Perfect Hashing, Graph Entropy, and Circuit Complexity

نویسندگان

  • Ilan Newman
  • Prabhakar Ragde
  • Avi Wigderson
چکیده

We present two simple and general techniques, both of which should find further application. First, we show that approximate compaction can be efficiently performed in constant parallel time using perfect hash functions. This allows us to show that polylogarithmic-threshold functions are in linear $AC^0$. Next, we show that the information theoretic notion of graph entropy captures some aspect of the difficulty of computing Boolean functions. We use this to derive superlinear lower bounds on the formula size of threshold and other simple Boolean functions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Circuit Complexity of Perfect Hashing

We consider the size of circuits that perfectly hash an arbitrary subset S⊂{0, 1} of cardinality 2 into {0, 1}. We observe that, in general, the size of such circuits is exponential in 2k−m, and provide a matching upper bound.

متن کامل

A Practical Minimal Perfect Hashing Method

We propose a novel algorithm based on random graphs to construct minimal perfect hash functions h. For a set of n keys, our algorithm outputs h in expected time O(n). The evaluation of h(x) requires two memory accesses for any key x and the description of h takes up 1.15n words. This improves the space requirement to 55% of a previous minimal perfect hashing scheme due to Czech, Havas and Majew...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

My favorite application using eigenvalues: Eigenvalues and the Graham-Pollak Theorem

The famous Graham-Pollak Theorem states that one needs at least n− 1 complete bipartite subgraphs to partition the edge set of the complete graph on n vertices. Originally proved in conjunction with addressing for networking problems, this theorem is also related to perfect hashing and various questions about communication complexity. Since it’s original proof using Sylvester’s Law of Intertia,...

متن کامل

Using Tries to Eliminate Pattern Collisions in Perfect Hashing

4any current perfect hashing algorithms suffer from the problem of pattern collisions. In this paper, a perfect hashing technique that uses array-based tries and a simple sparse matrix packing algorithm is introduced. This technique eliminates all pattern collisions, and because of this it can be used to form ordered minimal perfect hash functions on extremely large word lists. This algorithm i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990