Removing Randomness
نویسندگان
چکیده
In recent years, many probabilistic algorithms (i.e., algorithms that can toss coins) that run in polynomial time have been discovered for problems with no known deterministic polynomial time algorithms. Perhaps the most famous example is the problem of testing large (say, 100 digit) numbers for primality. Even for problems which are known to have deterministic polynomial time algorithms, these algorithms are often not as fast as some probabilistic algorithms for the same problem. Even though probabilistic algorithms are useful in practice, we would like to know, for both theoretical and practical reasons, if randomization is really necessary to obtain the most e cient algorithms for certain problems. That is, we would like to know for which problems there is an inherent gap between the deterministic and probabilistic complexities of these problems. In this research, we consider two problems of a number theoretic nature: factoring polynomials over nite elds and constructing irreducible polynomials of speci ed degree over nite elds. We present new results that narrow the gap between the known deterministic and probabilistic complexities of these problems. One of our results is a deterministic polynomial time reduction from the latter problem to the former, giving rise to a deterministic algorithm for constructing irreducible polynomials that runs in polynomial time for elds of small characteristic. Another of our results is a new deterministic factoring algorithm whose worst-case running time is asymptotically faster than that of previously known deterministic algorithms for this problem. We also analyze the average-case running time of our algorithm (averaging over inputs), proving that it is just about as fast as the expected running time (averaging over coin tosses) of some of the fastest probabilistic algorithms. In particular, the average-case running time of our algorithm is polynomial. i Preface Some of the results in this thesis have previously appeared in [38] and [39]. I wish to thank my advisor, Eric Bach. Working with Eric has truly been a delight, and his encouragement and support were invaluable in conducting this research. Thanks also goes to Anne Condon, Jon Sorenson and John Strikwerda for providing me with corrections and insightful comments on an early draft of this thesis. I would like to also thank Hendrik Lenstra for sharing several of his ideas with me, and Hiroshi Gunji, in whose classes I learned quite a bit about algebra. This research was supported by NSF grants DCR-8504485 and DCR8552596. ii
منابع مشابه
Extracting Randomness: How and Why - A survey - Computational Complexity, 1996. Proceedings., Eleventh Annual IEEE Conference on
Extractors are boolean functions that allow, in some precise sense, extraction o f randomness from somewhat random distributions. Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial structures. In turn, extractors and dispersers have many applications in “removing randomness” in various settings, and in maki...
متن کاملA Randomness Test for Stable Data
In this paper, we propose a new method for checking randomness of non-Gaussian stable data based on a characterization result. This method is more sensitive with respect to non-random data compared to the well-known non-parametric randomness tests.
متن کاملTESTING FOR “RANDOMNESS” IN SPATIAL POINT PATTERNS, USING TEST STATISTICS BASED ON ONE-DIMENSIONAL INTER-EVENT DISTANCES
To test for “randomness” in spatial point patterns, we propose two test statistics that are obtained by “reducing” two-dimensional point patterns to the one-dimensional one. Also the exact and asymptotic distribution of these statistics are drawn.
متن کاملA Randomness Based Analysis on the Data Size Needed for Removing Deceptive Patterns
We consider a data set in which each example is an ndimensional Boolean vector labeled as true or false. A pattern is a cooccurrence of a particular value combination of a given subset of the variables. If a pattern appears frequently in the true examples and infrequently in the false examples, we consider it a good pattern. In this paper, we discuss the problem of determining the data size nee...
متن کاملA Simplified Coding Scheme for the Broadcast Channel with Complementary Receiver Side Information under Individual Secrecy Constraints
This paper simplifies an existing coding scheme for the two-receiver discrete memoryless broadcast channel with complementary receiver side information where there is a passive eavesdropper and individual secrecy is required. The existing coding scheme is simplified in two steps by replacing Wyner’s secrecy coding with Carleial-Hellman’s secrecy coding as well as removing additional randomness ...
متن کامل