Automata, languages and programming : 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008 : proceedings

書誌事項

Automata, languages and programming : 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008 : proceedings

Luca Aceto ... [et al.] (eds.)

(Lecture notes in computer science, 5125-5126)

Springer, c2008

  • pt. 1
  • pt. 2

タイトル別名

ICALP 2008

大学図書館所蔵 件 / 12

この図書・雑誌をさがす

注記

Includes bibliographies and index

内容説明・目次

巻冊次

pt. 1 ISBN 9783540705741

内容説明

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008. The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5125 contains 70 contributions of track A selected from 269 submissions as well as 2 invited lectures. The papers are organized in topical sections on complexity: boolean functions and circuits, data structures, random walks and random structures, design and analysis of algorithms, scheduling, codes and coding, coloring, randomness in computation, online and dynamic algorithms, approximation algorithms, property testing, parameterized algorithms and complexity, graph algorithms, computational complexity, games and automata, group testing, streaming, and quantum, algorithmic game theory, and quantum computing.

目次

Invited Lectures.- Graph Structure and Monadic Second-Order Logic: Language Theoretical Aspects.- Internet Ad Auctions: Insights and Directions.- Track A: Algorithms, Automata, Complexity, and Games.- The Complexity of Boolean Formula Minimization.- Optimal Cryptographic Hardness of Learning Monotone Functions.- On Berge Multiplication for Monotone Boolean Dualization.- Diagonal Circuit Identity Testing and Lower Bounds.- Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity.- Constructing Efficient Dictionaries in Close to Sorting Time.- On List Update with Locality of Reference.- A New Combinatorial Approach for Sparse Graph Problems.- How to Explore a Fast-Changing World (Cover Time of a Simple Random Walk on Evolving Graphs).- Networks Become Navigable as Nodes Move and Forget.- Fast Distributed Computation of Cuts Via Random Circulations.- Finding a Maximum Matching in a Sparse Random Graph in O(n) Expected Time.- Function Evaluation Via Linear Programming in the Priced Information Model.- Improved Approximation Algorithms for Budgeted Allocations.- The Travelling Salesman Problem in Bounded Degree Graphs.- Treewidth Computation and Extremal Combinatorics.- Fast Scheduling of Weighted Unit Jobs with Release Times and Deadlines.- Approximation Algorithms for Scheduling Parallel Jobs: Breaking the Approximation Ratio of 2.- A PTAS for Static Priority Real-Time Scheduling with Resource Augmentation.- Optimal Monotone Encodings.- Polynomial-Time Construction of Linear Network Coding.- Complexity of Decoding Positive-Rate Reed-Solomon Codes.- Computational Complexity of the Distance Constrained Labeling Problem for Trees (Extended Abstract).- The Randomized Coloring Procedure with Symmetry-Breaking.- The Local Nature of List Colorings for Graphs of High Girth.- Approximating List-Coloring on a Fixed Surface.- Asymptotically Optimal Hitting Sets Against Polynomials.- The Smoothed Complexity of Edit Distance.- Randomized Self-assembly for Approximate Shapes.- Succinct Data Structures for Retrieval and Approximate Membership (Extended Abstract).- Competitive Weighted Matching in Transversal Matroids.- Scheduling for Speed Bounded Processors.- Faster Algorithms for Incremental Topological Ordering.- Dynamic Normal Forms and Dynamic Characteristic Polynomial.- Algorithms for ?-Approximations of Terrains.- An Approximation Algorithm for Binary Searching in Trees.- Algorithms for 2-Route Cut Problems.- The Two-Edge Connectivity Survivable Network Problem in Planar Graphs.- Efficiently Testing Sparse GF(2) Polynomials.- Testing Properties of Sets of Points in Metric Spaces.- An Expansion Tester for Bounded Degree Graphs.- Property Testing on k-Vertex-Connectivity of Graphs.- Almost 2-SAT Is Fixed-Parameter Tractable (Extended Abstract).- On Problems without Polynomial Kernels (Extended Abstract).- Faster Algebraic Algorithms for Path and Packing Problems.- Understanding the Complexity of Induced Subgraph Isomorphisms.- Spanners in Sparse Graphs.- Distance Oracles for Unweighted Graphs: Breaking the Quadratic Barrier with Constant Additive Error.- All-Pairs Shortest Paths with a Sublinear Additive Error.- Simpler Linear-Time Modular Decomposition Via Recursive Factorizing Permutations.- The Complexity of the Counting Constraint Satisfaction Problem.- On the Hardness of Losing Weight.- Product Theorems Via Semidefinite Programming.- Sound 3-Query PCPPs Are Long.- Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations.- Recursive Stochastic Games with Positive Rewards.- Complementation, Disambiguation, andDeterminization of Büchi Automata Unified.- Tree Projections: Hypergraph Games and Minimality.- Explicit Non-adaptive Combinatorial Group Testing Schemes.- Tight Lower Bounds for Multi-pass Stream Computation Via Pass Elimination.- Impossibility of a Quantum Speed-Up with a Faulty Oracle.- Superpolynomial Speedups Based on Almost Any Quantum Circuit.- The Speed of Convergence in Congestion Games under Best-Response Dynamics.- Uniform Budgets and the Envy-Free Pricing Problem.- Bayesian Combinatorial Auctions.- Truthful Unification Framework for Packing Integer Programs with Choices.- Upper Bounds on the Noise Threshold for Fault-Tolerant Quantum Computing.- Finding Optimal Flows Efficiently.- Optimal Quantum Adversary Lower Bounds for Ordered Search.- Quantum SAT for a Qutrit-Cinquit Pair Is QMA 1-Complete.- Superpolynomial Speedups Based on Almost Any Quantum Circuit.
巻冊次

pt. 2 ISBN 9783540705826

内容説明

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008. The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5126 contains 56 contributions of track B and track C selected from 208 submissions and 2 invited lectures. The papers for track B are organized in topical sections on bounds, distributed computation, real-time and probabilistic systems, logic and complexity, words and trees, nonstandard models of computation, reasoning about computation, and verification. The papers of track C cover topics in security and cryptography such as theory, secure computation, two-party protocols and zero-knowledge, encryption with special properties/quantum cryptography, various types of hashing, as well as public-key cryptography and authentication.

目次

Invited Lectures.- Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency.- Newton's Method for ?-Continuous Semirings.- Track B: Logic, Semantics, and Theory of Programming.- The Tractability Frontier for NFA Minimization.- Finite Automata, Digraph Connectivity, and Regular Expression Size.- Leftist Grammars Are Non-primitive Recursive.- On the Computational Completeness of Equations over Sets of Natural Numbers.- Placement Inference for a Client-Server Calculus.- Extended pi-Calculi.- Completeness and Logical Full Abstraction in Modal Logics for Typed Mobile Processes.- On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases.- On Expressiveness and Complexity in Real-Time Model Checking.- STORMED Hybrid Systems.- Controller Synthesis and Verification for Markov Decision Processes with Qualitative Branching Time Objectives.- On Datalog vs. LFP.- Directed st-Connectivity Is Not Expressible in Symmetric Datalog.- Non-dichotomies in Constraint Satisfaction Complexity.- Quantified Constraint Satisfaction and the Polynomially Generated Powers Property.- When Does Partial Commutative Closure Preserve Regularity?.- Weighted Logics for Nested Words and Algebraic Formal Power Series.- Tree Languages Defined in First-Order Logic with One Quantifier Alternation.- Duality and Equational Theory of Regular Languages.- Reversible Flowchart Languages and the Structured Reversible Program Theorem.- Attribute Grammars and Categorical Semantics.- A Domain Theoretic Model of Qubit Channels.- Interacting Quantum Observables.- Perpetuality for Full and Safe Composition (in a Constructive Setting).- A System F with Call-by-Name Exceptions.- Linear Logical Algorithms.- A Simple Model of Separation Logic for Higher-Order Store.- Open Implication.- ATL* Satisfiability Is 2EXPTIME-Complete.- Visibly Pushdown Transducers.- The Non-deterministic Mostowski Hierarchy and Distance-Parity Automata.- Analyzing Context-Free Grammars Using an Incremental SAT Solver.- Track C: Security and Cryptography Foundations.- Weak Pseudorandom Functions in Minicrypt.- On Black-Box Ring Extraction and Integer Factorization.- Extractable Perfectly One-Way Functions.- Error-Tolerant Combiners for Oblivious Primitives.- Asynchronous Multi-Party Computation with Quadratic Communication.- Improved Garbled Circuit: Free XOR Gates and Applications.- Improving the Round Complexity of VSS in Point-to-Point Networks.- How to Protect Yourself without Perfect Shredding.- Universally Composable Undeniable Signature.- Interactive PCP.- Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model.- Delegating Capabilities in Predicate Encryption Systems.- Bounded Ciphertext Policy Attribute Based Encryption.- Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks.- Composable Security in the Bounded-Quantum-Storage Model.- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak.- History-Independent Cuckoo Hashing.- Building a Collision-Resistant Compression Function from Non-compressing Primitives.- Robust Multi-property Combiners for Hash Functions Revisited.- Homomorphic Encryption with CCA Security.- How to Encrypt with the LPN Problem.- Could SFLASH be Repaired?.- Password Mistyping in Two-Factor-Authenticated Key Exchange.- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

ページトップへ