Academia.eduAcademia.edu

Mathematical Foundations of Computer Science

description1,981 papers
group125 followers
lightbulbAbout this topic
Mathematical Foundations of Computer Science is a subfield that explores the theoretical underpinnings of computation, algorithms, and data structures. It encompasses areas such as logic, set theory, combinatorics, and graph theory, providing essential tools and frameworks for analyzing the efficiency, correctness, and complexity of computational processes.
lightbulbAbout this topic
Mathematical Foundations of Computer Science is a subfield that explores the theoretical underpinnings of computation, algorithms, and data structures. It encompasses areas such as logic, set theory, combinatorics, and graph theory, providing essential tools and frameworks for analyzing the efficiency, correctness, and complexity of computational processes.
In this survey paper, we present known results and open questions on a proper subclass of the class of regular languages. This class, denoted by W, is especially robust: it is closed under union, intersection, product, shuffle, left and... more
We give an attribute-based encryption system for Turing Machines that is provably secure assuming only the existence of identity-based encryption (IBE) for large identity spaces. Currently, IBE is known to be realizable from most... more
We construct a broadcast and trace scheme (also known as trace and revoke or broadcast, trace and revoke) with N users, where the ciphertext size can be made as low as O(N ε ), for any arbitrarily small constant ε > 0. This improves on... more
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation scheme there exists an obfuscation algorithm Obf that takes as input a security parameter λ, a program P , a message msg and "lock value" α and... more
Theoretical study of optimization problems in wireless communication often deals with tasks that concern a single point. For example, the power control problem requires computing a power assignment guaranteeing that each transmitting... more
Linear optimization is many times algorithmically simpler than non-linear convex optimization. Linear optimization over matroid polytopes, matching polytopes and path polytopes are example of problems for which we have efficient... more
In a parameterized problem, every instance I comes with a positive integer k. The problem is said to admit a polynomial kernel if, in polynomial time, one can reduce the size of the instance I to a polynomial in k, while preserving the... more
This is a collection of open problems presented at the Lorentz Workshop “Enumeration Algorithms using Structure” which took place at the Lorentz Center of the University of Leiden (The Netherlands), August 24 - 30, 2015. The workshop... more
The first theorem of Cantor's 1891 paper introduced the diagonal method by a specific example; namely, as an argument that any list of the set of real numbers is necessarily incomplete and concluding the set of real numbers is not... more
This paper considers completions of tope graphs of COMs (complexes of oriented matroids) to ample partial cubes of the same VC-dimension. We show that these exist for OMs (oriented matroids) and CUOMs (complexes of uniform oriented... more
We investigate the structure of isometric subgraphs of hypercubes (i.e., partial cubes) which do not contain finite convex subgraphs contractible to the 3-cube minus one vertex Q - 3 (here contraction means contracting the edges... more
25 pages, 5 figuresInternational audienceWe investigate the structure of two-dimensional partial cubes, i.e., of isometric subgraphs of hypercubes whose vertex set defines a set family of VC-dimension at most 2. Equivalently, those are... more
We present a deterministic algorithm for the connectivity problem on undirected graphs
A common subproblem of DNF approximate counting and derandomizing RL is the discrepancy problem for combinatorial rectangles. We explicitly construct a poly(n)-size sample space that approximates the volume of any combinatorial rectangle... more
In [KUW1] we have proposed the setting of independence systems to study the relation between the computational complexity of search and decision problems. The universal problem that captures this relation, which we termed the $S$-search... more
The Boolean Decision tree model is perhaps the simplest model that computes Boolean functions; it charges only for reading an input variable. WE study the power of randomness (vs. both determinism and non-determinism) in this model, and... more
On a Search Problem Related to Branch-and-Bound Procedures RM Karp,* M. Saks,** A. Wigderson*** 0. INTRODUCTION Branch-and-bound procedures are commonly used in practice for the solution of NP-hard combinatorial ... University of... more
Various efforts ([?, ?, ?]) have been made in recent years to derandomize probabilistic algorithms using the complexity theoretic assumption that there exists a problem in E = dtime(2 O(n) ), that requires circuits of size s(n), (for some... more
What is the least surface area of a shape that tiles R d under translations by Z d ? Any such shape must have volume 1 and hence surface area at least that of the volume-1 ball, namely Ω( √ d). Our main result is a construction with... more
This paper contains two main results. The first is an explicit construction of bipartite graphs which do not contain certain complete bipartite subgraphs and have maximal density, up to a constant factor, under this constraint. This... more
We investigate the feasibility of a variety of cryptographic tasks with imperfect randomness. The kind of imperfect randomness we consider are entropy sources, such as those considered by Santha and Vazirani, Chor and Goldreich, and... more
In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C0 and C1 of similar size, the obfuscations of C0 and... more
The concept of forwarding sets is widely adopted in many broadcast protocols for wireless multihop networks to alleviate the broadcast storm problem. In these protocols, after receiving a broadcast message, each node that is requested to... more
We introduce an extension of the restricted shuffle operator on binary words considered by Atanasiu and Teh (2016). We then derive properties on Parikh matrix equivalence of words over a binary alphabet based on this extended shuffle... more
Parikh matrix mapping or Parikh matrix of a word has been introduced in the literature to count the scattered subwords in the word. Several properties of a Parikh matrix have been extensively investigated. A picture array is a... more
We present a randomized NC solution to the problem of constructing a maximum (cardinality) f -matching. As a corollary, we obtain a randomized NC algorithm for the problem of constructing a graph satisfying a sequence d 1 ; d 2 ;...; d n... more
The buy-at-bulk network design problem has been extensively studied in the general graph model. In this paper, we consider geometric versions of the problem, where all points in a Euclidean space are candidates for network nodes, and... more
Let k be a positive integer, a subset Q of the set of vertices of a graph G is k-dependent in G if each vertex of Q has no more than k neighbours in Q. We present a parallel algorithm which computes a maximal k-dependent set in a graph on... more
We consider the following clustering problems: given an undirected graph, partition its vertices into disjoint clusters such that each cluster forms a clique and the number of edges within the clusters is maximized (Max-ECP), or the... more
This paper directly refutes the motivating points of §8: Application of the diagonal process from Alan Turing’s paper On Computable Numbers. After briefly touching upon the uncontested fact that computational machines are necessarily... more
We prove a conjecture made by Gilman in 1984 that the groups presented by finite, monadic, confluent rewriting systems are precisely the free products of free and finite groups.
We prove a conjecture made by Gilman in 1984 that the groups presented by finite, monadic, confluent rewriting systems are precisely the free products of free and finite groups.
The author claims to be the second graduate student of Rūsiņš Mārtiņš Freivalds. He shares some memories of that time and presents some results in reducibility theory that were not published in peer-reviewed journals before.
Existing work on "rational cryptographic protocols" treats each party (or coalition of parties) running the protocol as a selfish agent trying to maximize its utility. In this work we propose a fundamentally different approach that is... more
We revisit the following question: what is the optimal round complexity of verifiable secret sharing (VSS)? We focus here on the case of perfect VSS where the number of corrupted parties t satisfies t < n/3, with n the total number of... more
Combinations are a foundational element of discrete mathematics with applications across probability, computer science, and number theory. In this paper, we introduce a novel combinatorial model-Patterned Combinations with Positional... more
One of the most trade-off aspects in the design of NoCs is the improvement of the network performance, in terms of throughput and latency, while minimizing power consumption. 2D-mesh has become the preferred topology, since it offers low... more
We consider a generalization of the maximum flow problem in which the amounts of flow entering and leaving an arc are linearly related. More precisely, if x(e) units of flow enter an arc e, z(e)7(e) units arrive at the other end. For... more
The verification of monadic second-order (MSO) graph properties, equivalently, the model-checking problem for MSO logic over finite binary relational structures, is fixed-parameter tractable (FPT) for the parameter consisting of the... more
We address the concrete problem of implementing huge bottom-up term automata. Such automata arise from the verification of Monadic Second Order propositions on graphs of bounded tree-width or clique-width. This applies to graphs of... more
In [H] it is proven, among other things, that the size of any depth k circuit computing the parity or the majority function is n(2o. 1 (o.311)""-u). In th'is note we generalize th~ptoof given there to yield similar lower bounds•for... more
What is the minimum number 7 of edges to be added to a given graph G so that in the resulting graph the edge-connectivity between every pair {U, U} of nodes is at least a prescribed value T(U, v ) ? Generalizing earlier results of S.... more
The aim of this paper is to study communication in networks where nodes fail in a random dependent way. In order to capture fault dependencies, we introduce the neighborhood fault model, where damaging events, called spots, occur randomly... more
Download research papers for free!