Cross-input Amortization Captures the Diiuse Adversary
نویسنده
چکیده
Koutsoupias and Papadimitriou recently raised the question of how well deterministic on-line paging algorithms can do against a certain class of adversarially biased random inputs [3]. Such an input is given in an on-line fashion; the adversary determines the next request probabilistically, subject to the constraint that no page may be requested with probability more than a xed > 0. In this paper, we answer their question by estimating, within a factor of two, the optimal competitive ratio of any deterministic on-line strategy against this adversary. We further analyze randomized on-line strategies, obtaining upper and lower bounds within a factor of two. These estimates reveal the qualitative changes as ranges continuously from 1 (the standard model) towards 0 (a severely handicapped adversary). The key to our upper bounds is a novel charging scheme that is appropriate for adversarially biased random inputs. The scheme adjusts the costs of each input so that the expected cost of a random input is unchanged, but working with adjusted costs, we can obtain worst-case bounds on a per-input basis. This lets us use worstcase analysis techniques while still thinking of some of the costs as expected costs.
منابع مشابه
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
Security of a key exchange protocol is formally established through an abstract game between a challenger and an adversary. In this game the adversary can get various information which are modeled by giving the adversary access to appropriate oracle queries. Empowered with all these information, the adversary will try to break the protocol. This is modeled by a test query which asks the adversa...
متن کامل(Probing and Stopping-Time Algorithms)
Combinatorial optimization captures many natural problems such as matching, load balancing, social welfare, orienteering, network design, clustering, and submodular optimization. Classically, these problems have been studied in the fullinformation setting, i.e., where the entire input—an objective function with some constraints—is given and the goal is to select a feasible set to maximize/minim...
متن کاملConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations
In the conditional disclosure of secrets problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs x and y respectively, wish to release a common secret s to Carol (who knows both x and y) if only if the input (x, y) satisfies some predefined predicate f . Alice and Bob are allowed to send a single message to Carol which may depend on their inputs and some joint rando...
متن کاملA Diiuse-interface Description of Fluid Systems
We consider a diiuse-interface model for uid{{uid systems. In classical models, an interface between two uids is treated as innnitely thin, or sharp, and is endowed with properties such as surface tension. Diiuse-interface theories replace this sharp interface with continuous variations of an order parameter such as density in a way consistent with microscopic theories of the interface. Surface...
متن کاملSeeing Beyond Lambert's Law
Lambert's model for diiuse reeection is extensively used in computational vision. For several real-world objects, the Lambertian model can prove to be a very inaccurate approximation to the diiuse component. While the brightness of a Lambertian surface is independent of viewing direction, the brightness of a rough diiuse surface increases as the viewer approaches the source direction. A compreh...
متن کامل