Literaturliste aus der Hochschulbibliographie

Bitte beachten Sie, dass die Hochschulbibliographie den Datenstand 31.07.2024 hat.
Alle neueren Einträge finden Sie in der Universitätsbibliographie der Technischen Universität Ilmenau (TUUniBib).

Anzahl der Treffer: 62
Erstellt: Thu, 26 Sep 2024 06:42:02 +0200 in 0.0924 sec


Aumüller, Martin; Dietzfelbinger, Martin
Optimal partitioning for dual-pivot quicksort. - In: ACM transactions on algorithms, ISSN 1549-6333, Bd. 12 (2016), 2, Article No. 18, insges. 36 S.
A preliminary version of this work appeared in the Proceedings of the 40th International Colloquium on Automata, Languages, and Programming (ICALP), Part 1, 33-44, 2013

https://doi.org/10.1145/2743020
Dietzfelbinger, Martin; Jaberi, Raed
On testing single connectedness in directed graphs and some related problems. - In: Information processing letters, ISSN 1872-6119, Bd. 115 (2015), 9, S. 684-688

http://dx.doi.org/10.1016/j.ipl.2015.04.008
Dietzfelbinger, Martin; Rink, Michael
Towards optimal degree distributions for left-perfect matchings in random bipartite graphs. - In: Theory of computing systems, ISSN 1433-0490, Bd. 56 (2015), 4, S. 593-611

http://dx.doi.org/10.1007/s00224-014-9577-1
Csuhaj-Varjú, Ersébet; Dietzfelbinger, Martin; Ésik, Zoltán
Mathematical foundations of computer science 2014 : 39th international symposium, MFCS 2014, Budapest, Hungary, August 25 - 29, 2014 ; proceedings. - Berlin [u.a.] : Springer, 2014. - (Lecture notes in computer science ; ...)
Aumüller, Martin; Dietzfelbinger, Martin; Dietzfelbinger, Martin *1956-*; Wölfel, Philipp;
Explicit and efficient hash families suffice for cuckoo hashing with a stash. - In: Algorithmica, ISSN 1432-0541, Bd. 70 (2014), 3, S. 428-456

It is shown that for cuckoo hashing with a stash as proposed by Kirsch et al. (Proc. 16th European Symposium on Algorithms (ESA), pp. 611-622, Springer, Berlin, 2008) families of very simple hash functions can be used, maintaining the favorable performance guarantees: with constant stash size s the probability of a rehash is O(1/n^(s+1)), the lookup time and the deletion time are O(s) in the worst case, and the amortized expected insertion time is O(s) as well. Instead of the full randomness needed for the analysis of Kirsch et al. and of Kutzelnigg (Discrete Math. Theor. Comput. Sci., 12(3):81-102, 2010) (resp. (log n)-wise independence for standard cuckoo hashing) the new approach even works with 2-wise independent hash families as building blocks. Both construction and analysis build upon the work of Dietzfelbinger and Woelfel (Proc. 35th ACM Symp. on Theory of Computing (STOC), pp. 629-638, 2003). The analysis, which can also be applied to the fully random case, utilizes a graph counting argument and is much simpler than previous proofs. The results can be generalized to situations where the stash size is non-constant.



http://dx.doi.org/10.1007/s00453-013-9840-x
Dietzfelbinger, Martin; Wölfel, Philipp;
Tight lower bounds for greedy routing in higher-dimensional small-world grids. - In: Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, (2014), S. 816-829

We consider Kleinberg's celebrated small world graph model (Kleinberg, 2000), in which a D-dimensional grid {0,\dots,n-1}^D is augmented with a constant number of additional unidirectional edges leaving each node. These long range edges are determined at random according to a probability distribution (the augmenting distribution), which is the same for each node. Kleinberg suggested using the inverse D-th power distribution, in which node v is the long range contact of node u with a probability proportional to |u-v|^(-D). He showed that such an augmenting distribution allows to route a message efficiently in the resulting random graph: The greedy algorithm, where in each intermediate node the message travels over a link that brings the message closest to the target w.r.t. the Manhattan distance, finds a path of expected length O((log n)^2) between any two nodes. We prove that greedy routing does not perform asymptotically better for any uniform and isotropic augmenting distribution, i.,e., the probability that node u has a particular long range contact v is independent of the labels of u and v and only a function of |u-v|. In particular, we show that for such graphs the expected greedy routing time between two arbitrary nodes s and t is Omega((log|s-t|)^2). This lower bound proves and strengthens a conjecture by Aspnes, Diamadi, and Shah (2000). In order to obtain the result, we introduce a novel proof technique: We define a so-called budget game, in which a token travels over a game board, from one end to the other, while the player manages a "probability budget". In each round, the player "bets" part of her remaining probability budget on step sizes. A step size is chosen at random according to a probability distribution of the player's bet. The token then makes progress as determined by the chosen step size, while some of the player's bet is removed from her probability budget. We prove a tight lower bound for such a budget game, and then obtain a lower bound for greedy routing in the D-dimensional grid by a reduction.



Aumüller, Martin; Dietzfelbinger, Martin
Optimal partitioning for dual pivot quicksort. - In: Automata, languages, and programming, (2013), S. 33-44

https://doi.org/10.1007/978-3-642-39206-1_4
Dietzfelbinger, Martin;
On randomness in Hash functions. - In: 29th International Symposium on Theoretical Aspects of Computer Science, (2012), S. 25-28

In the talk, we shall discuss quality measures for hash functions used in data structures and algorithms, and survey positive and negative results. (This talk is not about cryptographic hash functions.) For the analysis of algorithms involving hash functions, it is often convenient to assume the hash functions used behave fully randomly; in some cases there is no analysis known that avoids this assumption. In practice, one needs to get by with weaker hash functions that can be generated by randomized algorithms. A well-studied range of applications concern realizations of dynamic dictionaries (linear probing, chained hashing, dynamic perfect hashing, cuckoo hashing and its generalizations) or Bloom filters and their variants. A particularly successful and useful means of classification are Carter and Wegman's universal or k-wise independent classes, introduced in 1977. A natural and widely used approach to analyzing an algorithm involving hash functions is to show that it works if a sufficiently strong universal class of hash functions is used, and to substitute one of the known constructions of such classes. This invites research into the question of just how much independence in the hash functions is necessary for an algorithm to work. Some recent analyses that gave impossibility results constructed rather artificial classes that would not work; other results pointed out natural, widely used hash classes that would not work in a particular application. Only recently it was shown that under certain assumptions on some entropy present in the set of keys even 2-wise independent hash classes will lead to strong randomness properties in the hash values. The negative results show that these results may not be taken as justification for using weak hash classes indiscriminately, in particular for key sets with structure. When stronger independence properties are needed for a theoretical analysis, one may resort to classic constructions. Only in 2003 it was found out how full randomness can be simulated using only linear space overhead (which is optimal). The "split-and-share" approach can be used to justify the full randomness assumption in some situations in which full randomness is needed for the analysis to go through, like in many applications involving multiple hash functions (e.g., generalized versions of cuckoo hashing with multiple hash functions or larger bucket sizes, load balancing, Bloom filters and variants, or minimal perfect hash function constructions). For practice, efficiency considerations beyond constant factors are important. It is not hard to construct very efficient 2-wise independent classes. Using k-wise independent classes for constant k bigger than 3 has become feasible in practice only by new constructions involving tabulation. This goes together well with the quite new result that linear probing works with 5-independent hash functions. Recent developments suggest that the classification of hash function constructions by their degree of independence alone may not be adequate in some cases. Thus, one may want to analyze the behavior of specific hash classes in specific applications, circumventing the concept of k-wise independence. Several such results were recently achieved concerning hash functions that utilize tabulation. In particular if the analysis of the application involves using randomness properties in graphs and hypergraphs (generalized cuckoo hashing, also in the version with a "stash", or load balancing), a hash class combining k-wise independence with tabulation has turned out to be very powerful.



http://dx.doi.org/10.4230/LIPIcs.STACS.2012.25
Aumüller, Martin; Dietzfelbinger, Martin; Wölfel, Philipp
Explicit and efficient hash families suffice for cuckoo hashing with a stash. - In: Algorithms - ESA 2012, (2012), S. 108-120

https://doi.org/10.1007/978-3-642-33090-2_11
Dietzfelbinger, Martin; Rink, Michael
Towards optimal degree-distributions for left-perfect matchings in random bipartite graphs. - In: Computer Science – Theory and Applications, (2012), S. 99-111

http://dx.doi.org/10.1007/978-3-642-30642-6_11