Skip to main content
Top
Published in: Theory of Computing Systems 2/2014

01-08-2014

Pseudo-Random Graphs and Bit Probe Schemes with One-Sided Error

Author: Andrei Romashchenko

Published in: Theory of Computing Systems | Issue 2/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We study probabilistic bit-probe schemes for the membership problem. Given a set A of at most n elements from the universe of size m we organize such a structure that queries of type “xA? ” can be answered very quickly. H. Buhrman, P.B. Miltersen, J. Radhakrishnan, and S. Venkatesh proposed a randomized bit-probe scheme that needs space of O(nlogm) bits. That scheme has a randomized algorithm processing queries; it needs to read only one randomly chosen bit from the memory to answer a query. For every x the answer is correct with high probability (with two-sided errors).
In this paper we slightly modify the bit-probe model of Buhrman et al. and consider schemes with a small auxiliary information in “cache” memory. In this model, we show that for the membership problem there exists a bit-probe scheme with one-sided error that needs space of O(nlog2 m+poly(logm)) bits, which cannot be achieved in the model without cache. We also obtain a slightly weaker result (space of size n 1+δ poly(logm) bits and two bit probes for every query) for a scheme that is effectively encodable.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
The same argument can be presented in a more standard framework, with a read-once input tape and an index tape of poly-logarithmic size. However, we believe that the argument becomes more intuitive when we allow many passes on the input tape.
 
Literature
1.
go back to reference Bloom, B.: Space-time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970) CrossRefMATH Bloom, B.: Space-time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970) CrossRefMATH
2.
go back to reference Pinsker, M.S.: On the complexity of a concentrator. In: 7th International Teletrafc Conference, pp. 318/1–318/4 (1973) Pinsker, M.S.: On the complexity of a concentrator. In: 7th International Teletrafc Conference, pp. 318/1–318/4 (1973)
3.
go back to reference Bassalygo, L.A., Pinsker, M.S.: The complexity of an optimal non-blocking commutation scheme without reorganization. Probl. Inf. Transm. 9, 64–66 (1974) Bassalygo, L.A., Pinsker, M.S.: The complexity of an optimal non-blocking commutation scheme without reorganization. Probl. Inf. Transm. 9, 64–66 (1974)
4.
go back to reference Dyachkov, A.G., Rykov, V.V.: Bounds on the length of disjunctive codes. Probl. Inf. Transm. 18(3), 7–13 (1982) MathSciNet Dyachkov, A.G., Rykov, V.V.: Bounds on the length of disjunctive codes. Probl. Inf. Transm. 18(3), 7–13 (1982) MathSciNet
5.
go back to reference Fredman, M.L., Komlós, J., Szemerédi, E.: Storing a sparse table with O(1) worst case access time. J. Assoc. Comput. Mach. 31(3), 538–544 (1984) CrossRefMATHMathSciNet Fredman, M.L., Komlós, J., Szemerédi, E.: Storing a sparse table with O(1) worst case access time. J. Assoc. Comput. Mach. 31(3), 538–544 (1984) CrossRefMATHMathSciNet
6.
go back to reference Erdös, P., Frankl, P., Füredi, Z.: Families of nite sets in which no set is covered by the union of r others. Isr. J. Math. 51, 79–89 (1985) CrossRefMATH Erdös, P., Frankl, P., Füredi, Z.: Families of nite sets in which no set is covered by the union of r others. Isr. J. Math. 51, 79–89 (1985) CrossRefMATH
7.
go back to reference Håstad, J.: Almost optimal lower bounds for small depth circuits. In: Proc. of the 18th Annual ACM Symposium on Theory of Computing (STOC), pp. 6–20 (1986) Håstad, J.: Almost optimal lower bounds for small depth circuits. In: Proc. of the 18th Annual ACM Symposium on Theory of Computing (STOC), pp. 6–20 (1986)
8.
go back to reference Siegel, A.: On universal classes of fast high performance hash functions, their time-space trade-off, and their applications. In: Proc. of 30th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 20–25 (1989) CrossRef Siegel, A.: On universal classes of fast high performance hash functions, their time-space trade-off, and their applications. In: Proc. of 30th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 20–25 (1989) CrossRef
9.
go back to reference Nisan, N.: Pseudorandom generators for space-bounded computation. Combinatorica 12(4), 449–461 (1992). Preliminary version (1990) CrossRefMATHMathSciNet Nisan, N.: Pseudorandom generators for space-bounded computation. Combinatorica 12(4), 449–461 (1992). Preliminary version (1990) CrossRefMATHMathSciNet
13.
go back to reference Siegel, A.: On universal classes of extremely random constant time hash functions and their time-space tradeoff. Technical report TR1995-684, Courant Institute, New York University, April (1995) Siegel, A.: On universal classes of extremely random constant time hash functions and their time-space tradeoff. Technical report TR1995-684, Courant Institute, New York University, April (1995)
14.
go back to reference Trevisan, L.: Construction of extractors using pseudo-random generators. In: Proc. of the 31st Annual ACM Symposium on Theory of Computing (STOC), pp. 141–148 (1999) Trevisan, L.: Construction of extractors using pseudo-random generators. In: Proc. of the 31st Annual ACM Symposium on Theory of Computing (STOC), pp. 141–148 (1999)
16.
go back to reference Pagh, R.: Low redundancy in static dictionaries with O(1) worst case lookup time. In: Proc. of the 26th International Colloquium on Automata, Languages and Programming (ICALP), pp. 595–604 (1999) CrossRef Pagh, R.: Low redundancy in static dictionaries with O(1) worst case lookup time. In: Proc. of the 26th International Colloquium on Automata, Languages and Programming (ICALP), pp. 595–604 (1999) CrossRef
17.
go back to reference Vitter, J.S.: External memory algorithms and data structures. ACM Comput. Surv. 33(2), 209–271 (2001) CrossRef Vitter, J.S.: External memory algorithms and data structures. ACM Comput. Surv. 33(2), 209–271 (2001) CrossRef
18.
go back to reference Buhrman, H., Miltersen, P.B., Radhakrishnan, J., Srinivasan, V.: Are bitvectors optimal? SIAM J. Comput. 31(6), 1723–1744 (2002). Preliminary version, pp. 449–458 (2000) CrossRefMATHMathSciNet Buhrman, H., Miltersen, P.B., Radhakrishnan, J., Srinivasan, V.: Are bitvectors optimal? SIAM J. Comput. 31(6), 1723–1744 (2002). Preliminary version, pp. 449–458 (2000) CrossRefMATHMathSciNet
19.
go back to reference Ta-Shma, A., Umans, C., Zuckerman, D.: Loss-less condensers, unbalanced expanders, and extractors. In: Proc. of the 33rd Annual ACM Symposium on Theory of Computing (STOC), pp. 143–152 (2001) Ta-Shma, A., Umans, C., Zuckerman, D.: Loss-less condensers, unbalanced expanders, and extractors. In: Proc. of the 33rd Annual ACM Symposium on Theory of Computing (STOC), pp. 143–152 (2001)
20.
go back to reference Pagh, R.: On the cell probe complexity of membership and perfect hashing. In: Proc. of the 33rd Annual ACM Symposium on Theory of Computing (STOC), pp. 425–432 (2001) Pagh, R.: On the cell probe complexity of membership and perfect hashing. In: Proc. of the 33rd Annual ACM Symposium on Theory of Computing (STOC), pp. 425–432 (2001)
21.
go back to reference Capalbo, M.R., Reingold, O., Vadhan, S.P., Wigderson, A.: Randomness conductors and constant-degree lossless expanders. In: Proc. of the 34th Annual ACM Symposium on Theory of Computing (STOC), pp. 659–668 (2002) Capalbo, M.R., Reingold, O., Vadhan, S.P., Wigderson, A.: Randomness conductors and constant-degree lossless expanders. In: Proc. of the 34th Annual ACM Symposium on Theory of Computing (STOC), pp. 659–668 (2002)
22.
go back to reference Sivakumar, D.: Algorithmic derandomization via complexity theory. In: Proc. of the 34th Annual CM Symposium on Theory of Computing (STOC), pp. 619–626 (2002) Sivakumar, D.: Algorithmic derandomization via complexity theory. In: Proc. of the 34th Annual CM Symposium on Theory of Computing (STOC), pp. 619–626 (2002)
23.
go back to reference Östlin, A., Pagh, R.: One-Probe search. In: Proc. of the 29th International Colloquium on Automata, Languages and Programming (ICALP), pp. 439–450 (2002) CrossRef Östlin, A., Pagh, R.: One-Probe search. In: Proc. of the 29th International Colloquium on Automata, Languages and Programming (ICALP), pp. 439–450 (2002) CrossRef
24.
go back to reference Raz, R., Reingold, O., Vadhan, S.P.: Extracting all the randomness and reducing the error in Trevisan’s extractors. J. Comput. Syst. Sci. 65(1), 97–128 (2002) CrossRefMATHMathSciNet Raz, R., Reingold, O., Vadhan, S.P.: Extracting all the randomness and reducing the error in Trevisan’s extractors. J. Comput. Syst. Sci. 65(1), 97–128 (2002) CrossRefMATHMathSciNet
28.
go back to reference Parvaresh, F., Vardy, A.: Correcting errors beyond the Guruswami-Sudan radius in polynomial time. In: Proc. of the 46th Annual IEEE Symposium on Foundations of Computer Science, pp. 285–294 (2005) Parvaresh, F., Vardy, A.: Correcting errors beyond the Guruswami-Sudan radius in polynomial time. In: Proc. of the 46th Annual IEEE Symposium on Foundations of Computer Science, pp. 285–294 (2005)
29.
30.
go back to reference Vitter, J.S.: Algorithms and Data Structures for External Memory. Series on Foundations and Trends in Theoretical Computer Science. Now Publishers, Hanover (2008) Vitter, J.S.: Algorithms and Data Structures for External Memory. Series on Foundations and Trends in Theoretical Computer Science. Now Publishers, Hanover (2008)
31.
go back to reference Braverman, M.: Poly-logarithmic independence fools AC0 circuits. In: Proc. of the 27th IEEE Conference on Computational Complexity, pp. 3–8 (2009) Braverman, M.: Poly-logarithmic independence fools AC0 circuits. In: Proc. of the 27th IEEE Conference on Computational Complexity, pp. 3–8 (2009)
32.
go back to reference Arbitman, Y., Naor, M., Segev, G.: De-amortized cuckoo hashing: provable Worst-Case performance and experimental results. In: Proc. of the 36th International Colloquium on Automata, Languages and Programming. ICALP, vol. 1, pp. 107–118 (2009) CrossRef Arbitman, Y., Naor, M., Segev, G.: De-amortized cuckoo hashing: provable Worst-Case performance and experimental results. In: Proc. of the 36th International Colloquium on Automata, Languages and Programming. ICALP, vol. 1, pp. 107–118 (2009) CrossRef
33.
go back to reference Guruswami, V., Umans, C., Vadhan, S.: Unbalanced expanders and randomness extractors from Parvaresh–Vardy codes. J. ACM 56(4), 20:1–20:34 (2009) CrossRefMathSciNet Guruswami, V., Umans, C., Vadhan, S.: Unbalanced expanders and randomness extractors from Parvaresh–Vardy codes. J. ACM 56(4), 20:1–20:34 (2009) CrossRefMathSciNet
34.
go back to reference Musatov, D.: Theorems about space-bounded Kolmogorov complexity obtained by “naive” derandomization. In: Proc. 6th International Computer Science Symposium (CSR), Russia, pp. 64–76 (2011) Musatov, D.: Theorems about space-bounded Kolmogorov complexity obtained by “naive” derandomization. In: Proc. 6th International Computer Science Symposium (CSR), Russia, pp. 64–76 (2011)
35.
go back to reference David, M., Papakonstantinou, P.A., Sidiropoulos, A.: How strong is Nisan’s pseudorandom generator? Inf. Process. Lett. 111(6), 804–808 (2011) CrossRefMATHMathSciNet David, M., Papakonstantinou, P.A., Sidiropoulos, A.: How strong is Nisan’s pseudorandom generator? Inf. Process. Lett. 111(6), 804–808 (2011) CrossRefMATHMathSciNet
Metadata
Title
Pseudo-Random Graphs and Bit Probe Schemes with One-Sided Error
Author
Andrei Romashchenko
Publication date
01-08-2014
Publisher
Springer US
Published in
Theory of Computing Systems / Issue 2/2014
Print ISSN: 1432-4350
Electronic ISSN: 1433-0490
DOI
https://doi.org/10.1007/s00224-012-9425-0

Other articles of this Issue 2/2014

Theory of Computing Systems 2/2014 Go to the issue

EditorialNotes

Editorial

Premium Partner