skip to main content
10.1145/28395.28414acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Imperfect random sources and discrete controlled processes

Authors Info & Claims
Published:01 January 1987Publication History

ABSTRACT

We consider a simple model for a class of discrete control processes, motivated in part by recent work about the behavior of imperfect random sources in computer algorithms. The process produces a string of characters from {0, 1} of length n and is a “success” or “failure” depending on whether the string produced belongs to a prespecified set L. In an uninfluenced process each character is chosen by a fair coin toss, and hence the probability of success is |L|/2n. We are interested in the effect on the probability of success in the presence of a player (controller) who can intervene in the process by specifying the value of certain characters in the string. We answer the following questions in both worst and average case: (1) how much can the player increase the probability of success given a fixed number of interventions? (2) in terms of |L| what is the expected number of interventions needed to guarantee success? In particular our results imply that if |L|/2n = 1/w(n) where w(n) tends to infinity with n (so the probability of success with no interventions is o(1)) then with Ο(√nlogw(n)) interventions the probability of success is 1-o(1).

Our main results and the proof techniques are related to a well-known theorem of Kruskal, Katona, and Harper in extremal set theory.

References

  1. AR.N. Aton and M. O. Rabin, manuscript MiT 1985.Google ScholarGoogle Scholar
  2. BL.M. Ben-Or and N. Linial, Collective Coin Flipping, robust voting schemes and minimal of Banzhaf values, Proceedings of the 2$th Annual IEEE Symposium on Foundations of Computer Science, 1985, 408-416.Google ScholarGoogle Scholar
  3. CG.B. Chor and O. Goldreich, Unbiased bits from sources of weak randomness and probabilistie communication complexity, Proceedings of the 26th Annual {EEE Symposium on Foundations of Computer Science, 1985, 429-442.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D.D. E. Daykin, Ordered ranked posets, repre,~entations of integers and inequalities from extremal ranked posets, in Graphs and Order (I. Rival, ed.), D. Reidel Publishing, 1985, 395-412.Google ScholarGoogle Scholar
  5. GK.C. Greene and D. J. Kleitman, Proof techniques in the theory of finite sets, in Studies in Combinatorics (G.-C. Rota, ed.), .MAA Studies i:n Mathematics, Vol. 17, 1978, 22-79.Google ScholarGoogle Scholar
  6. H.L. Harper, Optimal numberings and isoperimetric problems on graphs, J. Comb. Th. 1 (1966), 385-393.Google ScholarGoogle ScholarCross RefCross Ref
  7. Ka.G. Katona, A theorem for finite sets, in Theory of Graphs (P. Erdos and G. Katona, eds.), Hungarian Academy of Science, Budapest, 1966, 187-207.Google ScholarGoogle Scholar
  8. Kr.J. B. Kruskal, The number of simplices in a complex, in Mathematical Optimization Techniques (R. Bellman, ed.), University of California Press, Berkeley, 1963, 251-278.Google ScholarGoogle Scholar
  9. S.M. Saks, A robust noncryptographic protocol for collective coin flipping, preprint.Google ScholarGoogle Scholar
  10. SV.M. Santha and U. V. Vazirani, Generating quasi random sequences from slightly random sources, Proceedings of the 25th Annual IEEE Symposium on the Foundations of Computer Science, 1984, 434-440.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. V.U.V. Vazirani, Towards a strong communication complexity theory or generating quasirandom sequences from two communicating; slightly-random sources, Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985, 366-378. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Imperfect random sources and discrete controlled processes

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          STOC '87: Proceedings of the nineteenth annual ACM symposium on Theory of computing
          January 1987
          471 pages
          ISBN:0897912217
          DOI:10.1145/28395

          Copyright © 1987 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 January 1987

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          STOC '87 Paper Acceptance Rate50of165submissions,30%Overall Acceptance Rate1,469of4,586submissions,32%

          Upcoming Conference

          STOC '24
          56th Annual ACM Symposium on Theory of Computing (STOC 2024)
          June 24 - 28, 2024
          Vancouver , BC , Canada

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader