Skip to main content

Showing 1–24 of 24 results for author: Koucký, M

.
  1. arXiv:2406.11225  [pdf, ps, other

    cs.DS

    Almost Linear Size Edit Distance Sketch

    Authors: Michal Koucký, Michael Saks

    Abstract: Edit distance is an important measure of string similarity. It counts the number of insertions, deletions and substitutions one has to make to a string $x$ to get a string $y$. In this paper we design an almost linear-size sketching scheme for computing edit distance up to a given threshold $k$. The scheme consists of two algorithms, a sketching algorithm and a recovery algorithm. The sketching al… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  2. arXiv:2405.00807  [pdf, ps, other

    cs.DS

    Nearly Optimal List Labeling

    Authors: Michael A. Bender, Alex Conway, Martín Farach-Colton, Hanna Komlós, Michal Koucký, William Kuszmaul, Michael Saks

    Abstract: The list-labeling problem captures the basic task of storing a dynamically changing set of up to $n$ elements in sorted order in an array of size $m = (1 + Θ(1))n$. The goal is to support insertions and deletions while moving around elements within the array as little as possible. Until recently, the best known upper bound stood at $O(\log^2 n)$ amortized cost. This bound, which was first establ… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

    Comments: 39 pages

  3. arXiv:2305.00615  [pdf, other

    cs.DS

    Streaming $k$-edit approximate pattern matching via string decomposition

    Authors: Sudatta Bhattacharya, Michal Koucký

    Abstract: In this paper we give an algorithm for streaming $k$-edit approximate pattern matching which uses space $\widetilde{O}(k^2)$ and time $\widetilde{O}(k^2)$ per arriving symbol. This improves substantially on the recent algorithm of Kociumaka, Porat and Starikovskaya (2022) which uses space $\widetilde{O}(k^5)$ and time $\widetilde{O}(k^8)$ per arriving symbol. In the $k$-edit approximate pattern ma… ▽ More

    Submitted 30 April, 2023; originally announced May 2023.

  4. arXiv:2302.04475  [pdf, other

    cs.DS

    Locally consistent decomposition of strings with applications to edit distance sketching

    Authors: Sudatta Bhattacharya, Michal Koucký

    Abstract: In this paper we provide a new locally consistent decomposition of strings. Each string $x$ is decomposed into blocks that can be described by grammars of size $\widetilde{O}(k)$ (using some amount of randomness). If we take two strings $x$ and $y$ of edit distance at most $k$ then their block decomposition uses the same number of grammars and the $i$-th grammar of $x$ is the same as the $i$-th gr… ▽ More

    Submitted 27 November, 2023; v1 submitted 9 February, 2023; originally announced February 2023.

  5. A Separator Theorem for Hypergraphs and a CSP-SAT Algorithm

    Authors: Michal Koucký, Vojtěch Rödl, Navid Talebanfard

    Abstract: We show that for every $r \ge 2$ there exists $ε_r > 0$ such that any $r$-uniform hypergraph with $m$ edges and maximum vertex degree $o(\sqrt{m})$ contains a set of at most $(\frac{1}{2} - ε_r)m$ edges the removal of which breaks the hypergraph into connected components with at most $m/2$ edges. We use this to give an algorithm running in time $d^{(1 - ε_r)m}$ that decides satisfiability of $m$-v… ▽ More

    Submitted 10 December, 2021; v1 submitted 14 May, 2021; originally announced May 2021.

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 4 (December 13, 2021) lmcs:7484

  6. arXiv:2102.10027  [pdf, ps, other

    cs.CC

    Sorting Short Integers

    Authors: Michal Koucký, Karel Král

    Abstract: We build boolean circuits of size $O(nm^2)$ and depth $O(\log(n) + m \log(m))$ for sorting $n$ integers each of $m$-bits. We build also circuits that sort $n$ integers each of $m$-bits according to their first $k$ bits that are of size $O(nmk(1 + \log^*(n) - \log^*(m)))$ and depth $O(\log^{3}(n))$. This improves on the result of Asharov et al. arXiv:2010.09884 and resolves some of their open quest… ▽ More

    Submitted 7 May, 2021; v1 submitted 19 February, 2021; originally announced February 2021.

  7. arXiv:2102.09294  [pdf, other

    cs.CC

    Data Structures Lower Bounds and Popular Conjectures

    Authors: Pavel Dvořák, Michal Koucký, Karel Král, Veronika Slívová

    Abstract: In this paper, we investigate the relative power of several conjectures that attracted recently lot of interest. We establish a connection between the Network Coding Conjecture (NCC) of Li and Li and several data structure like problems such as non-adaptive function inversion of Hellman and the well-studied problem of polynomial evaluation and interpolation. In turn these data structure problems i… ▽ More

    Submitted 18 February, 2021; originally announced February 2021.

    ACM Class: F.2

  8. arXiv:2010.08445  [pdf, other

    cs.CC

    Barrington Plays Cards: The Complexity of Card-based Protocols

    Authors: Pavel Dvořák, Michal Koucký

    Abstract: In this paper we study the computational complexity of functions that have efficient card-based protocols. Card-based protocols were proposed by den Boer [EUROCRYPT '89] as a means for secure two-party computation. Our contribution is two-fold: We classify a large class of protocols with respect to the computational complexity of functions they compute, and we propose other encodings of inputs whi… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

    ACM Class: F.1.1

  9. arXiv:1904.05459  [pdf, ps, other

    cs.DS

    Constant factor approximations to edit distance on far input pairs in nearly linear time

    Authors: Michal Koucký, Michael E. Saks

    Abstract: For any $T \geq 1$, there are constants $R=R(T) \geq 1$ and $ζ=ζ(T)>0$ and a randomized algorithm that takes as input an integer $n$ and two strings $x,y$ of length at most $n$, and runs in time $O(n^{1+\frac{1}{T}})$ and outputs an upper bound $U$ on the edit distance $ED(x,y)$ that with high probability, satisfies $U \leq R(ED(x,y)+n^{1-ζ})$. In particular, on any input with… ▽ More

    Submitted 9 May, 2019; v1 submitted 10 April, 2019; originally announced April 2019.

    Comments: Corrected typos. Revised argument in Section 4.9, results unchanged

  10. arXiv:1903.03385  [pdf, other

    cs.CR

    Stronger Lower Bounds for Online ORAM

    Authors: Pavel Hubáček, Michal Koucký, Karel Král, Veronika Slívová

    Abstract: Oblivious RAM (ORAM), introduced in the context of software protection by Goldreich and Ostrovsky [JACM'96], aims at obfuscating the memory access pattern induced by a RAM computation. Ideally, the memory access pattern of an ORAM should be independent of the data being processed. Since the work of Goldreich and Ostrovsky, it was believed that there is an inherent $ Ω(\log n) $ bandwidth overhead… ▽ More

    Submitted 23 September, 2019; v1 submitted 8 March, 2019; originally announced March 2019.

  11. Approximating Edit Distance Within Constant Factor in Truly Sub-Quadratic Time

    Authors: Diptarka Chakraborty, Debarati Das, Elazar Goldenberg, Michal Koucky, Michael Saks

    Abstract: Edit distance is a measure of similarity of two strings based on the minimum number of character insertions, deletions, and substitutions required to transform one string into the other. The edit distance can be computed exactly using a dynamic programming algorithm that runs in quadratic time. Andoni, Krauthgamer, and Onak (2010) gave a nearly linear time algorithm that approximates edit distance… ▽ More

    Submitted 15 February, 2021; v1 submitted 8 October, 2018; originally announced October 2018.

    ACM Class: F.2.0

    Journal ref: Journal of the ACM, Volume 67, Issue 6, October 2020, Article No.: 36, Page number: 1-22

  12. arXiv:1810.03551  [pdf, other

    cs.DS

    Approximate Online Pattern Matching in Sub-linear Time

    Authors: Diptarka Chakraborty, Debarati Das, Michal Koucky

    Abstract: We consider the approximate pattern matching problem under edit distance. In this problem we are given a pattern $P$ of length $w$ and a text $T$ of length $n$ over some alphabet $Σ$, and a positive integer $k$. The goal is to find all the positions $j$ in $T$ such that there is a substring of $T$ ending at $j$ which has edit distance at most $k$ from the pattern $P$. Recall, the edit distance bet… ▽ More

    Submitted 5 November, 2018; v1 submitted 8 October, 2018; originally announced October 2018.

  13. arXiv:1809.09819  [pdf, ps, other

    cs.CC

    Improved bounds on Fourier entropy and Min-entropy

    Authors: Srinivasan Arunachalam, Sourav Chakraborty, Michal Koucký, Nitin Saurabh, Ronald de Wolf

    Abstract: Given a Boolean function $f:\{-1,1\}^n\to \{-1,1\}$, the Fourier distribution assigns probability $\widehat{f}(S)^2$ to $S\subseteq [n]$. The Fourier Entropy-Influence (FEI) conjecture of Friedgut and Kalai asks if there exist a universal constant C>0 such that $H(\hat{f}^2)\leq C Inf(f)$, where $H(\hat{f}^2)$ is the Shannon entropy of the Fourier distribution of $f$ and $Inf(f)$ is the total infl… ▽ More

    Submitted 17 September, 2021; v1 submitted 26 September, 2018; originally announced September 2018.

    Comments: 38 pages, arxiv abstract shortened to fit within the size limit

    Journal ref: ACM Transactions on Computation Theory, Volume 13, Issue 4, December 2021

  14. arXiv:1801.05202  [pdf, ps, other

    cs.CC

    Lower bounds for Combinatorial Algorithms for Boolean Matrix Multiplication

    Authors: Debarati Das, Michal Koucký, Michael Saks

    Abstract: In this paper we propose models of combinatorial algorithms for the Boolean Matrix Multiplication (BMM), and prove lower bounds on computing BMM in these models. First, we give a relatively relaxed combinatorial model which is an extension of the model by Angluin (1976), and we prove that the time required by any algorithm for the BMM is at least $Ω(n^3 / 2^{O( \sqrt{ \log n })})$. Subsequently, w… ▽ More

    Submitted 16 January, 2018; originally announced January 2018.

    ACM Class: F.2.2; F.1.1

  15. arXiv:1712.01834  [pdf, ps, other

    cs.IT cs.CC cs.DS

    Optimal Quasi-Gray Codes: The Alphabet Matters

    Authors: Diptarka Chakraborty, Debarati Das, Michal Koucký, Nitin Saurabh

    Abstract: A quasi-Gray code of dimension $n$ and length $\ell$ over an alphabet $Σ$ is a sequence of distinct words $w_1,w_2,\dots,w_\ell$ from $Σ^n$ such that any two consecutive words differ in at most $c$ coordinates, for some fixed constant $c>0$. In this paper we are interested in the read and write complexity of quasi-Gray codes in the bit-probe model, where we measure the number of symbols read and w… ▽ More

    Submitted 17 July, 2018; v1 submitted 5 December, 2017; originally announced December 2017.

  16. arXiv:1704.06807  [pdf, ps, other

    cs.CC

    Simulation Theorems via Pseudorandom Properties

    Authors: Arkadev Chattopadhyay, Michal Koucký, Bruno Loff, Sagnik Mukhopadhyay

    Abstract: We generalize the deterministic simulation theorem of Raz and McKenzie [RM99], to any gadget which satisfies certain hitting property. We prove that inner-product and gap-Hamming satisfy this property, and as a corollary we obtain deterministic simulation theorem for these gadgets, where the gadget's input-size is logarithmic in the input-size of the outer function. This answers an open question p… ▽ More

    Submitted 22 April, 2017; originally announced April 2017.

  17. arXiv:1607.03718  [pdf, ps, other

    cs.DS cs.CC

    Streaming Algorithms For Computing Edit Distance Without Exploiting Suffix Trees

    Authors: Diptarka Chakraborty, Elazar Goldenberg, Michal Koucký

    Abstract: The edit distance is a way of quantifying how similar two strings are to one another by counting the minimum number of character insertions, deletions, and substitutions required to transform one string into the other. In this paper we study the computational problem of computing the edit distance between a pair of strings where their distance is bounded by a parameter $k\ll n$. We present two s… ▽ More

    Submitted 13 July, 2016; originally announced July 2016.

  18. arXiv:1604.07634  [pdf, ps, other

    cs.GT

    The Big Match in Small Space

    Authors: Kristoffer Arnsfelt Hansen, Rasmus Ibsen-Jensen, Michal Koucký

    Abstract: In this paper we study how to play (stochastic) games optimally using little space. We focus on repeated games with absorbing states, a type of two-player, zero-sum concurrent mean-payoff games. The prototypical example of these games is the well known Big Match of Gillete (1957). These games may not allow optimal strategies but they always have ε-optimal strategies. In this paper we design ε-opti… ▽ More

    Submitted 26 April, 2016; originally announced April 2016.

  19. arXiv:1511.07729  [pdf, ps, other

    cs.CC

    A communication game related to the sensitivity conjecture

    Authors: Justin Gilmer, Michal Koucký, Michael Saks

    Abstract: One of the major outstanding foundational problems about boolean functions is the sensitivity conjecture, which (in one of its many forms) asserts that the degree of a boolean function (i.e. the minimum degree of a real polynomial that interpolates the function) is bounded above by some fixed power of its sensitivity (which is the maximum vertex degree of the graph defined on the inputs where two… ▽ More

    Submitted 24 November, 2015; originally announced November 2015.

    MSC Class: 68R05 (primary); 68Q01; 05D05 (secondary) ACM Class: F.1.3; G.2.m

  20. arXiv:1210.3197  [pdf, ps, other

    cs.DS

    On Online Labeling with Polynomially Many Labels

    Authors: Martin Babka, Jan Bulánek, Vladimír Čunát, Michal Koucký, Michael Saks

    Abstract: In the online labeling problem with parameters n and m we are presented with a sequence of n keys from a totally ordered universe U and must assign each arriving key a label from the label set {1,2,...,m} so that the order of labels (strictly) respects the ordering on U. As new keys arrive it may be necessary to change the labels of some items; such changes may be done at any time at unit cost for… ▽ More

    Submitted 11 October, 2012; originally announced October 2012.

    Comments: 15 pages, Presented at European Symposium on Algorithms 2012

  21. arXiv:1202.3898  [pdf, ps, other

    cs.GT

    Exact Algorithms for Solving Stochastic Games

    Authors: Kristoffer Arnsfelt Hansen, Michal Koucky, Niels Lauritzen, Peter Bro Miltersen, Elias Tsigaridas

    Abstract: Shapley's discounted stochastic games, Everett's recursive games and Gillette's undiscounted stochastic games are classical models of game theory describing two-player zero-sum games of potentially infinite duration. We describe algorithms for exactly solving these games.

    Submitted 17 February, 2012; originally announced February 2012.

  22. arXiv:1112.5636  [pdf, other

    cs.DS

    Tight lower bounds for online labeling problem

    Authors: Jan Bulánek, Michal Koucký, Michael Saks

    Abstract: We consider the file maintenance problem (also called the online labeling problem) in which n integer items from the set {1,...,r} are to be stored in an array of size m >= n. The items are presented sequentially in an arbitrary order, and must be stored in the array in sorted order (but not necessarily in consecutive locations in the array). Each new item must be stored in the array before the ne… ▽ More

    Submitted 23 December, 2011; originally announced December 2011.

    Comments: 24 pages, 1 figure

  23. arXiv:0912.3162  [pdf, ps, other

    cs.CC

    Derandomizing from Random Strings

    Authors: Harry Buhrman, Lance Fortnow, Michal Koucký, Bruno Loff

    Abstract: In this paper we show that BPP is truth-table reducible to the set of Kolmogorov random strings R_K. It was previously known that PSPACE, and hence BPP is Turing-reducible to R_K. The earlier proof relied on the adaptivity of the Turing-reduction to find a Kolmogorov-random string of polynomial length using the set R_K as oracle. Our new non-adaptive result relies on a new fundamental fact about… ▽ More

    Submitted 16 December, 2009; originally announced December 2009.

    ACM Class: F.1.2

  24. arXiv:0705.0467  [pdf, ps, other

    math.PR

    Many Random Walks Are Faster Than One

    Authors: Noga Alon, Chen Avin, Michal Koucky, Gady Kozma, Zvi Lotker, Mark R. Tuttle

    Abstract: We pose a new and intriguing question motivated by distributed computing regarding random walks on graphs: How long does it take for several independent random walks, starting from the same vertex, to cover an entire graph? We study the cover time - the expected time required to visit every node in a graph at least once - and we show that for a large collection of interesting graphs, running man… ▽ More

    Submitted 20 November, 2007; v1 submitted 3 May, 2007; originally announced May 2007.

    Comments: 15 pages