Serveur d'exploration sur l'Université de Trèves

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Neither reading few bits twice nor reading illegally helps much

Identifieur interne : 001726 ( PascalFrancis/Curation ); précédent : 001725; suivant : 001727

Neither reading few bits twice nor reading illegally helps much

Auteurs : S. Jukna [Allemagne, Lituanie] ; A. Razborov [Russie]

Source :

RBID : Pascal:98-0504453

Descripteurs français

English descriptors

Abstract

We first consider the so-called (1,+s)-branching programs in which along every consistent path at most s variables are tested more than once. We prove that any such program computing a characteristic function of a linear code C has size at least 2Ω(min{d1,d2/s}), where d1 and d2 are the minimal distances of C and its dual C⊥. We apply this criterion to explicit linear codes and obtain a super-polynomial lower bound for s=o(n/logn). Then we introduce a natural generalization of read-k-times and (1, +s)-branching programs that we call semantic branching programs. These programs correspond to corrupting Turing machines which, unlike eraser machines, are allowed to read input bits even illegally, i.e. in excess of their quota on multiple readings, but in that case they receive in response an unpredictably corrupted value. We generalize the above-mentioned bound to the semantic case, and also prove exponential lower bounds for semantic read-once nondeterministic branching programs.
pA  
A01 01  1    @0 0166-218X
A02 01      @0 DAMADU
A03   1    @0 Discrete appl. math.
A05       @2 85
A06       @2 3
A08 01  1  ENG  @1 Neither reading few bits twice nor reading illegally helps much
A11 01  1    @1 JUKNA (S.)
A11 02  1    @1 RAZBOROV (A.)
A14 01      @1 Department of Computer Science, University of Trier @2 54286 Trier @3 DEU @Z 1 aut.
A14 02      @1 Institute of Mathematics, Akademijos 4 @2 2600 Vilnius @3 LTU @Z 1 aut.
A14 03      @1 Steklov Mathematical Institute, Gubkina 8, GSP-1 @2 117966, Moscow @3 RUS @Z 2 aut.
A20       @1 223-238
A21       @1 1998
A23 01      @0 ENG
A43 01      @1 INIST @2 18287 @5 354000077123500040
A44       @0 0000 @1 © 1998 INIST-CNRS. All rights reserved.
A45       @0 20 ref.
A47 01  1    @0 98-0504453
A60       @1 P
A61       @0 A
A64   1    @0 Discrete applied mathematics
A66 01      @0 NLD
C01 01    ENG  @0 We first consider the so-called (1,+s)-branching programs in which along every consistent path at most s variables are tested more than once. We prove that any such program computing a characteristic function of a linear code C has size at least 2Ω(min{d1,d2/s}), where d1 and d2 are the minimal distances of C and its dual C⊥. We apply this criterion to explicit linear codes and obtain a super-polynomial lower bound for s=o(n/logn). Then we introduce a natural generalization of read-k-times and (1, +s)-branching programs that we call semantic branching programs. These programs correspond to corrupting Turing machines which, unlike eraser machines, are allowed to read input bits even illegally, i.e. in excess of their quota on multiple readings, but in that case they receive in response an unpredictably corrupted value. We generalize the above-mentioned bound to the semantic case, and also prove exponential lower bounds for semantic read-once nondeterministic branching programs.
C02 01  X    @0 001D02A03
C02 02  X    @0 001D02A07
C03 01  X  FRE  @0 Codage linéaire @5 01
C03 01  X  ENG  @0 Linear coding @5 01
C03 01  X  SPA  @0 Codificación lineal @5 01
C03 02  X  FRE  @0 Distance minimale @5 02
C03 02  X  ENG  @0 Minimal distance @5 02
C03 02  X  SPA  @0 Distancia mínima @5 02
C03 03  X  FRE  @0 Machine abstraite @5 03
C03 03  X  ENG  @0 Abstract machine @5 03
C03 03  X  SPA  @0 Máquina abstracta @5 03
C03 04  X  FRE  @0 Machine Turing @5 04
C03 04  X  ENG  @0 Turing machine @5 04
C03 04  X  SPA  @0 Máquina Turing @5 04
C03 05  1  FRE  @0 Théorie programmation @5 05
C03 05  1  ENG  @0 Programming theory @5 05
N21       @1 327

Links toward previous steps (curation, corpus...)


Links to Exploration step

Pascal:98-0504453

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">Neither reading few bits twice nor reading illegally helps much</title>
<author>
<name sortKey="Jukna, S" sort="Jukna, S" uniqKey="Jukna S" first="S." last="Jukna">S. Jukna</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>Department of Computer Science, University of Trier</s1>
<s2>54286 Trier</s2>
<s3>DEU</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>Allemagne</country>
</affiliation>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>Institute of Mathematics, Akademijos 4</s1>
<s2>2600 Vilnius</s2>
<s3>LTU</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>Lituanie</country>
</affiliation>
</author>
<author>
<name sortKey="Razborov, A" sort="Razborov, A" uniqKey="Razborov A" first="A." last="Razborov">A. Razborov</name>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>Steklov Mathematical Institute, Gubkina 8, GSP-1</s1>
<s2>117966, Moscow</s2>
<s3>RUS</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>Russie</country>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">98-0504453</idno>
<date when="1998">1998</date>
<idno type="stanalyst">PASCAL 98-0504453 INIST</idno>
<idno type="RBID">Pascal:98-0504453</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">001099</idno>
<idno type="wicri:Area/PascalFrancis/Curation">001726</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">Neither reading few bits twice nor reading illegally helps much</title>
<author>
<name sortKey="Jukna, S" sort="Jukna, S" uniqKey="Jukna S" first="S." last="Jukna">S. Jukna</name>
<affiliation wicri:level="1">
<inist:fA14 i1="01">
<s1>Department of Computer Science, University of Trier</s1>
<s2>54286 Trier</s2>
<s3>DEU</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>Allemagne</country>
</affiliation>
<affiliation wicri:level="1">
<inist:fA14 i1="02">
<s1>Institute of Mathematics, Akademijos 4</s1>
<s2>2600 Vilnius</s2>
<s3>LTU</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
<country>Lituanie</country>
</affiliation>
</author>
<author>
<name sortKey="Razborov, A" sort="Razborov, A" uniqKey="Razborov A" first="A." last="Razborov">A. Razborov</name>
<affiliation wicri:level="1">
<inist:fA14 i1="03">
<s1>Steklov Mathematical Institute, Gubkina 8, GSP-1</s1>
<s2>117966, Moscow</s2>
<s3>RUS</s3>
<sZ>2 aut.</sZ>
</inist:fA14>
<country>Russie</country>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Discrete applied mathematics</title>
<title level="j" type="abbreviated">Discrete appl. math.</title>
<idno type="ISSN">0166-218X</idno>
<imprint>
<date when="1998">1998</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Discrete applied mathematics</title>
<title level="j" type="abbreviated">Discrete appl. math.</title>
<idno type="ISSN">0166-218X</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Abstract machine</term>
<term>Linear coding</term>
<term>Minimal distance</term>
<term>Programming theory</term>
<term>Turing machine</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Codage linéaire</term>
<term>Distance minimale</term>
<term>Machine abstraite</term>
<term>Machine Turing</term>
<term>Théorie programmation</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">We first consider the so-called (1,+s)-branching programs in which along every consistent path at most s variables are tested more than once. We prove that any such program computing a characteristic function of a linear code C has size at least 2
<sup>Ω(min{d</sup>
1
<sup>,d</sup>
2
<sup>/s})</sup>
, where d
<sub>1</sub>
and d2 are the minimal distances of C and its dual C⊥. We apply this criterion to explicit linear codes and obtain a super-polynomial lower bound for s=o(n/logn). Then we introduce a natural generalization of read-k-times and (1, +s)-branching programs that we call semantic branching programs. These programs correspond to corrupting Turing machines which, unlike eraser machines, are allowed to read input bits even illegally, i.e. in excess of their quota on multiple readings, but in that case they receive in response an unpredictably corrupted value. We generalize the above-mentioned bound to the semantic case, and also prove exponential lower bounds for semantic read-once nondeterministic branching programs.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0166-218X</s0>
</fA01>
<fA02 i1="01">
<s0>DAMADU</s0>
</fA02>
<fA03 i2="1">
<s0>Discrete appl. math.</s0>
</fA03>
<fA05>
<s2>85</s2>
</fA05>
<fA06>
<s2>3</s2>
</fA06>
<fA08 i1="01" i2="1" l="ENG">
<s1>Neither reading few bits twice nor reading illegally helps much</s1>
</fA08>
<fA11 i1="01" i2="1">
<s1>JUKNA (S.)</s1>
</fA11>
<fA11 i1="02" i2="1">
<s1>RAZBOROV (A.)</s1>
</fA11>
<fA14 i1="01">
<s1>Department of Computer Science, University of Trier</s1>
<s2>54286 Trier</s2>
<s3>DEU</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="02">
<s1>Institute of Mathematics, Akademijos 4</s1>
<s2>2600 Vilnius</s2>
<s3>LTU</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA14 i1="03">
<s1>Steklov Mathematical Institute, Gubkina 8, GSP-1</s1>
<s2>117966, Moscow</s2>
<s3>RUS</s3>
<sZ>2 aut.</sZ>
</fA14>
<fA20>
<s1>223-238</s1>
</fA20>
<fA21>
<s1>1998</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA43 i1="01">
<s1>INIST</s1>
<s2>18287</s2>
<s5>354000077123500040</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 1998 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>20 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>98-0504453</s0>
</fA47>
<fA60>
<s1>P</s1>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i2="1">
<s0>Discrete applied mathematics</s0>
</fA64>
<fA66 i1="01">
<s0>NLD</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>We first consider the so-called (1,+s)-branching programs in which along every consistent path at most s variables are tested more than once. We prove that any such program computing a characteristic function of a linear code C has size at least 2
<sup>Ω(min{d</sup>
1
<sup>,d</sup>
2
<sup>/s})</sup>
, where d
<sub>1</sub>
and d2 are the minimal distances of C and its dual C⊥. We apply this criterion to explicit linear codes and obtain a super-polynomial lower bound for s=o(n/logn). Then we introduce a natural generalization of read-k-times and (1, +s)-branching programs that we call semantic branching programs. These programs correspond to corrupting Turing machines which, unlike eraser machines, are allowed to read input bits even illegally, i.e. in excess of their quota on multiple readings, but in that case they receive in response an unpredictably corrupted value. We generalize the above-mentioned bound to the semantic case, and also prove exponential lower bounds for semantic read-once nondeterministic branching programs.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02A03</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001D02A07</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Codage linéaire</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Linear coding</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Codificación lineal</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Distance minimale</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Minimal distance</s0>
<s5>02</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Distancia mínima</s0>
<s5>02</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Machine abstraite</s0>
<s5>03</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Abstract machine</s0>
<s5>03</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Máquina abstracta</s0>
<s5>03</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Machine Turing</s0>
<s5>04</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Turing machine</s0>
<s5>04</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Máquina Turing</s0>
<s5>04</s5>
</fC03>
<fC03 i1="05" i2="1" l="FRE">
<s0>Théorie programmation</s0>
<s5>05</s5>
</fC03>
<fC03 i1="05" i2="1" l="ENG">
<s0>Programming theory</s0>
<s5>05</s5>
</fC03>
<fN21>
<s1>327</s1>
</fN21>
</pA>
</standard>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Rhénanie/explor/UnivTrevesV1/Data/PascalFrancis/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001726 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Curation/biblio.hfd -nk 001726 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Rhénanie
   |area=    UnivTrevesV1
   |flux=    PascalFrancis
   |étape=   Curation
   |type=    RBID
   |clé=     Pascal:98-0504453
   |texte=   Neither reading few bits twice nor reading illegally helps much
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Sat Jul 22 16:29:01 2017. Site generation: Wed Feb 28 14:55:37 2024