An algebraic approach to complexity of data stream computations
نویسنده
چکیده
We consider a basic problem in the general data streaming model, namely, to estimate a vector f ∈ Z that is arbitrarily updated (i.e., incremented or decremented) coordinatewise. The estimate f̂ ∈ Z must satisfy ‖f̂ − f‖∞ ≤ ǫ‖f‖1, that is, ∀i (|f̂i − fi| ≤ ǫ‖f‖1). It is known to have Õ(ǫ) randomized space upper bound [4], Ω(ǫ log(ǫn)) space lower bound [2] and deterministic space upper bound of Ω̃(ǫ) bits. We show that any deterministic algorithm for this problem requires space Ω(ǫ−2(log‖f‖1)) bits.
منابع مشابه
Quasi-Static Numerical Simulation of Missile Staging
In this study, the missile staging process by implementing a side-injected jet is simulated numerically. The problem is considered to be axisymmetric and the thin shear layer approximation of Navier-Stokes equations along with an algebraic turbulence model is used in a quasi-static form for the calculations. The free stream corresponds to a very high altitude flight condition with a Mach number...
متن کاملQuasi-Static Numerical Simulation of Missile Staging
In this study, the missile staging process by implementing a side-injected jet is simulated numerically. The problem is considered to be axisymmetric and the thin shear layer approximation of Navier-Stokes equations along with an algebraic turbulence model is used in a quasi-static form for the calculations. The free stream corresponds to a very high altitude flight condition with a Mach number...
متن کاملCryptanalysis of GSM encryption algorithm A5/1
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...
متن کاملExtension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...
متن کاملAutomaton Meets Algebra: A Hybrid Paradigm for Efficiently Processing XQuery over XML Stream
XML stream applications bring the challenge of efficiently processing queries on sequentially accessible token-based data streams. The automaton paradigm is naturally suited for pattern retrieval on tokenized XML streams, but requires patches for implementing the filtering or restructuring functionalities common for the XML query languages. In contrast, the algebraic paradigm is well-establishe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/cs/0701004 شماره
صفحات -
تاریخ انتشار 2007