Skip to main content

Showing 1–10 of 10 results for author: Gasarch, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20026   

    cs.FL

    The CFG Complexity of Singleton Sets

    Authors: Lance Fortnow, William Gasarch

    Abstract: Let G be a context-free grammar (CFG) in Chomsky normal form. We take the number of rules in G to be the size of G. We also assume all CFGs are in Chomsky normal form. We consider the question of, given a string w of length n, what is the smallest CFG such that L(G)={w}? We show the following: 1) For all w, |w|=n, there is a CFG of size with O(n/log n) rules, such that L(G)={w}. 2) There exi… ▽ More

    Submitted 31 May, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: Most results already known

    MSC Class: F.4

  2. arXiv:2111.08916  [pdf, ps, other

    cs.ET cs.CC

    Alternative Paradigms of Computation

    Authors: William Gasarch, Nathan Hayes, Emily Kaplitz, William Regli

    Abstract: With Moore's law coming to a close it is useful to look at other forms of computer hardware. In this paper we survey what is known about several modes of computation: Neuromorphic, Custom Logic, Quantum, Optical, Spintronics, Reversible, Many-Valued Logic, Chemical, DNA, Neurological, Fluidic, Amorphous, Thermodynamic, Peptide, and Membrane. For each of these modes of computing we discuss pros, co… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

    ACM Class: F.m

  3. arXiv:2111.02967  [pdf, other

    cs.CR cs.CC

    An Empirical Comparison of the Quadratic Sieve Factoring Algorithm and the Pollard Rho Factoring Algorithm

    Authors: Zongxia Li, William Gasarch

    Abstract: One of the most significant challenges on cryptography today is the problem of factoring large integers since there are no algorithms that can factor in polynomial time, and factoring large numbers more than some limits(200 digits) remain difficult. The security of the current cryptosystems depends on the hardness of factoring large public keys. In this work, we want to implement two existing fact… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

  4. arXiv:1507.08497  [pdf, ps, other

    math.LO cs.GT

    Which Unbounded Protocol for Envy Free Cake Cutting is Better?

    Authors: William Gasarch

    Abstract: A division of a cake by n people is envy free if everyone thinks they got the biggest pieces. Note that peoples tastes can differ. There is a discrete protocol for envy free division for n=3 which takes at most 5 cuts. For n=4 and beyond there is a protocol but the number of cuts it takes is unbounded. In particular the number of cuts depends on peoples tastes. Given any number N peoples tastes ca… ▽ More

    Submitted 21 August, 2015; v1 submitted 28 July, 2015; originally announced July 2015.

  5. arXiv:1503.08847  [pdf, ps, other

    cs.FL

    On the Sizes of DPDAs, PDAs, LBAs

    Authors: Richard Beigel, William Gasarch

    Abstract: There are languages A such that there is a Pushdown Automata (PDA) that recognizes A which is much smaller than any Deterministic Pushdown Automata (DPDA) that recognizes A. There are languages A such that there is a Linear Bounded Automata (Linear Space Turing Machine, henceforth LBA) that recognizes A which is much smaller than ny PDA that recognizes A. There are languages A such that both A and… ▽ More

    Submitted 15 July, 2015; v1 submitted 30 March, 2015; originally announced March 2015.

    ACM Class: F.1.1

  6. arXiv:1407.5128  [pdf, ps, other

    cs.CC math.CO

    A Sane Proof that COLk \le COL3

    Authors: William Gasarch

    Abstract: Let COLk be the set of all k-colorable graphs. It is easy to show that if a<b then COLa \le COLb (poly time reduction). Using the Cook-Levin theorem it is easy to show that if 3 \le a< b then COLb \le COLa. However this proof is insane in that it translates a graph to a formula and then the formula to a graph. We give a simple proof that COLk \le COL3.

    Submitted 27 January, 2016; v1 submitted 18 July, 2014; originally announced July 2014.

    ACM Class: F.1.3

  7. arXiv:1401.6734  [pdf, ps, other

    math.CO cs.CG math.MG

    Distinct volume subsets

    Authors: David Conlon, Jacob Fox, William Gasarch, David G. Harris, Douglas Ulrich, Samuel Zbarsky

    Abstract: Suppose that $a$ and $d$ are positive integers with $a \geq 2$. Let $h_{a,d}(n)$ be the largest integer $t$ such that any set of $n$ points in $\mathbb{R}^d$ contains a subset of $t$ points for which all the non-zero volumes of the ${t \choose a}$ subsets of order $a$ are distinct. Beginning with Erdős in 1957, the function $h_{2,d}(n)$ has been closely studied and is known to be at least a power… ▽ More

    Submitted 10 May, 2015; v1 submitted 26 January, 2014; originally announced January 2014.

    Comments: 10 pages

    Journal ref: SIAM Journal on Discrete Math 29(1), pp. 472-480 (2014)

  8. arXiv:1205.3813  [pdf, ps, other

    cs.CC

    An NP-Complete Problem in Grid Coloring

    Authors: Daniel Apon, William Gasarch, Kevin Lawler

    Abstract: A c-coloring of G(n,m)=n x m is a map** of G(n,m) into {1,...,c} such that no four corners forming a rectangle have the same color. In 2009 a challenge was proposed via the internet to find a 4-coloring of G(17,17). This attracted considerable attention from the popular mathematics community. A coloring was produced; however, finding it proved to be difficult. The question arises: is the problem… ▽ More

    Submitted 9 December, 2022; v1 submitted 16 May, 2012; originally announced May 2012.

    Comments: 35 pages

    MSC Class: 68Q17; 03F20 ACM Class: F.2.2; F.4.1

  9. arXiv:1108.3347  [pdf, ps, other

    math.CO cs.LO

    Proving programs terminate using well orderings, Ramsey Theory, and Matrices

    Authors: William Gasarch

    Abstract: Many programs allow the user to input data several times during its execution. If the program runs forever the user may input data infinitely often. A program terminates if it terminates no matter what the user does. We discuss various ways to prove that program terminates. The proofs use well orderings, Ramsey Theory, and Matrices. These techniques are used by real program checkers.

    Submitted 3 November, 2014; v1 submitted 16 August, 2011; originally announced August 2011.

    Comments: While this is classified under Combinatorics (to tell combinatorists that someone is using their stuff) it should also be of interest to Logicians and Computer Scientists

    MSC Class: 68N30; 05D10; 03F35 ACM Class: B.7.2

  10. arXiv:cs/0411076  [pdf, ps, other

    cs.CC quant-ph

    Lower bounds on the Deterministic and Quantum Communication Complexity of Hamming Distance

    Authors: Andris Ambainis, William Gasarch, Aravind Srinavasan, Andrey Utis

    Abstract: Alice and Bob want to know if two strings of length n are almost equal. That is, do they differ on \textit{at most} a bits? Let 0\leq a\leq n-1. We show that any deterministic protocol, as well as any error-free quantum protocol (C* version), for this problem requires at least n-2 bits of communication. We show the same bounds for the problem of determining if two strings differ in exactly a bits.… ▽ More

    Submitted 12 January, 2015; v1 submitted 20 November, 2004; originally announced November 2004.

    Comments: 12 pages, this version to appear in ACM Transactions on Computation Theory