of $(1-O(\epsilon))$ fraction of its neighbors so that the sets $A_1, \ldots, A_K$ are pairwise disjoint. "Online manner" refers to the fact that, for every $i$, the set of nodes assigned to $x_i$ only depends on the nodes assigned to $x_1, \ldots, x_{i-1}$. The first application concerns storage schemes for representing a set $S$, so that a membership query "Is $x \in S$?" can be answered probabilistically by reading a single bit. All the previous one-probe storage schemes were for a static set $S$. We show that a lossless expander can be used to construct a one-probe storage scheme for dynamic sets, i.e., sets in which elements can be inserted and deleted without affecting the representation of other elements. The second application is about non-blocking networks., Comment: Abstract shortened to meet arxiv requirements
- Published
- 2021
7. Universal codes in the shared-randomness model for channels with general distortion capabilities
- Author
-
Bauwens, Bruno and Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity ,68P30 - Abstract
We put forth new models for universal channel coding. Unlike standard codes which are designed for a specific type of channel, our most general universal code makes communication resilient on every channel, provided the noise level is below the tolerated bound, where the noise level t of a channel is the logarithm of its ambiguity (the maximum number of strings that can be distorted into a given one). The other more restricted universal codes still work for large classes of natural channels. In a universal code, encoding is channel-independent, but the decoding function knows the type of channel. We allow the encoding and the decoding functions to share randomness, which is unavailable to the channel. There are two scenarios for the type of attack that a channel can perform. In the oblivious scenario, codewords belong to an additive group and the channel distorts a codeword by adding a vector from a fixed set. The selection is based on the message and the encoding function, but not on the codeword. In the Hamming scenario, the channel knows the codeword and is fully adversarial. For a universal code, there are two parameters of interest: the rate, which is the ratio between the message length k and the codeword length n, and the number of shared random bits. We show the existence in both scenarios of universal codes with rate 1-t/n - o(1), which is optimal modulo the o(1) term. The number of shared random bits is O(log n) in the oblivious scenario, and O(n) in the Hamming scenario, which, for typical values of the noise level, we show to be optimal, modulo the constant hidden in the O() notation. In both scenarios, the universal encoding is done in time polynomial in n, but the channel-dependent decoding procedures are in general not efficient. For some weaker classes of channels we construct universal codes with polynomial-time encoding and decoding., Comment: Removed the mentioning of online matching, which is not used here
- Published
- 2020
8. Universal almost optimal compression and Slepian-Wolf coding in probabilistic polynomial time
- Author
-
Bauwens, Bruno and Zimand, Marius
- Subjects
Computer Science - Information Theory ,68Q30, 94A24, 94A15 ,F.2.3 - Abstract
In a lossless compression system with target lengths, a compressor ${\cal C}$ maps an integer $m$ and a binary string $x$ to an $m$-bit code $p$, and if $m$ is sufficiently large, a decompressor ${\cal D}$ reconstructs $x$ from $p$. We call a pair $(m,x)$ $\textit{achievable}$ for $({\cal C},{\cal D})$ if this reconstruction is successful. We introduce the notion of an optimal compressor ${\cal C}_\text{opt}$, by the following universality property: For any compressor-decompressor pair $({\cal C}, {\cal D})$, there exists a decompressor ${\cal D}'$ such that if $(m,x)$ is achievable for $({\cal C},{\cal D})$, then $(m+\Delta, x)$ is achievable for $({\cal C}_\text{opt}, {\cal D}')$, where $\Delta$ is some small value called the overhead. We show that there exists an optimal compressor that has only polylogarithmic overhead and works in probabilistic polynomial time. Differently said, for any pair $({\cal C}, {\cal D})$, no matter how slow ${\cal C}$ is, or even if ${\cal C}$ is non-computable, ${\cal C}_{\text{opt}}$ is a fixed compressor that in polynomial time produces codes almost as short as those of ${\cal C}$. The cost is that the corresponding decompressor is slower. We also show that each such optimal compressor can be used for distributed compression, in which case it can achieve optimal compression rates, as given in the Slepian-Wolf theorem, and even for the Kolmogorov complexity variant of this theorem. Moreover, the overhead is logarithmic in the number of sources, and unlike previous implementations of Slepian-Wolf coding, meaningful compression can still be achieved if the number of sources is much larger than the length of the compressed strings., Comment: 26 pages
- Published
- 2019
9. Secret key agreement from correlated data, with no prior information
- Author
-
Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Cryptography and Security - Abstract
A fundamental question that has been studied in cryptography and in information theory is whether two parties can communicate confidentially using exclusively an open channel. We consider the model in which the two parties hold inputs that are correlated in a certain sense. This model has been studied extensively in information theory, and communication protocols have been designed which exploit the correlation to extract from the inputs a shared secret key. However, all the existing protocols are not universal in the sense that they require that the two parties also know some attributes of the correlation. In other words, they require that each party knows something about the other party's input. We present a protocol that does not require any prior additional information. It uses space-bounded Kolmogorov complexity to measure correlation and it allows the two legal parties to obtain a common key that looks random to an eavesdropper that observes the communication and is restricted to use a bounded amount of space for the attack. Thus the protocol achieves complexity-theoretical security, but it does not use any unproven result from computational complexity. On the negative side, the protocol is not efficient in the sense that the computation of the two legal parties uses more space than the space allowed to the adversary., Comment: Several small errors have been fixed and the presentation has been improved, following the reviewers' observations
- Published
- 2019
10. On a conditional inequality in Kolmogorov complexity and its applications in communication complexity
- Author
-
Romashchenko, Andrei and Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Information Theory - Abstract
Romashchenko and Zimand~\cite{rom-zim:c:mutualinfo} have shown that if we partition the set of pairs $(x,y)$ of $n$-bit strings into combinatorial rectangles, then $I(x:y) \geq I(x:y \mid t(x,y)) - O(\log n)$, where $I$ denotes mutual information in the Kolmogorov complexity sense, and $t(x,y)$ is the rectangle containing $(x,y)$. We observe that this inequality can be extended to coverings with rectangles which may overlap. The new inequality essentially states that in case of a covering with combinatorial rectangles, $I(x:y) \geq I(x:y \mid t(x,y)) - \log \rho - O(\log n)$, where $t(x,y)$ is any rectangle containing $(x,y)$ and $\rho$ is the thickness of the covering, which is the maximum number of rectangles that overlap. We discuss applications to communication complexity of protocols that are nondeterministic, or randomized, or Arthur-Merlin, and also to the information complexity of interactive protocols., Comment: 15 pages, 1 figure
- Published
- 2019
11. Help me if you can: the advantage of farmers’ altruistic message appeal in generating engagement with social media posts during COVID-19
- Author
-
Zimand-Sheiner, Dorit, Kol, Ofrit, and Levy, Shalom
- Published
- 2022
- Full Text
- View/download PDF
12. An operational characterization of mutual information in algorithmic information theory
- Author
-
Romashchenko, Andrei and Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity - Abstract
We show that the mutual information, in the sense of Kolmogorov complexity, of any pair of strings $x$ and $y$ is equal, up to logarithmic precision, to the length of the longest shared secret key that two parties, one having $x$ and the complexity profile of the pair and the other one having $y$ and the complexity profile of the pair, can establish via a probabilistic protocol with interaction on a public channel. For $\ell > 2$, the longest shared secret that can be established from a tuple of strings $(x_1, \ldots , x_\ell)$ by $\ell$ parties, each one having one component of the tuple and the complexity profile of the tuple, is equal, up to logarithmic precision, to the complexity of the tuple minus the minimum communication necessary for distributing the tuple to all parties. We establish the communication complexity of secret key agreement protocols that produce a secret key of maximal length, for protocols with public randomness. We also show that if the communication complexity drops below the established threshold, then only very short secret keys can be obtained., Comment: 39 pages, 2 figures. A brief version of this work has been presented at 45th International Colloquium on Automata, Languages, and Programming (ICALP), Prague, July 10-13, 2018
- Published
- 2017
13. Distributed compression through the lens of algorithmic information theory: a primer
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Information Theory - Abstract
Distributed compression is the task of compressing correlated data by several parties, each one possessing one piece of data and acting separately. The classical Slepian-Wolf theorem (D. Slepian, J. K. Wolf, IEEE Transactions on Inf. Theory, 1973) shows that if data is generated by independent draws from a joint distribution, that is by a memoryless stochastic process, then distributed compression can achieve the same compression rates as centralized compression when the parties act together. Recently, the author (M. Zimand, STOC 2017) has obtained an analogue version of the Slepian-Wolf theorem in the framework of Algorithmic Information Theory (also known as Kolmogorov complexity). The advantage over the classical theorem, is that the AIT version works for individual strings, without any assumption regarding the generative process. The only requirement is that the parties know the complexity profile of the input strings, which is a simple quantitative measure of the data correlation. The goal of this paper is to present in an accessible form that omits some technical details the main ideas from the reference (M. Zimand, STOC 2017).
- Published
- 2017
14. List approximation for increasing Kolmogorov complexity
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Information Theory ,Mathematics - Logic - Abstract
It is impossible to effectively modify a string in order to increase its Kolmogorov complexity. But is it possible to construct a few strings, not longer than the input string, so that most of them have larger complexity? We show that the answer is yes. We present an algorithm that on input a string $x$ of length $n$ returns a list with $O(n^2)$ many strings, all of length $n$, such that 99\% of them are more complex than $x$, provided the complexity of $x$ is less than $n - \log \log n - O(1)$. We obtain similar results for other parameters, including a polynomial-time construction., Comment: This version corrects a bug in the previous version, which unfortunately is published in the proceedings of STACS 2017. Theorem 1.1 holds with parameters that are slightly weaker than previously claimed
- Published
- 2016
15. Kolmogorov complexity version of Slepian-Wolf coding
- Author
-
Zimand, Marius
- Subjects
Computer Science - Information Theory - Abstract
Alice and Bob are given two correlated n-bit strings x_1 and, respectively, x_2, which they want to losslessly compress and send to Zack. They can either collaborate by sharing their strings, or work separately. We show that there is no disadvantage in the second scenario: Alice and Bob, without knowing the other party's string, can achieve almost optimal compression in the sense of Kolmogorov complexity. Furthermore, compression takes polynomial time and can be made at any combination of lengths that satisfy some necessary conditions (modulo additive polylog terms). More precisely, there exist probabilistic algorithms E_1, E_2, and deterministic algorithm D, with E_1 and E_2 running in polynomial time, having the following behavior: if n_1, n_2 are two integers satisfying n_1 + n_2 \geq C(x_1,x_2), n_1 \geq C(x_1 | x_2), n_2 \geq C(x_2 | x_1), then for i \in {1,2}, E_i on input x_i and n_i outputs a string of length n_i + \polylog n such that D on input E_1(x_1), E_2(x_2) reconstructs (x_1,x_2) with high probability (where C(x) denotes the plain Kolmogorov complexity of x, and C(x \mid y) is the complexity of x conditioned by y). Our main result is more general, as it deals with the compression of any constant number of correlated strings. It is an analog in the framework of algorithmic information theory of the classic Slepian-Wolf Theorem, a fundamental result in network information theory, in which x_1 and x_2 are realizations of two discrete random variables formed by drawing independently n times from a joint distribution. Also, in the classical result, the decompressor needs to know the joint distribution of the sources. In our result no type of independence is assumed and the decompressor does not have any apriori information about the sources that are compressed, and it still is the case that distributed compression is on a par with centralized compression., Comment: Accepted at STOC 2017. This revision has a few minor changes
- Published
- 2015
16. On approximate decidability of minimal programs
- Author
-
Teutsch, Jason and Zimand, Marius
- Subjects
Mathematics - Logic ,Computer Science - Computational Complexity ,Computer Science - Logic in Computer Science - Abstract
An index $e$ in a numbering of partial-recursive functions is called minimal if every lesser index computes a different function from $e$. Since the 1960's it has been known that, in any reasonable programming language, no effective procedure determines whether or not a given index is minimal. We investigate whether the task of determining minimal indices can be solved in an approximate sense. Our first question, regarding the set of minimal indices, is whether there exists an algorithm which can correctly label 1 out of $k$ indices as either minimal or non-minimal. Our second question, regarding the function which computes minimal indices, is whether one can compute a short list of candidate indices which includes a minimal index for a given program. We give some negative results and leave the possibility of positive results as open questions.
- Published
- 2014
17. Linear list-approximation for short programs (or the power of a few random bits)
- Author
-
Bauwens, Bruno and Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,68Q17, 68Q30 ,F.2.3 - Abstract
A $c$-short program for a string $x$ is a description of $x$ of length at most $C(x) + c$, where $C(x)$ is the Kolmogorov complexity of $x$. We show that there exists a randomized algorithm that constructs a list of $n$ elements that contains a $O(\log n)$-short program for $x$. We also show a polynomial-time randomized construction that achieves the same list size for $O(\log^2 n)$-short programs. These results beat the lower bounds shown by Bauwens et al. \cite{bmvz:c:shortlist} for deterministic constructions of such lists. We also prove tight lower bounds for the main parameters of our result. The constructions use only $O(\log n)$ ($O(\log^2 n)$ for the polynomial-time result) random bits . Thus using only few random bits it is possible to do tasks that cannot be done by any deterministic algorithm regardless of its running time.
- Published
- 2013
18. On optimal language compression for sets in PSPACE/poly
- Author
-
Vinodchandran, N. V. and Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
We show that if DTIME[2^O(n)] is not included in DSPACE[2^o(n)], then, for every set B in PSPACE/poly, all strings x in B of length n can be represented by a string compressed(x) of length at most log(|B^{=n}|)+O(log n), such that a polynomial-time algorithm, given compressed(x), can distinguish x from all the other strings in B^{=n}. Modulo the O(log n) additive term, this achieves the information-theoretic optimum for string compression. We also observe that optimal compression is not possible for sets more complex than PSPACE/poly because for any time-constructible superpolynomial function t, there is a set A computable in space t(n) such that at least one string x of length n requires compressed(x) to be of length 2 log(|A^=n|)., Comment: submitted to Theory of Computing Systems
- Published
- 2013
19. Short lists with short programs in short time - a short proof
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
Bauwens, Mahklin, Vereshchagin and Zimand [ECCC TR13-007] and Teutsch [arxiv:1212.6104] have shown that given a string x it is possible to construct in polynomial time a list containing a short description of it. We simplify their technique and present a shorter proof of this result.
- Published
- 2013
20. Short lists with short programs in short time
- Author
-
Bauwens, Bruno, Makhlin, Anton, Vereshchagin, Nikolay, and Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Data Structures and Algorithms ,68Q17, 68Q30, 03D15, 03D25, 05C70, 05C85 ,F.1.2 ,F.2 ,G.2.2 - Abstract
Given a machine $U$, a $c$-short program for $x$ is a string $p$ such that $U(p)=x$ and the length of $p$ is bounded by $c$ + (the length of a shortest program for $x$). We show that for any standard Turing machine, it is possible to compute in polynomial time on input $x$ a list of polynomial size guaranteed to contain a O$(\log |x|)$-short program for $x$. We also show that there exists a computable function that maps every $x$ to a list of size $|x|^2$ containing a O$(1)$-short program for $x$. This is essentially optimal because we prove that for each such function there is a $c$ and infinitely many $x$ for which the list has size at least $c|x|^2$. Finally we show that for some standard machines, computable functions generating lists with $0$-short programs, must have infinitely often list sizes proportional to $2^{|x|}$.
- Published
- 2013
21. On efficient constructions of short lists containing mostly Ramsey graphs
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
One of the earliest and best-known application of the probabilistic method is the proof of existence of a 2 log n$-Ramsey graph, i.e., a graph with n nodes that contains no clique or independent set of size 2 log n. The explicit construction of such a graph is a major open problem. We show that a reasonable hardness assumption implies that in polynomial time one can construct a list containing polylog(n) graphs such that most of them are 2 log n-Ramsey.
- Published
- 2012
22. Symmetry of Information: A Closer Look
- Author
-
Zimand, Marius
- Subjects
Computer Science - Information Theory - Abstract
Symmetry of information establishes a relation between the information that x has about y (denoted I(x : y)) and the information that y has about x (denoted I(y : x)). In classical information theory, the two are exactly equal, but in algorithmical information theory, there is a small excess quantity of information that differentiates the two terms, caused by the necessity of packaging information in a way that makes it accessible to algorithms. It was shown in [Zim11] that in the case of strings with simple complexity (that is the Kolmogorov complexity of their Kolmogorov complexity is small), the relevant information can be packed in a very economical way, which leads to a tighter relation between I(x : y) and I(y : x) than the one provided in the classical symmetry-of-information theorem of Kolmogorov and Levin. We give here a simpler proof of this result, using a suggestion of Alexander Shen. This result implies a van Lambalgen- type theorem for finite strings and plain complexity: If x is c-random and y is c-random relative to x, then xy is O(c)-random. We show that a similar result holds for prefix-free complexity and weak-K-randomness., Comment: Revised form of a paper communicated at WTCS 2012, Feb. 2012, Auckland, New Zealand
- Published
- 2012
23. Nonuniform Kolmogorov extractors
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
We establish tight bounds on the amount on nonuniformity that is necessary for extracting a string with randomness rate 1 from a single source of randomness with lower randomness rate. More precisely, as instantiations of more general results, we show that while O(1) amount of advice regarding the source is not enough for extracting a string with randomness rate 1 from a source string with constant subunitary random rate, \omega(1) amount of advice is., Comment: This is a part of the conference paper from CCC 2011. It corrects an erroneus result from there, namely Theorem 4.8 (the new version has weaker parameters)
- Published
- 2012
24. On the optimal compression of sets in PSPACE
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,68Q30 - Abstract
We show that if DTIME[2^{O(n)}] is not included in DSPACE[2^{o(n)}], then, for every set B in PSPACE, all strings x in B of length n can be represented by a string compressed(x) of length at most log (|B^{=n}|) + O(log n), such that a polynomial-time algorithm, given compressed(x), can distinguish x from all the other strings in B^{=n}. Modulo the O(log n) additive trem, this achieves the information-theoretical optimum for string compression.
- Published
- 2011
25. Possibilities and impossibilities in Kolmogorov complexity extraction
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,68Q30 - Abstract
Randomness extraction is the process of constructing a source of randomness of high quality from one or several sources of randomness of lower quality. The problem can be modeled using probability distributions and min-entropy to measure their quality and also by using individual strings and Kolmogorov complexity to measure their quality. Complexity theorists are more familiar with the first approach. In this paper we survey the second approach. We present the connection between extractors and Kolmogorov extractors and the basic positive and negative results concerning Kolmogorov complexity extraction., Comment: Revised form of survey paper published in SIGACT News, Dec. 2010. A few corrections and references have been added
- Published
- 2011
26. Symmetry of information and bounds on nonuniform randomness extraction via Kolmogorov extractors
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,68Q30, 68Q17 - Abstract
We prove a strong Symmetry of Information relation for random strings (in the sense of Kolmogorov complexity) and establish tight bounds on the amount on nonuniformity that is necessary for extracting a string with randomness rate 1 from a single source of randomness. More precisely, as instantiations of more general results, we show: (1) For all n-bit random strings x and y, x is random conditioned by y if and only if y is random conditioned by x, and (2) while O(1) amount of advice regarding the source is not enough for extracting a string with randomness rate 1 from a source string with constant random rate, \omega(1) amount of advice is. The proofs use Kolmogorov extractors as the main technical device., Comment: To appear in the proceedings of CCC 2011
- Published
- 2011
27. Counting dependent and independent strings
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
The paper gives estimations for the sizes of the the following sets: (1) the set of strings that have a given dependency with a fixed string, (2) the set of strings that are pairwise \alpha independent, (3) the set of strings that are mutually \alpha independent. The relevant definitions are as follows: C(x) is the Kolmogorov complexity of the string x. A string y has \alpha -dependency with a string x if C(y) - C(y|x) \geq \alpha. A set of strings {x_1, \ldots, x_t} is pairwise \alpha-independent if for all i different from j, C(x_i) - C(x_i | x_j) \leq \alpha. A tuple of strings (x_1, \ldots, x_t) is mutually \alpha-independent if C(x_{\pi(1)} \ldots x_{\pi(t)}) \geq C(x_1) + \ldots + C(x_t) - \alpha, for every permutation \pi of [t].
- Published
- 2010
- Full Text
- View/download PDF
28. Impossibility of independence amplification in Kolmogorov complexity theory
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity - Abstract
The paper studies randomness extraction from sources with bounded independence and the issue of independence amplification of sources, using the framework of Kolmogorov complexity. The dependency of strings $x$ and $y$ is ${\rm dep}(x,y) = \max\{C(x) - C(x \mid y), C(y) - C(y\mid x)\}$, where $C(\cdot)$ denotes the Kolmogorov complexity. It is shown that there exists a computable Kolmogorov extractor $f$ such that, for any two $n$-bit strings with complexity $s(n)$ and dependency $\alpha(n)$, it outputs a string of length $s(n)$ with complexity $s(n)- \alpha(n)$ conditioned by any one of the input strings. It is proven that the above are the optimal parameters a Kolmogorov extractor can achieve. It is shown that independence amplification cannot be effectively realized. Specifically, if (after excluding a trivial case) there exist computable functions $f_1$ and $f_2$ such that ${\rm dep}(f_1(x,y), f_2(x,y)) \leq \beta(n)$ for all $n$-bit strings $x$ and $y$ with ${\rm dep}(x,y) \leq \alpha(n)$, then $\beta(n) \geq \alpha(n) - O(\log n)$.
- Published
- 2010
- Full Text
- View/download PDF
29. On generating independent random strings
- Author
-
Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity - Abstract
It is shown that from two strings that are partially random and independent (in the sense of Kolmogorov complexity) it is possible to effectively construct polynomially many strings that are random and pairwise independent. If the two initial strings are random, then the above task can be performed in polynomial time. It is also possible to construct in polynomial time a random string, from two strings that have constant randomness rate., Comment: CiE 2009, Heidelberg
- Published
- 2009
30. Extracting the Kolmogorov Complexity of Strings and Sequences from Sources with Limited Independence
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Information Theory - Abstract
An infinite binary sequence has randomness rate at least $\sigma$ if, for almost every $n$, the Kolmogorov complexity of its prefix of length $n$ is at least $\sigma n$. It is known that for every rational $\sigma \in (0,1)$, on one hand, there exists sequences with randomness rate $\sigma$ that can not be effectively transformed into a sequence with randomness rate higher than $\sigma$ and, on the other hand, any two independent sequences with randomness rate $\sigma$ can be transformed into a sequence with randomness rate higher than $\sigma$. We show that the latter result holds even if the two input sequences have linear dependency (which, informally speaking, means that all prefixes of length $n$ of the two sequences have in common a constant fraction of their information). The similar problem is studied for finite strings. It is shown that from any two strings with sufficiently large Kolmogorov complexity and sufficiently small dependence, one can effectively construct a string that is random even conditioned by any one of the input strings.
- Published
- 2009
31. Algorithmically independent sequences
- Author
-
Calude, Cristian and Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Software Engineering ,Mathematics - Algebraic Geometry - Abstract
Two objects are independent if they do not affect each other. Independence is well-understood in classical information theory, but less in algorithmic information theory. Working in the framework of algorithmic information theory, the paper proposes two types of independence for arbitrary infinite binary sequences and studies their properties. Our two proposed notions of independence have some of the intuitive properties that one naturally expects. For example, for every sequence $x$, the set of sequences that are independent (in the weaker of the two senses) with $x$ has measure one. For both notions of independence we investigate to what extent pairs of independent sequences, can be effectively constructed via Turing reductions (from one or more input sequences). In this respect, we prove several impossibility results. For example, it is shown that there is no effective way of producing from an arbitrary sequence with positive constructive Hausdorff dimension two sequences that are independent (even in the weaker type of independence) and have super-logarithmic complexity. Finally, a few conjectures and open questions are discussed.
- Published
- 2008
32. Two sources are better than one for increasing the Kolmogorov complexity of infinite sequences
- Author
-
Zimand, Marius
- Subjects
Computer Science - Information Theory ,Computer Science - Computational Complexity - Abstract
The randomness rate of an infinite binary sequence is characterized by the sequence of ratios between the Kolmogorov complexity and the length of the initial segments of the sequence. It is known that there is no uniform effective procedure that transforms one input sequence into another sequence with higher randomness rate. By contrast, we display such a uniform effective procedure having as input two independent sequences with positive but arbitrarily small constant randomness rate. Moreover the transformation is a truth-table reduction and the output has randomness rate arbitrarily close to 1., Comment: Theorem 4.15 replaced with a weaker version; several other minor changes
- Published
- 2007
33. Simple extractors via constructions of cryptographic pseudo-random generators
- Author
-
Zimand, Marius
- Subjects
Computer Science - Computational Complexity ,Computer Science - Cryptography and Security - Abstract
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-correcting codes and that are very simple and efficient. For example, one extractor produces each output bit separately in $O(\log^2 n)$ time. These extractors work for weak sources with min entropy $\lambda n$, for arbitrary constant $\lambda > 0$, have seed length $O(\log^2 n)$, and their output length is $\approx n^{\lambda/3}$., Comment: 21 pages, an extended abstract will appear in Proc. ICALP 2005; small corrections, some comments and references added
- Published
- 2005
34. Almost-Everywhere Superiority for Quantum Computing
- Author
-
Hemaspaandra, Edith, Hemaspaandra, Lane A., and Zimand, Marius
- Subjects
Quantum Physics ,Computer Science - Computational Complexity - Abstract
Simon as extended by Brassard and H{\o}yer shows that there are tasks on which polynomial-time quantum machines are exponentially faster than each classical machine infinitely often. The present paper shows that there are tasks on which polynomial-time quantum machines are exponentially faster than each classical machine almost everywhere., Comment: 16 pages
- Published
- 1999
35. List Approximation for Increasing Kolmogorov Complexity
- Author
-
Marius Zimand
- Subjects
Kolmogorov complexity ,random strings ,extractors ,Mathematics ,QA1-939 - Abstract
It is impossible to effectively modify a string in order to increase its Kolmogorov complexity. However, is it possible to construct a few strings, no longer than the input string, so that most of them have larger complexity? We show that the answer is yes. We present an algorithm that takes as input a string x of length n and returns a list with O(n2) strings, all of length n, such that 99% of them are more complex than x, provided the complexity of x is less than n−loglogn−O(1). We also present an algorithm that obtains a list of quasi-polynomial size in which each element can be produced in polynomial time.
- Published
- 2021
- Full Text
- View/download PDF
36. Deconstructing the Blueprint for Infringement: Remedying Flawed Interpretations of the § 120(a) Exception to Architecture Copyrights.
- Author
-
Zimand, Margalit
- Abstract
The article addresses the flawed interpretations of Section 120(a) exception to architecture copyrights in the U.S. Architectural Works Copyright Protection Act of 1990 (AWCPA). Topics include how the Congress failed to perceive the ambiguities of the interpretation, the history of the inclusion of architecture in the Berne Convention and the U.S. implementation of the Convention, a background on AWCPA, and the linguistic points that were in contention during its drafting.
- Published
- 2024
- Full Text
- View/download PDF
37. A (local) apple a day: pandemic-induced changes in local food buying, a generational cohort perspective
- Author
-
Kol, Ofrit, Zimand-Sheiner, Dorit, and Levy, Shalom
- Abstract
The COVID-19 pandemic has caused disruptive change in agri-food distribution around the world and accelerated local food buying which creates new challenges for managers in the food industry. The purposes of this study are to construct and empirically test a conceptual model that integrates expectancy value theory with social and environmental values (pro-environmental behaviour, altruism and ethnocentricity) in order to explain this change in buying behaviour. In addition, the predictive model is examined among various generational cohorts. For the purposes of this research, an online panel study was conducted, employing a stratified sampling method (n= 672). The results reveal that social and environmental values have a significant effect on consumer positive attitude toward buying, intention to buy, and actual change in local food buying. Nevertheless, the effects differ among generational cohorts emphasising the different roles of social and environmental values among generations on sustainable consumption. Recommendations for practitioners and policy makers are suggested.
- Published
- 2023
- Full Text
- View/download PDF
38. Effective category and measure in abstract complexity theory
- Author
-
Calude, C. and Zimand, M.
- Published
- 1996
- Full Text
- View/download PDF
39. On the size of classes with weak membership properties
- Author
-
Zimand, M.
- Published
- 1998
- Full Text
- View/download PDF
40. Basic fibroblast growth factor induces myocardial hypertrophy following acute infarction in rats
- Author
-
Scheinowitz, M, Kotlyar, A, Zimand, S, Ohad, D, Leibovitz, I, Bloom, N, Goldberg, I, Nass, D, Engelberg, S, Savion, N, and Eldar, M
- Abstract
Basic fibroblast growth factor (bFGF) is a potent mitogen which induces growth of collateral vessels in ischaemic and infarcted myocardium. The effect of systemically administered bFGF on left ventricular (LV) function, myocardial hypertrophy and LV remodelling following acute myocardial infarction (MI) have not yet been fully investigated. Thirty Sprague‐Dawley male rats were randomized to receive bFGF (0.5 mg) or rat albumin intraperitoneally for 1 week, beginning immediately after the induction of MI. Five animals served as controls and did not undergo any operation. Animals were killed 6 weeks after surgery and the hearts were perfused and fixed at physiological pressure. Transverse cross‐sections from infarcted areas were stained with antibodies against proliferating cell nuclear antigen (PCNA) and Masson‐trichrome and analysed with a coloured‐image analyser for LV area (mm2), LV cavity diameter (mm), infarcted area (%), and wall thickness (mm) in infarcted and non‐infarcted regions. LV area was similar in MI rats and in controls (41.7 +/− 6.9 and 43.0 +/− 1.5 mm2, respectively) and was significantly larger in MI bFGF‐treated (MI/bFGF) animals (47.6 +/− 7.1 mm2) (P = 0.023). LV cavity diameter was significantly larger in the MI group than in MI/bFGF and control animals (6.0 +/− 0.8, 4.9 +/− 1.4, and 4.4 +/− 0.8 mm, respectively, P = 0.018). Wall thickness in the non‐infarcted region was significantly smaller in MI animals (1.4 +/− 0.3 mm) than in MI/bFGF animals (1.6 +/− 0.4 mm) and the control group (1.6 +/− 0.1 mm) (P = 0.015). The ratio between LV cavity diameter/non‐MI wall thickness was higher in MI than in control and MI/bFGF groups (4.8 +/− 1.6, 2.7 +/− 0.6 and 3.3 +/− 1.8, respectively, P = 0.03). Proliferating endothelial cells were significantly more abundant in infarcted than in normal areas in both MI and MI/bFGF groups, but with no significant differences between the groups. Intraperitoneal administration of bFGF did not cause any untoward extracardiac effects. Thus, systemic bFGF administration following acute MI in rats prevents dilatation of the LV, induces hypertrophy of the non‐infarcted myocardium and exerts no untoward effects on extracardiac organs.
- Published
- 1998
- Full Text
- View/download PDF
41. The Changing Picture of Child Labor
- Author
-
Zimand, Gertrude Folks
- Published
- 1944
- Full Text
- View/download PDF
42. The Viceroys of India From Clive to Reading
- Author
-
Zimand, Savel
- Published
- 1926
- Full Text
- View/download PDF
43. Land Settlement for Ex-Service Men
- Author
-
Zimand, S.
- Published
- 1919
- Full Text
- View/download PDF
44. Left superior vena cava to the left atrium: do we have to change the traditional approach?
- Author
-
Zimand, Shahar, Benjamin, Patricia, Frand, Mira, Mishaly, David, Smolinsky, Aram K, and Hegesh, Julius
- Abstract
Left superior vena cava (LSVC) to the left atrium is a rare congenital cardiac complex, which may appear as an isolated anomaly, or as part of more complex cardiac anomalies. Traditionally, an intraatrial baffle was the preferred surgical technique. Although this technique has proved reliable and successful, acute ligation and extracardiac repair are simpler and easier solutions, requiring less myocardial ischemic time. We present 3 patients who underwent simple ligation and discuss the literature for other extracardiac options of surgical repair. Our patients had short transient congestion in the left upper part of their body that resolved completely after a few weeks, without further complications. We believe that either acute ligation or extracardiac repair is a much simpler yet effective solution to divert the left caval flow to the lesser circulation.
- Published
- 1999
- Full Text
- View/download PDF
45. Child Labor Legislation in the Southern Textile States
- Author
-
Zimand, Gertrude Folks
- Published
- 1939
- Full Text
- View/download PDF
46. Elizabeth H. Davidson. Child Labor Legislation in the Southern Textile States.
- Author
-
Zimand, Gertrude Folks
- Published
- 1939
47. 68 “INTERNALIZING” IN CHILDREN WITH CHRONIC GASTROINTESTINAL DISORDERS
- Author
-
Wood, Beatrice, Watkins, John B, Boyle, John T, Nogueira, Jose, and Zimand, Elana
- Abstract
Achenbach's Child Behavior Check List, a standardized test of psychosocial functioning, was used to assess the following groups (ages 6-16): Crohn's Disease (N=42), Ulcerative Colitis (UC)(N=27), Recurrent Abdominal Pain (RAP)(N=41) and healthy siblings (N=66). Groups were contrasted by scores on two subscales derived from factor analysis of test items. The “Internalizing” (I) subscale reflects depression, anxiety and withdrawal. The “Externalizing” (E) subscale reflects hyperaetivity, aggression and anti-social behavior. A standardized Disease Activity Index measured degree of illness.RESULTS: 1) Patient groups had higher “I” scores than sibling groups (p <.001). 2) RAP “I” scores were higher than Crohn's and UC's (p. <.001). 3) “I” scores correlate with disease activity for Crohn's (r =.5, p <.001), but not for UC. 4) Siblings of UC patients “externalize” (p<.001), as compared to siblings of Crohn's and RAP.CONCLUSIONS: A) “Internalizing” types of psychological problems occur with chronic gastrointestinal illness, and are worse for patients with non-organic abdominal pain syndromes. B) Crohn's and UC patients differ in the mechanisms underlying the relationship between psychological and disease factors. C) These findings indicate that psychological intervention should focus on “internalizing” types of symptoms and that Crohn's patients may be especially vulnerable during flares. D) Differences among sibling groups show that family patterns of behavior differ according to disease group. This indicates the importance of taking family context into account when developing and carrying out a treatment plan.
- Published
- 1985
- Full Text
- View/download PDF
48. On the topological size of p-m-complete degrees
- Author
-
Zimand, M.
- Published
- 1995
- Full Text
- View/download PDF
49. Minimum spanning hypertrees
- Author
-
Tomescu, I. and Zimand, M.
- Published
- 1994
- Full Text
- View/download PDF
50. If not empty, NP - P is topologically large
- Author
-
Zimand, M.
- Published
- 1993
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.