Perfect Hashing, Graph Entropy, and Circuit Complexity
نویسندگان
چکیده
We present two simple and general techniques, both of which should find further application. First, we show that approximate compaction can be efficiently performed in constant parallel time using perfect hash functions. This allows us to show that polylogarithmic-threshold functions are in linear $AC^0$. Next, we show that the information theoretic notion of graph entropy captures some aspect of the difficulty of computing Boolean functions. We use this to derive superlinear lower bounds on the formula size of threshold and other simple Boolean functions.
منابع مشابه
On the Circuit Complexity of Perfect Hashing
We consider the size of circuits that perfectly hash an arbitrary subset S⊂{0, 1} of cardinality 2 into {0, 1}. We observe that, in general, the size of such circuits is exponential in 2k−m, and provide a matching upper bound.
متن کاملA Practical Minimal Perfect Hashing Method
We propose a novel algorithm based on random graphs to construct minimal perfect hash functions h. For a set of n keys, our algorithm outputs h in expected time O(n). The evaluation of h(x) requires two memory accesses for any key x and the description of h takes up 1.15n words. This improves the space requirement to 55% of a previous minimal perfect hashing scheme due to Czech, Havas and Majew...
متن کاملOn the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملMy favorite application using eigenvalues: Eigenvalues and the Graham-Pollak Theorem
The famous Graham-Pollak Theorem states that one needs at least n− 1 complete bipartite subgraphs to partition the edge set of the complete graph on n vertices. Originally proved in conjunction with addressing for networking problems, this theorem is also related to perfect hashing and various questions about communication complexity. Since it’s original proof using Sylvester’s Law of Intertia,...
متن کاملUsing Tries to Eliminate Pattern Collisions in Perfect Hashing
4any current perfect hashing algorithms suffer from the problem of pattern collisions. In this paper, a perfect hashing technique that uses array-based tries and a simple sparse matrix packing algorithm is introduced. This technique eliminates all pattern collisions, and because of this it can be used to form ordered minimal perfect hash functions on extremely large word lists. This algorithm i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1990