An algebraic approach to complexity of data stream computations

نویسنده

  • Sumit Ganguly
چکیده

We consider a basic problem in the general data streaming model, namely, to estimate a vector f ∈ Z that is arbitrarily updated (i.e., incremented or decremented) coordinatewise. The estimate f̂ ∈ Z must satisfy ‖f̂ − f‖∞ ≤ ǫ‖f‖1, that is, ∀i (|f̂i − fi| ≤ ǫ‖f‖1). It is known to have Õ(ǫ) randomized space upper bound [4], Ω(ǫ log(ǫn)) space lower bound [2] and deterministic space upper bound of Ω̃(ǫ) bits. We show that any deterministic algorithm for this problem requires space Ω(ǫ−2(log‖f‖1)) bits.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quasi-Static Numerical Simulation of Missile Staging

In this study, the missile staging process by implementing a side-injected jet is simulated numerically. The problem is considered to be axisymmetric and the thin shear layer approximation of Navier-Stokes equations along with an algebraic turbulence model is used in a quasi-static form for the calculations. The free stream corresponds to a very high altitude flight condition with a Mach number...

متن کامل

Quasi-Static Numerical Simulation of Missile Staging

In this study, the missile staging process by implementing a side-injected jet is simulated numerically. The problem is considered to be axisymmetric and the thin shear layer approximation of Navier-Stokes equations along with an algebraic turbulence model is used in a quasi-static form for the calculations. The free stream corresponds to a very high altitude flight condition with a Mach number...

متن کامل

Cryptanalysis of GSM encryption algorithm A5/1

The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...

متن کامل

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...

متن کامل

Automaton Meets Algebra: A Hybrid Paradigm for Efficiently Processing XQuery over XML Stream

XML stream applications bring the challenge of efficiently processing queries on sequentially accessible token-based data streams. The automaton paradigm is naturally suited for pattern retrieval on tokenized XML streams, but requires patches for implementing the filtering or restructuring functionalities common for the XML query languages. In contrast, the algebraic paradigm is well-establishe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/cs/0701004  شماره 

صفحات  -

تاریخ انتشار 2007