SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Håstad Johan) "

Search: WFRF:(Håstad Johan)

  • Result 1-10 of 86
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Håstad, Johan, et al. (author)
  • A smaller sleeping bag for a baby snake
  • 2001
  • In: Discrete & Computational Geometry. - : Springer Science and Business Media LLC. - 0179-5376 .- 1432-0444. ; 26:1, s. 173-181
  • Journal article (peer-reviewed)abstract
    • By a sleeping bag for a baby snake in d dimensions we mean a subset of Rd which can cover, by rotation and translation, every curve of unit length. We construct sleeping bags which are smaller than any previously known in dimensions 3 and higher. In particular, we construct a three-dimensional sleeping bag of volume approximately 0.075803. For large d we construct d-dimensional sleeping bags with volume less than (cvlog d)d/d3d/2 for some constant c. To obtain the last result, we show that every curve of unit length in Rd lies between two parallel hyperplanes at distance at most C1d-3/2vlog d, for some constant c1.
  •  
2.
  • Andersson, Arne, et al. (author)
  • Tight bounds for searching a sorted array of strings
  • 2000
  • In: SIAM journal on computing (Print). - 0097-5397 .- 1095-7111. ; 30:5, s. 1552-1578
  • Journal article (peer-reviewed)abstract
    • Given a k-character query string and an array of n strings arranged in lexicographical order, computing the rank of the query string among the n strings or deciding whether it occurs in the array requires the inspection [GRAPHICS] characters in the worst case.
  •  
3.
  • Andersson, G., et al. (author)
  • A new way of using semidefinite programming with applications to linear equations mod p
  • 2001
  • In: Journal of Algorithms. - : Elsevier BV. - 0196-6774 .- 1090-2678. ; 39:2, s. 162-204
  • Journal article (peer-reviewed)abstract
    • We introduce a new method of constructing approximation algorithms for combinatorial optimization problems using semidefinite programming. It consists of expressing each combinatorial object in the original problem as a constellation of vectors in the semidefinite program. When we apply this technique to systems of linear equations mod p with at most two variables in each equation, we can show that the problem is approximable within (1 - kappa (p))p, where kappa (p)> 0 for all p. Using standard techniques we also show that it is NP-hard to approximate the problem within a constant ratio, independent of p.
  •  
4.
  • Aumann, Y., et al. (author)
  • Linear-consistency testing
  • 2001
  • In: Journal of computer and system sciences (Print). - : Elsevier BV. - 0022-0000 .- 1090-2724. ; 62:4, s. 589-607
  • Journal article (peer-reviewed)abstract
    • We extend the notion of linearity testing to the task of checking linear consistency of multiple functions. Informally, functions are linear if their graphs form straight lines on the plane. Two such functions are consistent if the lines have the same slope. We propose a variant of a test of M. Blum et al. (J. Comput. System Sci. 47 (1993), 549-595) to check the linear consistency of three functions f(1). f(2). f(3) mapping a finite Abelian group G to an Abelian group H: Pick x, y is an element of G uniformly and independently at random and check if f(1)(x) + f(2)(y) = f(3)(x + y). We analyze this test for two cases: (1) G and H are arbitrary Abelian groups and (2) G = F-2(n) and H = F-2. Questions bearing close relationship to linear-consistency testing seem to hav e been implicitly considered in recent work on the construction of PCPs and in particular in the work of J. Hastad [9] (in Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing. El Paso. Texas, 4-6 May 1997, pp. 1-10). It is abstracted explicitly for the first time here. As an application of our results we give yet another new and tight characterization of NP. namely For All epsilon > 0, NP = MIP1-epsilon 1/2 [O(log n), 3, 1]. That is, every language in NP has 3-prover 1-round proof systems in which the verifier tosses O(log n) coins and asks each of the three provers one question each. The provers respond with one bit each such that the verifier accepts instance of the language with probability 1 - epsilon and rejects noninstances with probability at least;. Such a result is of some interest in the study of probabilistically checkable proofs.
  •  
5.
  • Austrin, Per, et al. (author)
  • (2 + epsilon)-Sat Is NP-hard
  • 2014
  • In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. - 9781479965175 ; , s. 1-10
  • Conference paper (peer-reviewed)abstract
    • We prove the following hardness result for anatural promise variant of the classical CNF-satisfiabilityproblem: Given a CNF-formula where each clause has widthw and the guarantee that there exists an assignment satisfyingat least g = [w/2]-1 literals in each clause, it is NP-hard tofind a satisfying assignment to the formula (that sets at leastone literal to true in each clause). On the other hand, when g = [w/2], it is easy to find a satisfying assignment via simplegeneralizations of the algorithms for 2-SAT. Viewing 2-SAT σ P as easiness of SAT when 1-in-2 literals are true in every clause, and NP-hardness of 3-SAT as intractability of SAT when 1-in-3 literals are true, our resultshows, for any fixed ε > 0, the hardness of finding a satisfyingassignment to instances of '(2 + ε)-SAT' where the density ofsatisfied literals in each clause is promised to exceed 1/(2+ε). We also strengthen the results to prove that given a (2k + 1)-uniform hypergraph that can be 2-colored such that each edgehas perfect balance (at most k + 1 vertices of either color), itis NP-hard to find a 2-coloring that avoids a monochromaticedge. In other words, a set system with discrepancy 1 is hard todistinguish from a set system with worst possible discrepancy.
  •  
6.
  • Austrin, Per, et al. (author)
  • (2 + ϵ)-SAT is NP-hard
  • 2017
  • In: SIAM journal on computing (Print). - : Society for Industrial and Applied Mathematics Publications. - 0097-5397 .- 1095-7111. ; 46:5, s. 1554-1573
  • Journal article (peer-reviewed)abstract
    • We prove the following hardness result for a natural promise variant of the classical CNF-satisfiability problem: Given a CNF-formula where each clause has width w and the guarantee that there exists an assignment satisfying at least g = [w/2]-1 literals in each clause, it is NP-hard to find a satisfying assignment to the formula (that sets at least one literal to true in each clause). On the other hand, when g = [w/2], it is easy to find a satisfying assignment via simple generalizations of the algorithms for 2-Sat. Viewing 2-Sat 2 P as tractability of Sat when 1 in 2 literals are true in every clause, and NP-hardness of 3-Sat as intractability of Sat when 1 in 3 literals are true, our result shows, for any fixed ϵ > 0, the difficulty of finding a satisfying assignment to instances of "(2 + ϵ)-Sat" where the density of satisfied literals in each clause is guaranteed to exceed 1/2+ϵ. We also strengthen the results to prove that, given a (2k +1)-uniform hypergraph that can be 2-colored such that each edge has perfect balance (at most k +1 vertices of either color), it is NP-hard to find a 2-coloring that avoids a monochromatic edge. In other words, a set system with discrepancy 1 is hard to distinguish from a set system with worst possible discrepancy. Finally, we prove a general result showing the intractability of promise constraint satisfaction problems based on the paucity of certain "weak polymorphisms." The core of the above hardness results is the claim that the only weak polymorphisms in these particular cases are juntas depending on few variables.
  •  
7.
  • Austrin, Per, 1981- (author)
  • Conditional Inapproximability and Limited Independence
  • 2008
  • Doctoral thesis (other academic/artistic)abstract
    • Understanding the theoretical limitations of efficient computation is one of the most fundamental open problems of modern mathematics. This thesis studies the approximability of intractable optimization problems. In particular, we study so-called Max CSP problems. These are problems in which we are given a set of constraints, each constraint acting on some k variables, and are asked to find an assignment to the variables satisfyingas many of the constraints as possible. A predicate P : [q]ᵏ → {0, 1} is said to be approximation resistant if it is intractable to approximate the corresponding CSP problem to within a factor which is better than what is expected from a completely random assignment to the variables. We prove that if the Unique Games Conjecture is true, then a sufficient condition for a predicate P :[q]ᵏ → {0, 1} to be approximation resistant is that there exists a pairwise independent distribution over [q]ᵏ which is supported on the set of satisfying assignments Pˉ¹(1) of P. We also study predicates P : {0, 1}² → {0, 1} on two boolean variables. The corresponding CSP problems include fundamental computational problems such as Max Cut and Max 2-Sat. For any P, we give an algorithm and a Unique Games-based hardness result. Under a certain geometric conjecture, the ratios of these two results are shown to match exactly. In addition, this result explains why additional constraints beyond the standard “triangle inequalities” do not appear to help when solving these problems. Furthermore,we are able to use the generic hardness result to obtain improved hardness for the special cases of Max 2-Sat and Max 2-And. For Max 2-Sat, we obtain a hardness of αLLZ + ε ≈ 0.94016, where αLLZ is the approximation ratio of the algorithm due to Lewin, Livnat and Zwick. For Max 2-And, we obtain a hardness of 0.87435. For both of these problems, our results surprisingly demonstrate that the special case of balanced instances (instances where every variable occurs positively and negatively equally often) is not the hardest. Furthermore, the result for Max 2-And also shows that Max Cut is not the hardest 2-CSP. Motivated by the result for k-CSP problems, and their fundamental importance in computer science in general, we then study t-wise independent distributions with random support. We prove that, with high probability, poly(q) ・ n² random points in [q]ⁿ can support a pairwise independent distribution. Then, again with high probability, we show that (poly(q) ・n)ᵗ log(nᵗ) random points in [q]ⁿ can support a t-wise independent distribution. For constant t and q, we show that Ω(nᵗ) random points are necessary in order to be able to support a t-wise independent balanced distribution with non-negligible probability. Also, we show that every subset of [q]ⁿ with size at least qⁿ(1−poly(q)ˉᵗ) can support a t-wise independent distribution. Finally, we prove a certain noise correlation bound for low-degree functions with small Fourier coefficients. This type of result is generally useful in hardness of approximation, derandomization, and additive combinatorics.
  •  
8.
  • Austrin, Per, et al. (author)
  • On the power of many one-bit provers
  • 2013
  • In: ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science. - New York : Association for Computing Machinery (ACM). - 9781450318594 ; , s. 215-220
  • Conference paper (peer-reviewed)abstract
    • We study the class of languages, denoted by MIP[k, 1-∈, s], which have k-prover games where each prover just sends a single bit, with completeness 1-∈ and soundness error s. For the case that k=1 (i.e., for the case of interactive proofs), Goldreich, Vadhan and Wigderson (Computational Complexity'02) demonstrate that SZK exactly characterizes languages having 1-bit proof systems with "non-trivial" soundness (i.e., 1/2 < s ≤ 1-2∈). We demonstrate that for the case that k ≥ 2, 1-bit k-prover games exhibit a significantly richer structure: •(Folklore) When s ≤ 1/2 k - ∈, MIP[k, 1-∈, s] = BPP; • When 1/2k + ∈ ≤ s < 2/2k -∈, MIP[k, 1-∈, s] = SZK; • When s ≥ 2/2k + ∈, AM ⊆ MIP[k, 1-∈, s]; • For s ≤ 0.62 k/2k and sufficiently large k, MIP[k, 1-∈, s] ⊆ EXP; • For s ≥ 2k/2k, MIP[k, 1, 1-∈, s] = NEXP. As such, 1-bit k-prover games yield a natural "quantitative" approach to relating complexity classes such as BPP, SZK, AM, EXP, and NEXP. We leave open the question of whether a more fine-grained hierarchy (between AM and NEXP) can be established for the case when s ≥ 2/2k + ∈.
  •  
9.
  • Austrin, Per, et al. (author)
  • On the Usefulness of Predicates
  • 2012
  • In: ACM Transactions on Computation Theory. - : Association for Computing Machinery (ACM). - 1942-3454 .- 1942-3462. ; 5:1
  • Journal article (peer-reviewed)abstract
    • Motivated by the pervasiveness of strong inapproximability results forMax-CSPs, we introduce a relaxed notion of an approximate solution of aMax-CSP. In this relaxed version, loosely speaking, the algorithm is allowed toreplace the constraints of an instance by some other (possibly real-valued)constraints, and then only needs to satisfy as many of the new constraints aspossible.To be more precise, we introduce the following notion of a predicate $P$being \emph{useful} for a (real-valued) objective $Q$: given an almostsatisfiable Max-$P$ instance, there is an algorithm that beats a randomassignment on the corresponding Max-$Q$ instance applied to the same sets ofliterals. The standard notion of a nontrivial approximation algorithm for aMax-CSP with predicate $P$ is exactly the same as saying that $P$ is useful for$P$ itself.We say that $P$ is useless if it is not useful for any $Q$. This turns out tobe equivalent to the following pseudo-randomness property: given an almostsatisfiable instance of Max-$P$ it is hard to find an assignment such that theinduced distribution on $k$-bit strings defined by the instance is notessentially uniform.Under the Unique Games Conjecture, we give a complete and simplecharacterization of useful Max-CSPs defined by a predicate: such a Max-CSP isuseless if and only if there is a pairwise independent distribution supportedon the satisfying assignments of the predicate. It is natural to also considerthe case when no negations are allowed in the CSP instance, and we derive asimilar complete characterization (under the UGC) there as well.Finally, we also include some results and examples shedding additional lighton the approximability of certain Max-CSPs.
  •  
10.
  • Austrin, P., et al. (author)
  • On the usefulness of predicates
  • 2012
  • In: 2012 IEEE 27th Annual Conference On Computational Complexity (CCC). - : IEEE. - 9780769547084 ; , s. 53-63
  • Conference paper (peer-reviewed)abstract
    • Motivated by the pervasiveness of strong in approximability results for Max-CSPs, we introduce a relaxed notion of an approximate solution of a Max-CSP. In this relaxed version, loosely speaking, the algorithm is allowed to replace the constraints of an instance by some other (possibly real-valued) constraints, and then only needs to satisfy as many of the new constraints as possible. To be more precise, we introduce the following notion of a predicate P being \emph{useful} for a (real-valued) objective Q: given an almost satisfiable Max-P instance, there is an algorithm that beats a random assignment on the corresponding Max-Q instance applied to the same sets of literals. The standard notion of a nontrivial approximation algorithm for a Max-CSP with predicate P is exactly the same as saying that P is useful for P itself. We say that P is useless if it is not useful for any Q. Under the Unique Games Conjecture, we can give a complete and simple characterization of useless Max-CSPs defined by a predicate: such a Max-CSP is useless if and only if there is a pair wise independent distribution supported on the satisfying assignments of the predicate. It is natural to also consider the case when no negations are allowed in the CSP instance, and we derive a similar complete characterization (under the UGC) there as well. Finally, we also include some results and examples shedding additional light on the approximability of certain Max-CSPs.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 86
Type of publication
journal article (45)
conference paper (28)
doctoral thesis (11)
licentiate thesis (2)
Type of content
peer-reviewed (72)
other academic/artistic (14)
Author/Editor
Håstad, Johan (61)
Håstad, Johan, 1960- (18)
Guruswami, V. (7)
Håstad, Johan, Profe ... (7)
Austrin, Per (6)
Sudan, M (3)
show more...
Austrin, Per, 1981- (3)
Manokaran, Rajsekar (3)
Nordström, Jakob, 19 ... (2)
Nordström, Jakob (2)
Risse, Kilian, 1991- (2)
Raghavendra, Prasad (2)
Lee, C. H. (1)
Svensson, Ola, 1971 (1)
Andersson, G (1)
Wright, J (1)
Lagergren, Jens (1)
Wikström, Douglas (1)
Srinivasan, S. (1)
Svensson, Ola (1)
Andersson, Arne (1)
Hagerup, T. (1)
Petersson, O. (1)
Engebretsen, L. (1)
Wästlund, Johan, 197 ... (1)
Linusson, Svante, 19 ... (1)
Näslund, Mats (1)
Aumann, Y. (1)
Rabin, M. O. (1)
O’Donnell, Ryan (1)
Wright, John (1)
Khot, Subhash (1)
O'Donnell, Ryan, Ass ... (1)
Kreitz, Gunnar, 1982 ... (1)
Pass, Rafael (1)
Pass, R. (1)
Austrin, P. (1)
Brown-Cohen, Jonah (1)
Barak, B. (1)
Gopalan, P. (1)
Meka, R. (1)
Raghavendra, P. (1)
Steurer, D. (1)
Barak, Boaz (1)
Gopalan, Parikshit (1)
Meka, Raghu (1)
Steurer, David (1)
Tan, Li Yang (1)
Zwick, Uri (1)
Blais, Eric (1)
show less...
University
Royal Institute of Technology (85)
Chalmers University of Technology (3)
University of Gothenburg (1)
Uppsala University (1)
Stockholm University (1)
Linköping University (1)
Language
English (86)
Research subject (UKÄ/SCB)
Natural sciences (73)
Engineering and Technology (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view