Skip to main content

Showing 1–9 of 9 results for author: Hod, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2105.03759  [pdf, other

    cs.DM math.CO

    Multi-layered planar firefighting

    Authors: Arye Deutch, Ohad Noy Feldheim, Rani Hod

    Abstract: Consider a model of fire spreading through a graph; initially some vertices are burning, and at every given time-step fire spreads from burning vertices to their neighbours. The firefighter problem is a solitaire game in which a player is allowed, at every time-step, to protect some non-burning vertices (by effectively deleting them) in order to contain the fire growth. How many vertices per turn,… ▽ More

    Submitted 8 May, 2021; originally announced May 2021.

    Comments: 22 pages, 5 figures

    MSC Class: 05C57; 05C63; 90B10; 91A43; 91A50 ACM Class: G.2.2

  2. arXiv:1711.00762  [pdf, ps, other

    cs.CC math.CO

    Improved Lower Bounds for the Fourier Entropy/Influence Conjecture via Lexicographic Functions

    Authors: Rani Hod

    Abstract: Every Boolean function can be uniquely represented as a multilinear polynomial. The entropy and the total influence are two ways to measure the concentration of its Fourier coefficients, namely the monomial coefficients in this representation: the entropy roughly measures their spread, while the total influence measures their average level. The Fourier Entropy/Influence conjecture of Friedgut and… ▽ More

    Submitted 2 November, 2017; originally announced November 2017.

    Comments: 20+7 pages

  3. arXiv:1704.02659  [pdf, other

    cs.CR

    Tight Bounds on Online Checkpointing Algorithms

    Authors: Achiya Bar-On, Itai Dinur, Orr Dunkelman, Rani Hod, Nathan Keller, Eyal Ronen, Adi Shamir

    Abstract: The problem of online checkpointing is a classical problem with numerous applications which had been studied in various forms for almost 50 years. In the simplest version of this problem, a user has to maintain $k$ memorized checkpoints during a long computation, where the only allowed operation is to move one of the checkpoints from its old time to the current time, and his goal is to keep the ch… ▽ More

    Submitted 19 June, 2019; v1 submitted 9 April, 2017; originally announced April 2017.

    Comments: Appeared at ICALP 2018

  4. arXiv:1604.07084  [pdf, other

    cs.GT cs.CG

    Voronoi Choice Games

    Authors: Meena Boppana, Rani Hod, Michael Mitzenmacher, Tom Morgan

    Abstract: We study novel variations of Voronoi games and associated random processes that we call Voronoi choice games. These games provide a rich framework for studying questions regarding the power of small numbers of choices in multi-player, competitive scenarios, and they further lead to many interesting, non-trivial random processes that appear worthy of study. As an example of the type of problem we… ▽ More

    Submitted 24 April, 2016; originally announced April 2016.

  5. arXiv:1307.7364  [pdf, ps, other

    cs.DS cs.CC cs.DM math.CO

    On active and passive testing

    Authors: Noga Alon, Rani Hod, Amit Weinstein

    Abstract: Given a property of Boolean functions, what is the minimum number of queries required to determine with high probability if an input function satisfies this property or is "far" from satisfying it? This is a fundamental question in Property Testing, where traditionally the testing algorithm is allowed to pick its queries among the entire set of inputs. Balcan, Blais, Blum and Yang have recently su… ▽ More

    Submitted 15 November, 2015; v1 submitted 28 July, 2013; originally announced July 2013.

    Comments: 16 pages

    Journal ref: Combinator. Probab. Comp. 25 (2016) 1-20

  6. arXiv:1301.0282  [pdf, ps, other

    math.CO cs.DM

    Component Games on Regular Graphs

    Authors: Rani Hod, Alon Naor

    Abstract: We study the (1:b) Maker-Breaker component game, played on the edge set of a d-regular graph. Maker's aim in this game is to build a large connected component, while Breaker's aim is to not let him do so. For all values of Breaker's bias b, we determine whether Breaker wins (on any d-regular graph) or Maker wins (on almost every d-regular graph) and provide explicit winning strategies for both pla… ▽ More

    Submitted 2 January, 2013; originally announced January 2013.

    Comments: 10 pages

    MSC Class: 91A24; 68R10

  7. arXiv:1006.1587  [pdf, ps, other

    cs.DM math.CO

    A construction for the hat problem on a directed graph

    Authors: Rani Hod, Marcin Krzywkowski

    Abstract: A team of players plays the following game. After a strategy session, each player is randomly fitted with a blue or red hat. Then, without further communication, everybody can try to guess simultaneously his or her own hat color by looking at the hat colors of other players. Visibility is defined by a directed graph; that is, vertices correspond to players, and a player can see each player to whom… ▽ More

    Submitted 24 May, 2013; v1 submitted 8 June, 2010; originally announced June 2010.

    Comments: 9 pages. v2: updated title and abstract to match journal version

    MSC Class: 05C20; 05C69; 91A12; 91A43

    Journal ref: Electronic J. Combinatorics 19 (2012) P30

  8. 3/2 Firefighters are not enough

    Authors: Ohad N. Feldheim, Rani Hod

    Abstract: The firefighter problem is a monotone dynamic process in graphs that can be viewed as modeling the use of a limited supply of vaccinations to stop the spread of an epidemic. In more detail, a fire spreads through a graph, from burning vertices to their unprotected neighbors. In every round, a small amount of unburnt vertices can be protected by firefighters. How many firefighters per turn, on aver… ▽ More

    Submitted 10 May, 2010; originally announced May 2010.

    Comments: 8 pages

    MSC Class: 05C57; 05C63; 90B10; 91A43; 91A50 ACM Class: G.2.2

    Journal ref: Discrete Applied Mathematics 161 (2013) 301-306

  9. arXiv:cs/0012006  [pdf

    cs.SE cs.PL

    Support for Debugging Automatically Parallelized Programs

    Authors: Robert Hood, Gabriele Jost

    Abstract: We describe a system that simplifies the process of debugging programs produced by computer-aided parallelization tools. The system uses relative debugging techniques to compare serial and parallel executions in order to show where the computations begin to differ. If the original serial code is correct, errors due to parallelization will be isolated by the comparison. One of the primary goals… ▽ More

    Submitted 11 December, 2000; originally announced December 2000.

    Comments: In M. Ducasse (ed), proceedings of the Fourth International Workshop on Automated Debugging (AADEBUG 2000), August 2000, Munich. cs.SE/0010035

    ACM Class: D.2.5