Skip to main content

Showing 1–44 of 44 results for author: Russell, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17121  [pdf, ps, other

    cs.DS

    Competitive Policies for Online Collateral Maintenance

    Authors: Ghada Almashaqbeh, Sixia Chen, Alexander Russell

    Abstract: Layer-two blockchain protocols emerged to address scalability issues related to fees, storage cost, and confirmation delay of on-chain transactions. They aggregate off-chain transactions into a fewer on-chain ones, thus offering immediate settlement and reduced transaction fees. To preserve security of the underlying ledger, layer-two protocols often work in a collateralized model; resources are c… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  2. arXiv:2404.09450  [pdf, ps, other

    cs.CR

    Crooked indifferentiability of the Feistel Construction

    Authors: Alexander Russell, Qiang Tang, Jiadong Zhu

    Abstract: The Feistel construction is a fundamental technique for building pseudorandom permutations and block ciphers. This paper shows that a simple adaptation of the construction is resistant, even to algorithm substitution attacks -- that is, adversarial subversion -- of the component round functions. Specifically, we establish that a Feistel-based construction with more than $2000n/\log(1/ε)$ rounds ca… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  3. arXiv:2404.09442  [pdf, other

    cs.CR

    Correcting Subverted Random Oracles

    Authors: Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu

    Abstract: The random oracle methodology has proven to be a powerful tool for designing and reasoning about cryptographic schemes. In this paper, we focus on the basic problem of correcting faulty or adversarially corrupted random oracles, so that they can be confidently applied for such cryptographic purposes. We prove that a simple construction can transform a "subverted" random oracle which disagrees wi… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  4. arXiv:2403.19107  [pdf

    cs.CV cs.LG

    Synthetic Medical Imaging Generation with Generative Adversarial Networks For Plain Radiographs

    Authors: John R. McNulty, Lee Kho, Alexandria L. Case, Charlie Fornaca, Drew Johnston, David Slater, Joshua M. Abzug, Sybil A. Russell

    Abstract: In medical imaging, access to data is commonly limited due to patient privacy restrictions and the issue that it can be difficult to acquire enough data in the case of rare diseases.[1] The purpose of this investigation was to develop a reusable open-source synthetic image generation pipeline, the GAN Image Synthesis Tool (GIST), that is easy to use as well as easy to deploy. The pipeline helps to… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Report number: Public Release Case Number 22-3965

  5. arXiv:2402.13273  [pdf, ps, other

    cs.AI cs.HC

    Operational Collective Intelligence of Humans and Machines

    Authors: Nikolos Gurney, Fred Morstatter, David V. Pynadath, Adam Russell, Gleb Satyukov

    Abstract: We explore the use of aggregative crowdsourced forecasting (ACF) as a mechanism to help operationalize ``collective intelligence'' of human-machine teams for coordinated actions. We adopt the definition for Collective Intelligence as: ``A property of groups that emerges from synergies among data-information-knowledge, software-hardware, and individuals (those with new insights as well as recognize… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  6. arXiv:2402.06515  [pdf, ps, other

    cs.CR

    The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording

    Authors: Benjamin Fuller, Rashmi Pai, Alexander Russell

    Abstract: Risk-limiting audits (RLAs) are techniques for verifying the outcomes of large elections. While they provide rigorous guarantees of correctness, widespread adoption has been impeded by both efficiency concerns and the fact they offer statistical, rather than absolute, conclusions. We attend to both of these difficulties, defining new families of audits that improve efficiency and offer qualitative… ▽ More

    Submitted 17 June, 2024; v1 submitted 9 February, 2024; originally announced February 2024.

    Comments: 27 pages, full version of an article of the same name at USENIX Security 2024

  7. arXiv:2308.14253  [pdf, other

    cs.AI cs.CR cs.LG

    The Promise and Peril of Artificial Intelligence -- Violet Teaming Offers a Balanced Path Forward

    Authors: Alexander J. Titus, Adam H. Russell

    Abstract: Artificial intelligence (AI) promises immense benefits across sectors, yet also poses risks from dual-use potentials, biases, and unintended behaviors. This paper reviews emerging issues with opaque and uncontrollable AI systems and proposes an integrative framework called violet teaming to develop reliable and responsible AI. Violet teaming combines adversarial vulnerability probing (red teaming)… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

    Comments: 14 pages, 1 figure

  8. arXiv:2307.03859  [pdf, other

    cs.CL

    MDACE: MIMIC Documents Annotated with Code Evidence

    Authors: Hua Cheng, Rana Jafari, April Russell, Russell Klopfer, Edmond Lu, Benjamin Striner, Matthew R. Gormley

    Abstract: We introduce a dataset for evidence/rationale extraction on an extreme multi-label classification task over long medical documents. One such task is Computer-Assisted Coding (CAC) which has improved significantly in recent years, thanks to advances in machine learning technologies. Yet simply predicting a set of final codes for a patient encounter is insufficient as CAC systems are required to pro… ▽ More

    Submitted 7 July, 2023; originally announced July 2023.

  9. arXiv:2211.14608  [pdf, other

    cs.HC

    EEGLog: Lifelogging EEG Data When You Listen to Music

    Authors: Jiyang Li, Ann Gina Konnayil, Adam Russell, Dingran Wang, Yincheng **, Seokmin Choi, Zhanpeng **

    Abstract: Self-tracking has been long discussed, which can monitor daily activities and help users to recall previous experiences. Such data-capturing technique is no longer limited to photos, text messages, or personal diaries in recent years. With the development of wearable EEG devices, we introduce a novel modality of logging EEG data while listening to music, and bring up the idea of the neural-centric… ▽ More

    Submitted 26 November, 2022; originally announced November 2022.

  10. arXiv:2202.02607  [pdf, other

    cs.CR

    Adaptive Risk-Limiting Ballot Comparison Audits

    Authors: Benjamin Fuller, Abigail Harrison, Alexander Russell

    Abstract: Risk-limiting audits (RLAs) are rigorous statistical procedures meant to detect invalid election results. RLAs examine paper ballots cast during the election to statistically assess the possibility of a disagreement between the winner determined by the ballots and the winner reported by tabulation. The most ballot efficient approaches proceed by "ballot comparison." However, ballot comparison requ… ▽ More

    Submitted 22 December, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

    Comments: 33 pages. Substantial technical and editorial revision

  11. arXiv:2107.05515  [pdf, other

    cs.CY

    Mathematical Analysis of Redistricting in Utah

    Authors: Annika King, Jacob Murri, Jake Callahan, Adrienne Russell, Tyler J. Jarvis

    Abstract: We discuss difficulties of evaluating partisan gerrymandering in the congressional districts in Utah and the failure of many common metrics in Utah. We explain why the Republican vote share in the least-Republican district (LRVS) is a good indicator of the advantage or disadvantage each party has in the Utah congressional districts. Although the LRVS only makes sense in settings with at most one c… ▽ More

    Submitted 19 July, 2022; v1 submitted 12 July, 2021; originally announced July 2021.

    Comments: 27 pages, 6. figures, submitted to "Statistics and Public Policy"

    ACM Class: K.4.1

  12. arXiv:2001.06403  [pdf, ps, other

    cs.DC cs.CR cs.DM

    Consistency of Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders

    Authors: Aggelos Kiayias, Saad Quader, Alexander Russell

    Abstract: We improve the fundamental security threshold of eventual consensus Proof-of-Stake (PoS) blockchain protocols under the longest-chain rule by showing, for the first time, the positive effect of rounds with concurrent honest leaders. Current security analyses reduce consistency to the dynamics of an abstract, round-based block creation process that is determined by three events associated with a… ▽ More

    Submitted 28 July, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: Includes new sections describing (1) an adaptive online adversary and (2) an efficient algorithm to compute consistency error probabilities. arXiv admin note: text overlap with arXiv:1911.10187

  13. arXiv:1911.10187  [pdf, ps, other

    cs.CR cs.DM

    Linear Consistency for Proof-of-Stake Blockchains

    Authors: Erica Blum, Aggelos Kiayias, Cristopher Moore, Saad Quader, Alexander Russell

    Abstract: The blockchain data structure maintained via the longest-chain rule---popularized by Bitcoin---is a powerful algorithmic tool for consensus algorithms. Such algorithms achieve consistency for blocks in the chain as a function of their depth from the end of the chain. While the analysis of Bitcoin guarantees consistency with error $2^{-k}$ for blocks of depth $O(k)$, the state-of-the-art of proof-o… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: The full version accompanying the paper in SODA 2020

  14. Efficient simulation of random states and random unitaries

    Authors: Gorjan Alagic, Christian Majenz, Alexander Russell

    Abstract: We consider the problem of efficiently simulating random quantum states and random unitary operators, in a manner which is convincing to unbounded adversaries with black-box oracle access. This problem has previously only been considered for restricted adversaries. Against adversaries with an a priori bound on the number of queries, it is well-known that $t$-designs suffice. Against polynomial-t… ▽ More

    Submitted 13 October, 2019; originally announced October 2019.

    Comments: 20+3 pages

    Journal ref: Advances in Cryptology - EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science, vol 12107. Springer, Cham

  15. arXiv:1804.08680  [pdf, ps, other

    cs.DM math.CO

    How to Realize a Graph on Random Points

    Authors: Saad Quader, Alexander Russell

    Abstract: We are given an integer $d$, a graph $G=(V,E)$, and a uniformly random embedding $f : V \rightarrow \{0,1\}^d$ of the vertices. We are interested in the probability that $G$ can be "realized" by a scaled Euclidean norm on $\mathbb{R}^d$, in the sense that there exists a non-negative scaling $w \in \mathbb{R}^d$ and a real threshold $θ> 0$ so that \[ (u,v) \in E \qquad \text{if and only if} \qqua… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

    Comments: Submitted to Random 2018

  16. Quantum-secure message authentication via blind-unforgeability

    Authors: Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song

    Abstract: Formulating and designing authentication of classical messages in the presence of adversaries with quantum query access has been a longstanding challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum setting. A particular difficulty is how to fairly capture the notion of "predicting an unqueried value" when the adversary can q… ▽ More

    Submitted 20 April, 2023; v1 submitted 10 March, 2018; originally announced March 2018.

    Comments: 37 pages, v4: Erratum added. We removed a result that had an error in its proof

    Journal ref: In: Canteaut A., Ishai Y. (eds) Advances in Cryptology -- EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science, vol 12107. Springer, Cham

  17. Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts

    Authors: Gorjan Alagic, Alexander Russell

    Abstract: Recent results of Kaplan et al., building on previous work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems can be completely broken by quantum chosen-plaintext attacks (qCPA). In such an attack, the quantum adversary has the ability to query the cryptographic functionality in superposition. The vulnerable cryptosystems include the Even-Mansou… ▽ More

    Submitted 10 March, 2017; v1 submitted 4 October, 2016; originally announced October 2016.

    Comments: 22 pages, to appear in Proceedings of EUROCRYPT 2017

    Journal ref: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, pages 65-93, 2017

  18. arXiv:1609.01582  [pdf, ps, other

    math.CO cs.DM math.PR

    Codes, Lower Bounds, and Phase Transitions in the Symmetric Rendezvous Problem

    Authors: Varsha Dani, Thomas P. Hayes, Cristopher Moore, Alexander Russell

    Abstract: In the rendezvous problem, two parties with different labelings of the vertices of a complete graph are trying to meet at some vertex at the same time. It is well-known that if the parties have predetermined roles, then the strategy where one of them waits at one vertex, while the other visits all $n$ vertices in random order is optimal, taking at most $n$ steps and averaging about $n/2$. Anderson… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

    MSC Class: 60C05 ACM Class: G.3

  19. arXiv:1408.5425  [pdf, ps, other

    cs.CC math.CO math.RT

    Heat and Noise on Cubes and Spheres: The Sensitivity of Randomly Rotated Polynomial Threshold Functions

    Authors: Cristopher Moore, Alexander Russell

    Abstract: We establish a precise relationship between spherical harmonics and Fourier basis functions over a hypercube randomly embedded in the sphere. In particular, we give a bound on the expected Boolean noise sensitivity of a randomly rotated function in terms of its "spherical sensitivity," which we define according to its evolution under the spherical heat equation. As an application, we prove an aver… ▽ More

    Submitted 22 August, 2014; originally announced August 2014.

  20. arXiv:1407.0442  [pdf, ps, other

    cs.DC

    Technical Report: Dealing with Undependable Workers in Decentralized Network Supercomputing

    Authors: Seda Davtyan, Kishori M. Konwar, Alexander Russell, Alexander A. Shvartsman

    Abstract: Internet supercomputing is an approach to solving partitionable, computation-intensive problems by harnessing the power of a vast number of interconnected computers. This paper presents a new algorithm for the problem of using network supercomputing to perform a large collection of independent tasks, while dealing with undependable processors. The adversary may cause the processors to return bogus… ▽ More

    Submitted 1 July, 2014; originally announced July 2014.

  21. arXiv:1401.7313  [pdf, ps, other

    cs.NI

    Deterministic Blind Rendezvous in Cognitive Radio Networks

    Authors: Sixia Chen, Alexander Russell, Abhishek Samanta, Ravi Sundaram

    Abstract: Blind rendezvous is a fundamental problem in cognitive radio networks. The problem involves a collection of agents (radios) that wish to discover each other in the blind setting where there is no shared infrastructure and they initially have no knowledge of each other. Time is divided into discrete slots; spectrum is divided into discrete channels, $\{1,2,..., n\}$. Each agent may access a single… ▽ More

    Submitted 28 January, 2014; originally announced January 2014.

    ACM Class: F.2.2

  22. arXiv:1304.5010  [pdf, ps, other

    cs.CC math.CO math.GR math.RT

    Small-Bias Sets for Nonabelian Groups: Derandomizing the Alon-Roichman Theorem

    Authors: Sixia Chen, Cristopher Moore, Alexander Russell

    Abstract: In analogy with epsilon-biased sets over Z_2^n, we construct explicit epsilon-biased sets over nonabelian finite groups G. That is, we find sets S subset G such that | Exp_{x in S} rho(x)| <= epsilon for any nontrivial irreducible representation rho. Equivalently, such sets make G's Cayley graph an expander with eigenvalue |lambda| <= epsilon. The Alon-Roichman theorem shows that random sets of si… ▽ More

    Submitted 30 April, 2013; v1 submitted 17 April, 2013; originally announced April 2013.

    Comments: Our results on solvable groups have been significantly improved, giving eps-biased sets of polynomial (as opposed to quasipolynomial) size

  23. Quantum Fourier Transforms and the Complexity of Link Invariants for Quantum Doubles of Finite Groups

    Authors: Hari Krovi, Alexander Russell

    Abstract: Knot and link invariants naturally arise from any braided Hopf algebra. We consider the computational complexity of the invariants arising from an elementary family of finite-dimensional Hopf algebras: quantum doubles of finite groups (denoted D(G), for a group G). Regarding algorithms for these invariants, we develop quantum circuits for the quantum Fourier transform over D(G); in general, we sho… ▽ More

    Submitted 24 July, 2013; v1 submitted 4 October, 2012; originally announced October 2012.

    Comments: 30 pages

    Journal ref: Commun. Math. Phys. 334, 743-777 (2015)

  24. arXiv:1205.6218  [pdf, ps, other

    cs.CC math.CO

    Optimal epsilon-biased sets with just a little randomness

    Authors: Cristopher Moore, Alexander Russell

    Abstract: Subsets of F_2^n that are eps-biased, meaning that the parity of any set of bits is even or odd with probability eps close to 1/2, are powerful tools for derandomization. A simple randomized construction shows that such sets exist of size O(n/eps^2), and known deterministic constructions achieve sets of size O(n/eps^3), O(n^2/eps^2), and O((n/eps^2)^{5/4}). Rather than derandomizing these sets com… ▽ More

    Submitted 17 April, 2013; v1 submitted 28 May, 2012; originally announced May 2012.

  25. arXiv:1205.0263  [pdf, ps, other

    cs.CC math.CO

    An Entropic Proof of Chang's Inequality

    Authors: Russell Impagliazzo, Cristopher Moore, Alexander Russell

    Abstract: Chang's lemma is a useful tool in additive combinatorics and the analysis of Boolean functions. Here we give an elementary proof using entropy. The constant we obtain is tight, and we give a slight improvement in the case where the variables are highly biased.

    Submitted 16 May, 2012; v1 submitted 1 May, 2012; originally announced May 2012.

  26. arXiv:1111.4382  [pdf, ps, other

    cs.CC cs.CR quant-ph

    Quantum Fourier sampling, Code Equivalence, and the quantum security of the McEliece and Sidelnikov cryptosystems

    Authors: Hang Dinh, Cristopher Moore, Alexander Russell

    Abstract: The Code Equivalence problem is that of determining whether two given linear codes are equivalent to each other up to a permutation of the coordinates. This problem has a direct reduction to a nonabelian hidden subgroup problem (HSP), suggesting a possible quantum algorithm analogous to Shor's algorithms for factoring or discrete log. However, we recently showed that in many cases of interest---in… ▽ More

    Submitted 18 November, 2011; originally announced November 2011.

  27. arXiv:1009.6230  [pdf, ps, other

    math.RT cs.DM math.GR quant-ph

    Approximate Representations and Approximate Homomorphisms

    Authors: Cristopher Moore, Alexander Russell

    Abstract: Approximate algebraic structures play a defining role in arithmetic combinatorics and have found remarkable applications to basic questions in number theory and pseudorandomness. Here we study approximate representations of finite groups: functions f:G -> U_d such that Pr[f(xy) = f(x) f(y)] is large, or more generally Exp_{x,y} ||f(xy) - f(x)f(y)||^2$ is small, where x and y are uniformly random e… ▽ More

    Submitted 30 September, 2010; originally announced September 2010.

  28. arXiv:1009.4136  [pdf, ps, other

    math.GR cs.CC math.RT

    Regarding a Representation-Theoretic Conjecture of Wigderson

    Authors: Cristopher Moore, Alexander Russell

    Abstract: We show that there exists a family of irreducible representations R_i (of finite groups G_i) such that, for any constant t, the average of R_i over t uniformly random elements g_1, ..., g_t of G_i has operator norm 1 with probability approaching 1 as i limits to infinity. This settles a conjecture of Wigderson in the negative.

    Submitted 21 September, 2010; originally announced September 2010.

  29. arXiv:1008.2390  [pdf, ps, other

    cs.CR cs.CC math.RT quant-ph

    The McEliece Cryptosystem Resists Quantum Fourier Sampling Attacks

    Authors: Hang Dinh, Cristopher Moore, Alexander Russell

    Abstract: Quantum computers can break the RSA and El Gamal public-key cryptosystems, since they can factor integers and extract discrete logarithms. If we believe that quantum computers will someday become a reality, we would like to have \emph{post-quantum} cryptosystems which can be implemented today with classical computers, but which will remain secure even in the presence of quantum attacks. In this… ▽ More

    Submitted 15 October, 2010; v1 submitted 13 August, 2010; originally announced August 2010.

  30. arXiv:1005.4897  [pdf, ps, other

    math.CO cs.CC math.GR math.RT

    How close can we come to a parity function when there isn't one?

    Authors: Cristopher Moore, Alexander Russell

    Abstract: Consider a group G such that there is no homomorphism f:G to {+1,-1}. In that case, how close can we come to such a homomorphism? We show that if f has zero expectation, then the probability that f(xy) = f(x) f(y), where x, y are chosen uniformly and independently from G, is at most 1/2(1+1/sqrt{d}), where d is the dimension of G's smallest nontrivial irreducible representation. For the alternatin… ▽ More

    Submitted 26 May, 2010; originally announced May 2010.

  31. arXiv:1001.2314  [pdf, ps, other

    cs.CC cs.DM math.CO quant-ph

    Circuit partitions and #P-complete products of inner products

    Authors: Cristopher Moore, Alexander Russell

    Abstract: We present a simple, natural #P-complete problem. Let G be a directed graph, and let k be a positive integer. We define q(G;k) as follows. At each vertex v, we place a k-dimensional complex vector x_v. We take the product, over all edges (u,v), of the inner product <x_u,x_v>. Finally, q(G;k) is the expectation of this product, where the x_v are chosen uniformly and independently from all vectors… ▽ More

    Submitted 13 January, 2010; originally announced January 2010.

  32. arXiv:0909.4575  [pdf, ps, other

    cs.CR cs.IT

    Randomness Efficient Steganography

    Authors: Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar

    Abstract: Steganographic protocols enable one to embed covert messages into inconspicuous data over a public communication channel in such a way that no one, aside from the sender and the intended receiver, can even detect the presence of the secret message. In this paper, we provide a new provably-secure, private-key steganographic encryption protocol secure in the framework of Hopper et al. We first prese… ▽ More

    Submitted 3 February, 2012; v1 submitted 24 September, 2009; originally announced September 2009.

    Comments: 19 pages

    ACM Class: F.2.2; G.3; E.3

  33. arXiv:0909.3658  [pdf, ps, other

    cs.CR cs.IT

    Efficient Steganography with Provable Security Guarantees

    Authors: Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar

    Abstract: We provide a new provably-secure steganographic encryption protocol that is proven secure in the complexity-theoretic framework of Hopper et al. The fundamental building block of our steganographic encryption protocol is a "one-time stegosystem" that allows two parties to transmit messages of length shorter than the shared key with information-theoretic security guarantees. The employment of a p… ▽ More

    Submitted 20 September, 2009; originally announced September 2009.

    Comments: 12 pages

    ACM Class: F.2.2; G.3; E.3

  34. arXiv:0907.1297  [pdf, ps, other

    quant-ph cond-mat.stat-mech cs.CC

    Bounds on the quantum satisfiability threshold

    Authors: Sergey Bravyi, Cristopher Moore, Alexander Russell

    Abstract: Quantum k-SAT is the problem of deciding whether there is a n-qubit state which is perpendicular to a set of vectors, each of which lies in the Hilbert space of k qubits. Equivalently, the problem is to decide whether a particular type of local Hamiltonian has a ground state with zero energy. We consider random quantum k-SAT formulas with n variables and m = αn clauses, and ask at what value of αt… ▽ More

    Submitted 18 September, 2014; v1 submitted 7 July, 2009; originally announced July 2009.

  35. arXiv:0906.1702  [pdf, other

    cs.CC cs.DM math.CO quant-ph

    Approximating the Permanent via Nonabelian Determinants

    Authors: Cristopher Moore, Alexander Russell

    Abstract: Celebrated work of Jerrum, Sinclair, and Vigoda has established that the permanent of a {0,1} matrix can be approximated in randomized polynomial time by using a rapidly mixing Markov chain. A separate strand of the literature has pursued the possibility of an alternate, purely algebraic, polynomial-time approximation scheme. These schemes work by replacing each 1 with a random element of an alg… ▽ More

    Submitted 9 June, 2009; originally announced June 2009.

  36. arXiv:0902.3175  [pdf, ps, other

    cs.CC quant-ph

    The One-Way Communication Complexity of Group Membership

    Authors: Scott Aaronson, François Le Gall, Alexander Russell, Seiichiro Tani

    Abstract: This paper studies the one-way communication complexity of the subgroup membership problem, a classical problem closely related to basic questions in quantum computing. Here Alice receives, as input, a subgroup $H$ of a finite group $G$; Bob receives an element $x \in G$. Alice is permitted to send a single message to Bob, after which he must decide if his input $x$ is an element of $H$. We prov… ▽ More

    Submitted 21 February, 2009; v1 submitted 18 February, 2009; originally announced February 2009.

    Journal ref: Chicago Journal of Theoretical Computer Science, Vol. 2011, Article 6, 2011

  37. arXiv:0810.1018  [pdf, ps, other

    cs.CC

    A simple constant-probability RP reduction from NP to Parity P

    Authors: Cristopher Moore, Alexander Russell

    Abstract: The proof of Toda's celebrated theorem that the polynomial hierarchy is contained in $¶^{# P}$ relies on the fact that, under mild technical conditions on the complexity class $C$, we have $\exists C \subset BP \cdot \oplus C$. More concretely, there is a randomized reduction which transforms nonempty sets and the empty set, respectively, into sets of odd or even size. The customary method is to… ▽ More

    Submitted 6 October, 2008; originally announced October 2008.

  38. arXiv:0806.3437  [pdf, ps, other

    quant-ph cs.DS

    Quantum and Randomized Lower Bounds for Local Search on Vertex-Transitive Graphs

    Authors: Hang Dinh, Alexander Russell

    Abstract: We study the problem of \emph{local search} on a graph. Given a real-valued black-box function f on the graph's vertices, this is the problem of determining a local minimum of f--a vertex v for which f(v) is no more than f evaluated at any of v's neighbors. In 1983, Aldous gave the first strong lower bounds for the problem, showing that any randomized algorithm requires $Ω(2^{n/2 - o(1)})$ queri… ▽ More

    Submitted 20 June, 2008; originally announced June 2008.

  39. arXiv:0805.1257  [pdf, ps, other

    cs.DC cs.DS

    Randomized Work-Competitive Scheduling for Cooperative Computing on $k$-partite Task Graphs

    Authors: Chadi Kari, Alexander Russell, Narasimha Shashidhar

    Abstract: A fundamental problem in distributed computing is the task of cooperatively executing a given set of $t$ tasks by $p$ processors where the communication medium is dynamic and subject to failures. The dynamics of the communication medium lead to groups of processors being disconnected and possibly reconnected during the entire course of the computation furthermore tasks can have dependencies among… ▽ More

    Submitted 24 March, 2012; v1 submitted 8 May, 2008; originally announced May 2008.

  40. arXiv:quant-ph/0609138  [pdf, ps, other

    quant-ph cs.CC math.RT

    On the Impossibility of a Quantum Sieve Algorithm for Graph Isomorphism

    Authors: Cristopher Moore, Alexander Russell

    Abstract: It is known that any quantum algorithm for Graph Isomorphism that works within the framework of the hidden subgroup problem (HSP) must perform highly entangled measurements across Omega(n log n) coset states. One of the only known models for how such a measurement could be carried out efficiently is Kuperberg's algorithm for the HSP in the dihedral group, in which quantum states are adaptively c… ▽ More

    Submitted 18 September, 2006; originally announced September 2006.

  41. arXiv:quant-ph/0501066  [pdf, ps, other

    quant-ph cs.CC

    The Symmetric Group Defies Strong Fourier Sampling: Part II

    Authors: Cristopher Moore, Alexander Russell

    Abstract: Part I of this paper showed that the hidden subgroup problem over the symmetric group--including the special case relevant to Graph Isomorphism--cannot be efficiently solved by strong Fourier sampling, even if one may perform an arbitrary POVM on the coset state. In this paper, we extend these results to entangled measurements. Specifically, we show that the hidden subgroup problem on the symmet… ▽ More

    Submitted 30 September, 2005; v1 submitted 12 January, 2005; originally announced January 2005.

    Comments: 18 pages; v2: fix typos, v3: adds technical lemma and revises Lemma 19

  42. arXiv:quant-ph/0501056  [pdf, ps, other

    quant-ph cs.CC

    The Symmetric Group Defies Strong Fourier Sampling: Part I

    Authors: Cristopher Moore, Alexander Russell, Leonard J. Schulman

    Abstract: We resolve the question of whether Fourier sampling can efficiently solve the hidden subgroup problem. Specifically, we show that the hidden subgroup problem over the symmetric group cannot be efficiently solved by strong Fourier sampling, even if one may perform an arbitrary POVM on the coset state. Our results apply to the special case relevant to the Graph Isomorphism problem.

    Submitted 14 October, 2005; v1 submitted 12 January, 2005; originally announced January 2005.

    Comments: 19 pages; v2 fix typos; v3 adds material on structured permutations

  43. arXiv:cs/0406053  [pdf, ps, other

    cs.DS cs.DM q-bio.QM

    Approximation Algorithms for Minimum PCR Primer Set Selection with Amplification Length and Uniqueness Constraints

    Authors: K. Konwar, I. Mandoiu, A. Russell, A. Shvartsman

    Abstract: A critical problem in the emerging high-throughput genoty** protocols is to minimize the number of polymerase chain reaction (PCR) primers required to amplify the single nucleotide polymorphism loci of interest. In this paper we study PCR primer set selection with amplification length and uniqueness constraints from both theoretical and practical perspectives. We give a greedy algorithm that a… ▽ More

    Submitted 27 July, 2004; v1 submitted 28 June, 2004; originally announced June 2004.

    ACM Class: F.2.2; G.1.6

  44. arXiv:cs/0109056  [pdf

    cs.CY

    Ideological and Policy Origins of the Internet, 1957-1969

    Authors: Andrew L. Russell

    Abstract: This paper examines the ideological and policy consensus that shaped computing research funded by the Information Processing Techniques Office (IPTO) within the Department of Defense's Advanced Research Projects Agency (ARPA). This historical case study of the period between Sputnik and the creation of the ARPANET shows how military, scientific, and academic values shaped the institutions and re… ▽ More

    Submitted 24 October, 2001; v1 submitted 24 September, 2001; originally announced September 2001.

    Comments: 29th TPRC Conference, 2001

    Report number: TPRC-2001-087 ACM Class: K.4.m Miscellaneous