Professional Documents
Culture Documents
Volker Strassen (Auth.), Raymond E. Miller, James W. Thatcher, Jean D. Bohlinger (Eds.) - Complexity of Computer Computations
Volker Strassen (Auth.), Raymond E. Miller, James W. Thatcher, Jean D. Bohlinger (Eds.) - Complexity of Computer Computations
COMPUTER COMPUTATIONS
THE IBM RESEARCH SYMPOSIA SERIES
Editors
Raymond E. Miller • James W. Thatcher
Associate Editor
Jeon D. Bohlinger
Mathematical Sciences Department
IBM Thomas J. Watson Research (enter
Yorktown Heights, New York
v
vi PREFACE
R. E. Miller
J. W. Thatcher
May 1972
CONTENTS
ix
x CONTENTS
Permuting Information
in Idealized Two-Level Storage 105
Robert W. Floyd
Bibliography 187
Volker Strassen
Universitat Zurich
Summary
Pan's Method
3 Corollary LC
I
La . .X
i j
Y ) (q+1) 2 -1.
o~Lj~q IJ
f(rt+v) = At+w
(t 1 , .•• ,t n-m are indeterminates over K and
t=(t~,.",t )).
- ~ n-m
Remarks The case r=1, n-m=1 will be most frequently
used. Here we write yi,t,A,w for Yi1,tj-Y11,w1' As is
easily seen the theorem remains true if everywhere the
total number n of indeterminates is replaced by the
number of indeterminates (say q) actually occurring in
the elements of F.
- -c n
{f 1 , · · · , fr, f r+ j/f r+ 2}' Let L({f 1 , ... , fr, f r+ 1/f r+ 2})cm
and let h€K[x 1 , ... ,x nJ be nonzero, U={hfO}. By induction
hypothesis there is a good (n-m+1)-dimensional subspace
n ~
L' of K such that UnL'f0, Def(f JnL'f0 and f = f on
~ p ~ p ~ p
- c- r+2). I f f r+ 1 and f r+ 2 are
Def(f p )"L' with good f p (1cp
both constant, take any good (n-m)-dimensional subspace
~
Then we have
~ i
L.. y.X )t+ L v.X i
q
At+W,
i=1 1 i=1 1
thus q .
L y.X l = AEk,
i =1 1
L( I a .. x.x.) 1q (q+1l.
= -2
1~i~j::q IJ 1 J
From now on we will always have K=k.
L(f ) = n.
n
Proof If L(f n )<n-j,
-
then we have
[x n- 1 , ••• ,xi]
(4 ) f
n
LX n' ... ,x 1 J
where [x n ' ... ,xi] is the sum of x n ... x i and all sub-
products of x n ... x 1 which can be obtained by deleting
dis j 0 i n t p air s 0 f the form x.1 x.1- 1. Put
n
9 Coro llary L( L 1)
x.
n.
i =j 1
if k = IR,
Further Results
*
plication of two matrices from an irreducible linear
algebraic group is at least times the rank of the
structural tensor of the Lie ring of the group.
Michael O. Rabin
Institute of Mathematics
1. INTRODUCTION
The problem arose with Brent and Wolfe in the following form.
They considered a system of equations
P.(Xl,
~
••• ,X n- 1) = 0, 1 ~ i S n-l.
2. A METHOD OF SOLUTION
N( a) is the ~ space of a.
3. ESSENTIAL SETS
Q(a) 1- 0 implies a E H.
4. ALGORITHMS BY TESTS
5. LINEARIZATION OF ALGORITHMS
(4)
(5) x = (xl(al"",~)"",xn(al""'~»'
of the tree, where Vj+l = Vj+l(al, ••• ,a,), i.e. each coordinate
is a rational function of a , ••• ,a., sdch that, essentially in
Rn(n-l), (5) is a solution ot (1). J Thus this path is a linear
algorithm for solving (1). Each ij+l' and the choice of the
rational functions vj+l(a), do ~ depend on the previous
(6)
the set D~ consists of all vectors vJ with which ai was
tested in ~4).
obtained f:om (4) b~ dropping the last test a evk., The D-sets
correspond~ng to th~s sequence are Dl ••.• ,Dn-~' Dq = Dq - {vk} •
Denote for a = (al, ... ,aq)E Rnq, and for (4) and (10):
Consider the sequence (4) for a' = (al, •.. ,aq-l,a'q)' From
a' q.v = a~.v for v ED' q' it follows. by induction on the
sequence,that all the first k-l tests (the sequence (10»
produce the same al, •.• ,ak-l' Thus D, , ... ,Dq-l are the same
for a' as for a, hence G(a') = G(a). This implies, by
H(a') = G(a') and H(a) = G(a), that H(a') = H(a). Hence
20 MICHAEL O. RABIN
INTRODUCTION
21
22 EDWARD M. REINGOlD AND A. IAN STOCKS
for the proof to work, a much stronger result must be stated and
proved. The object of this paper is to present relatively simple,
self-contained proofs of the above mentioned results. In
particular, for preconditioning we do not use either degrees of
freedom or results from topology, but rather algebraic independence,
a simple and widely known concept. The other results are proved
vnthout substantially strengthening the statement of the result.
SCHEMES
f....
1
= f....
J
0 f...k i > j,k ~ 0 (1)
LOWER BOUNDS
n n-l n-p
U(x) =ux
n + un_lx + •.. + un_px o ~ p ~ n
5 < ~
~.
J.
= c u
n
+ ~.
J
, j < i (2)
Modify the scheme as follows: Change each step of the form (2)
between ~l and ~a: to be ~i = ~j. Notice that none of the ~'s
which are thus changed can appear in a crucial multiplication
before ~ since ~ was the first multiplication crucial in un.
a: a:
With these modifications, the step ~~ now calculates ~~ = ~5.
Let A = (~.J
l
be a scheme which correctly evaluates
a general nth degree polynomial. Let the set of parameters in the
scheme be {~, ••• , akJ, k ~ n + 1 assuming that steps of the form
~ = a. oa. have been eliminated by the introduction of new param-
l J
eters. For each subset construct AQ, a variant of A, by
Q~P
Construct Ai,
a scheme equivalent to AR, with parameters Pi'
which, for each addition
k = max
l~j~n
L
i= 0
(power of a. in the numerator of f.
J 1
°
a.x l and so violate one of the lower bounds already
i= 1
established. •
ACKNOWLEDGMENT
Charles M. Fiduccia
INTRODUCTION
31
32 CHARLES M. FIDUCCIA
[;;:~l [:~: ..
the decomposition ( • stands for zero)
+a+c . a+c ~
of the tensor product I2 ® (a ~) into the sum of 7 matrices, each
capable of being multiplied c by a vector with a single multi-
plication. The above decomposition can be easily verified by
inspection, thus simplifying the search for better matrix multi-
plication algorithms.
PRELIMINARIES
Proof.
AB (Ab1 •.• Ab s ) E
[::J · [A···Al[!:] . Cd.
EXAMPLE 2.
~~
w a b
(~~)(::] E [;. ;
x
x
c d
• a
• c d z • c
BILINEAR CHAINS
Proof. Data steps xl, ... ,xs,Yl' •.. 'Yn and multiplication
steps ¢kl, ... ,¢k t are of the required form. All other steps are
obtained from these by K-dilations, additions or subtractions and
are therefore of the required form since K is stable under these
operations.
Ut
u" [Ul. "ut]' and define U" [I:]' Since U is over ~(E(X».
there exists a fixed matrix A in Ktxr such that u Ax. Compute
Xy = (CUB+D)y as C«Ax) • (By»+Dy.
EXAMPLE 4.
(: :J = a(~ ~) = a(~) (1
(-a a)
-a a
a ( -11) = a (-1)(11) = (-l)a(ll) = a (-e -e ) (e +e ) T
-1 1 -1 -1 1 2 1 2
EXAMPLE 5.
7
EXAMPLE 6. A i~l Xi decomposition of X
·1
.j
a b • a a • b-a
[c d a a • d-a
•• a b (say)
a-d b-d
• • c d c-d
Note that by removing fa a) from the first block of X and (d d) from
La a d d
the second block of X, the result L necessarily has its (2,2) entry
equal to the negative of its (3,3) entry. Further decompose L as
follows:
d-a a-d
d-a a-d
.j·1
• +
[.a-a b-a• d-a• .J
• a-d
•
b-d (say)
. . c-d·
Note that M is the sum of 2 matrices, each having the form of the
matrix of example 5, since a-d = (b-d)-(b-a) and d-a = (c-a)-(c-d).
Thus X = XI +X 2+X 3+M, where M = X4+X5 +X6 +X 7 is the sum of 4 matrices
each of the form Xi = uicibi.
In order to obtain some insight into the number of multipli-
cation steps which are necessary and sufficient in a K-bilinear
chain for E(Xy), we take a new viewpoint of the results of theorem
2. In the decomposition X-D = i~i Xi' each Xi is of the form
Xi = ui~i' where each ~i = cibi is fixed mXn matrix of rank lover
the commutative subring K and each ui is in ~(E(X)). Thus
X-D = uI~I+ ••. +Ut~t for all X in S. It follows that the set SD
o~tained by subtracting D from each element of S must be a subset
of the R-module (vector space if R is a field) generated by the
mxn matrices ~l' .•. '~t. Conversely, if X ranges over any such
subset, then there exists a K-bilinear chain for E(Xy) with t
multiplication steps.
Proof. Take d.
1
= b~
1
in theorem 2. Then apply K to
X-D i~r ui c i b i to obtain K(X)-d i~i u i (c i 9d i ), where d K (P)
and K(c.b.)
1 1
= c.9b+
1 1
= c 1·3d 1·•
38 CHARLES M. FIDUCCIA
LOWER BOUNDS
UPPER BOUNDS
CONCLUSION
Michael S.Paterson
Department of Computer Science
University of Warwick,Coventry,Eng1and
ABSTRACT
This paper is concerned with iterative procedures for finding
real roots of rational polynomials, and in particular with notions
of efficiency for such procedures. For a measure of efficiency,
similar to Ostrowski's index but based on the number of elementary
arithmetic operations used, the main theorem provides an upper
bound. This bound is attained for quadratic polynomials by
Newton's method. Some open problems and conjectures of a theoret-
ical nature are presented.
1. INTRODUCTION
Many and varied are the iterative procedures which are
commonly employed for finding zeroes of functions. It is natural
to want to compare the efficacy and efficiency of different methods
and to ask questions concerning optimality. Most previous research
in this area [Traub (1964A), Traub (1971A), Ostrowski (1966A),
Cohen and Varaiya (1970A), Feldstein and Firestone (1969A),
Rissanen (1970A), Winograd and Wolfe (1971A) J has considered a very
general problem and measured the amount of computation required to
achieve a certain rate of convergence solely in terms of the number
of times that the function or any of its derivatives are evaluated.
Thus the results are most relevant for complicated functions where
these evaluation times are large compared with the subsequent
combination of the values obtained.
41
42 MICHAEl S. PATERSON
2. PRELIMINARIES
lim < 00
3. DEFINITIONS OF "COST"
}
t. x tk
J
t.
J
. tk M
Ar . tk
t.
}
1
Ar x tk
t. ± tk A
J
Ar ± tk
~x - 3/x or (x 2 - 6)/2x
4. "EFFICIENCY"
y(p,M)
From this equation one can see that y should depend only on
(log p)/M, and so we may as well take this as our definition.
x.1-1 f(x.)
1
- x.f(x.
1 1-
1)
S(x., x. 1)
1 1- f(x.)
1
- f(x.1-1)
x x + f(x)
o
x
xi+1 = S(x.,x.
1 1-
1) for i 1, • • • , r-1
<!> (x) = x
r r
f(x) = x2 + bx + C =0
(I) Secant method doing two steps at a time with a "trick".
The saving in cost is by using the two expressions
=u - (u 2 + bu + c)/(u + v + b) - S2(u,v)
alternately.
Given the pair (u,v), compute u' = S (u,v) using two M-
operations. Using the sUb-expression (v 2 ~ bv + c) already
computed, the computation of v' = S2(v,u') needs only one more
M-operation.
Then <!>(u,v) = (u' ,v').
p(<!» 2 ; M(<!» 1
Thus y(<!» =1
(III) Halley's method
<!>(x) _ x - ff'/(f'2_~ff")
p(<!» = 3 ; M(<!» = 2
5. MAIN THEOREM
M(4)) > o.
Proof If M(4)) 0, then 4> is a linear function with rational
coefficients and
4>(x) = x
Q.E.D.
Liouville's theorem in number theory gives us:
max{Q, PI'
NS ~ CNS)2
M
pn
D for all sufficiently large n
Hence,
m-+ oo
M(~ } - (2en)~ as n -+ 00
e,m
For arbitrary 0 > 0, m can be chosen so that
p(~ ) > e + 1 - 0
e,m
So
_1
y(~ ) > (2en) 2 10g(e + 1 - 0)
e,m
for m,n sufficiently large. The integer which maximizes
e-~ 10g(e + 1) is 4. m can be chosen so that Y(~4 ,m ) is arbitrarily
close to
50 MICHAEL S. PATERSON
I have not thought of any way to better this value and should be
interested to hear of any improvement.
x. + •
b x 10 +
+ 2
5 10 15
If I compute x ,x x in 5 M-operations, and use only A-oper-
ations to compute
needed in total.
4
x. a o + alx
1
Given x (an approximant to A4 ) , compute
2
Yo = x , Yl' ,yr where Y.+l1
= ~(y.,A)
1
for i = 0, • r - 1. Then compute
Zo = x, zl' • . . , zr where zi+l = Hz.,y )
1 r
for i 0,... r - 1. e (x) z •
r
1 I
2r
If x = A4 + e:: then y )A~ + O(e::
r
Therefore x = (y )! + O(e::) and so
r
r r
z = (y) ! + 0 (e:: 2 )
1
e (x) A4 + o (e:: 2 )
r r
1. INTRODUCTION
53
54 SHMUEL WINOGRAD
r:'
(1;-, °
a) If (I, J O, J\ ... , JP) is in the family and SIt'
t t t _0. tl P
then so is J t , J t ,···, J t ).
b)
x k _l , 1 - x k _l , 2
x k , 1 = x k _l , 1 - f(x k _l 1) - f(x k _ l 2)
, ,
5
x k ,2= xk,l + (f(x k _l , 1)) .
lim > 0
k-l
(d+l)m
e
j=l r
where e. = min Ix . . -r I·
J l~i~m J, 1
The proof of this theorem is very similar to that of Theorem
2 in Winograd and Wolfe (197lA), so we will only sketch it.
IXk,1. - r I
> C > O.
IT Ix .. -r I
k-l m d+l
IT
. 1 . 1 J, 1
J= 1=
~ 1.
l+(d+l)m
e k _l
j=l J
V. CONCLUSIONS
Richard Brent
1. INTRODUCTION
(1. 1)
of n nonlinear equations in n unknowns. If w. is the amount of
work required to compute x. from x. 1 (and o1her results saved
-1 -1-
1
E =. lim -log ( 1. 2)
1-00
wi+ 1
61
62 RICHARD BRENT
log
p = liITl (1. 4)
i---oo log
~~Ot ~{:/ = E
K (1.5)
~i =
C:~} a
(2. 1)
+ 0 (I (I
which satisfy
(2. 3)
i<l_p »
p n (f'x
for i-N:5 P < i. (Solving the linear equations which give ~. re-
quires of order N 2 operations if a rank-one updating met:6:od is
used. )
Let
E i = II ::i - ~* II 2 • (2.4)
m
~ (2. 7)
j= 0
If x - x':< then it follows from (2. 5) and (2.6) that the order of
-i -'
convergence is at least p • (The proof is similar to some
m,n
given in Brent (1972a).) Also, there are functions and starting
points such that the order is exactly p Hence, I has
m, n' m, n
efficiency
E = log P • (2. 8)
m, n m, n
If 1 <P<P and (6..) is a seguence of independent ran-
m,n 1 00
dom variables distributed so that '~l P{ 16..1:-:: exp{-p1)) is con-
1= 1
vergent, then (2. 6) holds with probability one. This suggests
that, in some sense, the order of I is linearly always" at
m,n
least p • However, the order may be less than p if
~n ~n
(2. 6) does not hold (and the method breaks down if 6., = u).
1
E = log P , (2. 9)
oo,n oo,n
where P is the (unique) real po siti ve root of
00, n .
n+ J
00 -( j )
(2. IO)
l~o p 00, n
In view of the results of Winograd and Wolfe (197Ia) for
n=l, the following conjecture is highly plausible.
ITERATIVE METHODS FOR SYSTEMS OF NONLINEAR EQUATIONS 65
.•
fl (xl) = 0
} (2. ll)
f (x ) = 0
n n
.
However,
E ~ (2. 12)
oo,n n
for large n, so our conjecture is much stronger than this.
E ES(n}
11 n
n kS(n} E
00, n E E
00, n oo,n
3. SPECIAL CASES
00 -(j+ 1)
(3. 1)
j~O Poo,I = I,
-1 -2
PI,I + PI,I = I, (3.2)
-(j+ 1)
P In, 1 = I, (3. 3)
-1 -(n+I) -1
+ (3.4)
,
PIn ,
PIn -,
(3. 5 )
ITERATIVE METHODS FOR SYSTEMS OF NONLINEAR EQUATIONS 67
m j(j+ 1)/ 2
where p (x) = .I: x (3. 6)
J=O
We note that
T
~1=(l,0, ••• ,0) •
-1
v . . =y . . I-J. f(y . . 1) (4. 3)
{..1, J -1, J- 1 -1, J-
ES(k,n)=
log i(k+
n+k-l
k 2 + 4) J (4.4)
ES (n)
1
1 - E =0log
(-)
n
(4. 7)
00, n
ET(n) - 2E (5. 2)
00, n
6. APPENDIX
(6. 1)
yep)
I- = f(x
__p ) (6. 2)
and
(6. 3)
+ R, (y) (6. 6)
J -
for l~j~n and i-N~p < i. For each j" this,gives a s,Ystem of N
linear equations in the N variable s a. (J), j3 (J J, ••• , ,,(J) •
(') 1 n, •••• n
Solving by Cramer's rule for a. J gives
a.
(j) = D(j);
1
D
Z. (6. 8)
(6. 10)
is of order unity.
m
K
: ; /.6 i l kr; 0 " i - (nt k) ,
(6. 12)
where
K = (~
j=l
K J.2 ) i 0 (6. 13)
are close to the simple zero ~ *, the result (2. 5) follows from
(6.12).
THE COMPUTATIONAL COMPLEXITY OF ELLIPTIC
Martin H. Schultz
Yale University
1. INTRODUCTION
73
74 MARTIN H. SCHULTZ
-2
h with band width N. These systems
h. (x) -
1
o , if x ¢ [(i-l)H, (i+l)H]
and for each i with 0 ~ i ~ n+l, we define
o if x 4 [(i-l)H, (i+l)H].
Similarly, we define h.(y) for each 1 < j < nand h.l(y) for
each 0 < j < n+l. OurJpiecewise bivariate-cubic Hetrnite basis
functions a~e defined to be
{hi(x)hj(y), hi(x)h I I 1 1
k (y), h£ (x)hj(y), h£ hk (y)
I1 < i, j < n
and 0 ~ k, £ ~ n+l}.
if °
~ S ~ 1T/2, ° ~ r ~ 1/4,
. 2 8 + 8 cos 2 8 + 2
p ( r ) (1 n r S1n 1T S1n
. 2 8) ,
if °
< 8 < 1T/2, 1/4 < r ~ 1/3,
0, otherwise,
where per) is the unique seventh degree polynomial in r such that
3
SO,0(r,8) = rS 1O,0(r,8) sin 8. For the other three corners, the
(5) J0
l fl ~P(X,y) ~: d~
0
dB
+ q(x,y)
" .-.J.
ay
oWdB.
dy + r(X,y)WB j dxdy
f
= II Jl f(x,y)B.dxdy
o 0 J
for all 1 .:s. j .:s. M.
A22
with band width O(n), A12 is a 4(n+l)2 x12 matrix and A22 is a
l2x12 matrix.
0 if x ~ [(i-l)h, (i+l)h].
Similarly, we define L.(y) for each 0 < j < N+l. In (6) we
J - -
approximate A by
78 MARTIN H. SCHULTZ
A-
~ p(X,y) _1
dB.
dX
dB.
--1. + q(X,y) ~ ~ + r(x,y)B.B.
dX
dB.
0 Y
dB.
oy 1 ]
}
dxdy J
L.(x)L.(y), r(x,y)-
1 ] ~
O..::.i ,j..::.N+l
r(ih,jh) L.(x)L.(y), and
1 ]
f(x ,y) - ~
O..::.i ,j"::'N+l
f(ih,jh) L.(x)L.(y) are the piecewise bilinear
1 ]
Ilw/l
p,q
:: [t t t t \ .~!w
0 0 j=O t=O dX] dy
t (X,y)l
q
dXdy]l/q
l..:.i,j..:.N
the expansion LM *
S.B. (x,y)
2
at the N mesh points of \l(N). That
i=l 1. 1.
M
of * (x,y)
L S.B. 1. 1.
at any pOint of S involves only nineteen of the
i=l
basis functions, we may prove the last result.
for k
(12) inf I
0,1 and
R.
°
lis.1.,]. -
~ i, j
4(n+1)2
2:
t=l
~ 1, and
(l B Ilk 2
t t , I (-
~ E R4 (n+l)2 = °n
7
-2 +k)
-n
Si ,J. =n 2[ 1
S.l. , j - where
B.E! = g,
g - [gk] = [II Jl S~
o 0 l.,J J
. Bk (x ,y)dXd) • [Schultz (197 3A)] •
L:
M *
S. B. by solving the approximate Rayleigh - Rit z-Galerkin
i=l ~ ~
equations
(l3) A§..* = ~, where A and ~ are the analogue of the cor res-
ponding matrix and vector of section 2.
the expansion
*
L:M S.B.(x,y) 2
at the N mesh points of ll(N). We
i=l ~ ~
(14) T 2 0 ( II
4(n+l)2
L: S . B .11
)
+ 0
~II LM S . B .11
)
i=l ~ ~ 1,2 i=4(n+l)2+l ~ ~ 1,2
-
< 0 n( 112 (4(n+l)2
L:
i=l ~
2)
S.
1/2) + 0 ( l/2( L:M
n
i=4(n+l)2+l
2)1/2) •
S.
~
(15) T
~~
~ K 0 n
_1/2(4(n+l)2
L 2
S.
)1/2) + 0 ( -1 ( n LM 2 S.
2)1/2] •
i=l ~ i=4(n+l) +1 ~
4. CONCLUSIONS
ACKNOWLEDGEMENT
Richard M. Karp
University of California at Berkeley
1. INTRODUCTION
85
86 RICHARD M. KARP
2. THE CLASS P
ARC DELETION
INPUT: G, k
PROPERTY: There is a set of k arcs whose deletion breaks all
cycles.
L = {xl there exists y such that <x,y> e L(2) and 19(y) 2 p(lg(x»}.
REDUCIBILITY AMONG COMBINATORIAL PROBLEMS 91
SATISFIABILITY
INPUT: Clauses Cl,C2, ..• ,C 2
PROPERTY: The conjunction or the given clauses is satisfiable;
i.e., there is a set S ~ {xl,x2' .•. ,~;xl,x2, ..• ,xn} such that
a) S does not contain a complementary pair of literals
and b) S n Ck f~, k = 1,2, ••. ,p.
Corollary 1. P NP ~ SATISFIABILITY e P.
REDUCIBILITY AMONG COMBINATORIAL PROBLEMS 93
4. COMPLETE PROBLEMS
1. SATISFIABILITY
COMMENT: By duality, this problem is equivalent to deter-
mining whether a disjunctive normal form expression is a
tautology.
3. CLIQUE
INPUT: graph G, positive integer k
PROPERTY: G has a set of k mutually adjacent nodes.
4. SET PACKING
INPUT: Family of sets {Sj}' positive integer £
PROPERTY: {S.} contains £ mutually disjoint sets.
J
5. NODE COVER
INPUT: graph G', positive integer £
PROPERTY: There is a set R eN' such that IRI < £ and
every arc is incident with some node in R.
_ 6. SET COVERING
INPUT: finite family of finite sets {Sj}' positive integer k
PROPERTY: There is a subfamily {Th } ~ ili j } containing < k
sets such that UT h US j ,
7. FEEDBACK NODE SET
INPUT: digraph H, positive integer k
PROPERTY: There is a set ReV such that every (directed)
cycle of H contains a node in R.
18. KNAPSACK
/ INPUT: (al,aZ, ... ,ar,b) e zn+l
PROPERrt: L a.x. = b has a 0-1 solution.
J J
19. JOB SEQUENCING
INPUT: "execution time vector" (Tl""'~) e ZP,
"deadline vector" (Dl"" ,Dp) € Z'P
"penalty vector" (Pl, ... ,P p ) e Zp
positive integer k
PROPERTY: There is a permutation n of {l,Z, ... ,p} such
that
(r
j=l
[if Tn(l)+"'+Tn(j) > Dn(j) then Pn(j) else 0]) < k
~
SATISFIABILITY
!!
()
MAX CUT ~(
;0
o
\ ~
FIGURE 1 - Complete Problems
;0
"">-
"U
REDUCIBILITY AMONG COMBINATORIAL PROBLEMS 97
20. PARTITION
s
INPUT: (cl.c2 ••••• cs) e z
PROPERTY: There is a set I ~ {1.2 ••••• s} such that
h~Ich = h~Ich
21. MAX CUT
INPUT: graph G. weighting function w: A ~ Z. positive
integer W
PROPERTY: There is a set SeN such that
L w({u.v}) > W
{u.v}eA
ues
v'S
It is clear that these problems (or. more precisely. their
encodings into E*). are all in NP. We proceed to give a series
of explicit reductions, showing that SATISFIABILITY is reducible
to each of the problems listed. Figure 1 shows the structure of
the set of reductions. Each line in the figure indicates a reduc-
tion of the upper problem to the lower one.
{-~ if
otherwise
i
j
1.2 ••••• p
1.2 ••••• n
b i = 1 - {the number of complemented variables in C, )
1:
i = 1.2 ••••• p.
SATISFIABILITY ~ CLIQUE
N = {<a.i>1 a is a literal and occurs in Ci }
A = {{<a.i>.<o.j>}1 i ~ j and a ~ 5}
k p. the number of clauses.
,N.
Sl.S2 ••••• Sn are those two-element sets of nodes {i.j} not in A.
Si ={{i.j}1 {i.j} i = 1.2 ••••• n
f/, =k •
98 RICHARD M. KARP
The writer disc9vered that the exact cover problem was redu-
cible to the directed traveling-salesman problem on a digraph in
which the arcs have weight zero or one. Using refinements of the
technique used in this construction, Tarjan showed that
EXACT COVER ~ DIRECTED HAMILTON CIRCUIT
and, independently, Lawler showed that
NODE COVER ~ DIRECTED HAMILTON CIRCUIT
The reduction
DIRECTED HAMILTON CIRCUIT ~ UNDIRECTED HAMILTON CIRCUIT
was pointed out by Tarjan.
CONTEXT-SENSITIVE RECOGNITION
INPUT: A context-sensitive grammar r and a string x
PROPERTY: x is in the language generated by r.
where
!J.*Eh!J.* if Dh 0"1
!J.*al!J.*a 2!J.* U !J.*a2!J.*al!J.* if D~ 0"1 U0"2
!J.*a l !J.*a 2!J.*a 3!J.* U !J.*a l !J.*a 3!J.*a 2!J.
U il.*-
0"2il.*-
O"lil.*-
0"3il.* U il.*-
0"2il.*-
0"3il.*-
O"lil.*
U !J.*o3!J.*ol!J.*cr 2!J.* U !J.*cr 3!J.*cr 2!J.*cr l !J.*
if Dh = 0"1U0"2 U 0"3 •
Now let m be the least positive integer ~ log I!J.I, and let
~ be a 1-1 function from !J. into {O,l}m. Replace 2 each regular
expression by a regular expression over {O,l}, by making the
substitution a + ~(a) for each occurrence of each element of !J..
GRAPH ISOMORPHISM
INPUT: graphs G and G'
PROPERTY: G is isomorphic to G'.
NONPRIMES
INPUT: positive integer k
PROPERTY: k is composite.
LINEAR INEQUALITIES
INPUT: integer matrix C, integer vector d
PROPERTY: Cx > d has a rational solution.
REDUCIBILITY AMONG COMBINATORIAL PROBLEMS 103
APPENDIX I
Notation and Terminology Used in Problem Specification
PROPOSITIONAL CALCULUS
propositional variables
complements of
propositional variables
cr,cri literals
Cl,C2, ••• ,C p Dl,D2, ••• ,D r clauses
Ck ~ {Xl,x2.···,xn .xl,X2,···,iu}
Di ~ {ul,u2,···,~,ul,u2'···'~}
A clause contains no complementary pair of literals.
SETS
the empty set
the number of elements in the finite set S
{Ui } finite families of finite sets
PERMUTING INFORMATION
Robert W. Floyd
Stanford University
Extended Abstract
a. - a. J u a. J
10 11 1 12 2
lOS
106 ROBERT W. FLOYD
a ..
1J
= brr(i
-1'
J·)II ( . . )'
2 1, J
We define:
k
e(Z + 1) = k· 2 k + (k+Z)l for
L L k
0 - 1 - 2 .
e(l) = 0
e(x+y) ~ e(x) + e(y) + x + y
v = V(A) = ~ e(n.).
i, r 1r
V(B) - V(A)
P
PERMUTING INFORMATION IN IDEALIZED TWO-LEVEL STORAGE 107
n
For the cas l p = Z, l1(i, j) = j, II (i, j) = i, so that
V(A) = 0, V(B) =P . log p, the lower bounJ p logz p, may be
achieved (this is the case of transposing a p X P array, stored
one row to a page). More generally, if p =
Zn, transposing a
kIP X kZp array, which may be reduced to transposition of
p X P subarrays, is thus readily shown to be possible in a num-
ber of operations equal to the lower bound. To transpose such
a p X P array, where a" = boo, we interpret the indices as
bit strings gf length n, i~fc~e~lenting binary numbers in the
range (0, Z -1). Define A 0 = A. We carry out an iteration
n times; after the q-th pass, we have
(q) (0)
a" .,
I l I Z ,JlJZ
= a"I ."
l JZ,J l I Z
I
where iIi = i, j jz = j, liz = Uzi = q, i i Z denotes concat-
enation, ~izl is llie length of the string i / Here
(0) (n)
a" = a, " a" = a .. = b,.,
IJ IJ IJ Jl IJ
During the q-th pass, the page of A (q) whose index is i 1 a i Z'
I I
wltI:l)la = 1 and liz = q-l, is formed from the pages or
A q whose indices are i l a i Z and i l a i z ; this can be done
in a single operation, Thus the total number of operations is n
times the number of pages, Furthermore, each operation is
readily carried out on most actual machines;
r
If P is not a power of two, it can be shown that a p X P
array can be transposed in at most p logz p operations, To 1
show this, we first break up the process into four stages, con-
structing intermediate arrays A', A", A'''; the relations among
them are
lOB ROBERT W. FLOYD
a ..
1J
= a l-1,. .J = a"-l,l+J
. . . = al"
j, i+j
= b J1..
where all the index operations are taken mod p. As AI is
simply a renaming of the pages of A, the first step A - A I
can be absorbed into the subsequent ones without additional
operations. The second step A I - A" shifts the page a left k
(circularly) by k places; again, this can be absorbed into
subsequent operations. The fourth step AI" - B is like the
second, and can be absorbed into the last pass of the third. The
third step A" - A "I shifts the k-th column down (circularly)
by k places. This can be done in rlog2 p passes, or 1
p r log2 p 1
operations, using the binary expansion of k. On
f~e_l q-th pass, column k is shifted down by 2 k - l places iff
2 appears in the binary expansion of q.
(q)" (0)"
a
kH 2 ,1 = a k1 '
abc d a e c g a e i m
e f g h b f d h b f j n
i j k I. i m k 0 c g k 0
m n 0 p j n I. p d h I. P
A,,(3) = Artl B = AT
afkpu a f k P u
v b g i q b g i q v
r w c hm c hm r w
n s x d i d i n s x
j o t y e e j 0 t y
Vaughan R. Pratt
Stanford University
1. GENERALITIES
~ ~ c. . t .. ( I)
a1,aJ·1J
iEF jEF
111
112 VAUGHAN R. PRA IT
T
C· (TT TTT) (2)
where tr(A) is L: a... Expres sion (3) was used by Zales skii
(1965A) and (2) by #arper (1970A), both of whom pointed out
that if we could find efficiently the TT that minimized these
expressions, even for the special case when the elements of
T and C are non-negative, we could then solve the traveling
salesman problem efficiently. But as Karp (1972A) shows
elsewhere in these pages, if we could do this, then we could
solve in polynomial time a remarkably large clas s of hereto-
fore difficult problemso Thus we have:
2. SPECIAL CASES
all permutations 'IT l' 'IT Z when P'IT 1 and Q'IT Z are both in
alternating order.
-p.q ·+lfli-jl,
1 m-J
(5)
(p. - p
1
. l)(q. - q
m-1+ J
. l)(f(m-(i+j)+l) - f li-j
m-J+
I)· (6)
3. APPLICA TIONS
r rad-rot
rev
l X rev + rot, (7 )
AN N LOG N ALGORITHM TO DISTRIBUTE N RECORDS 117
4. CONCLUSIONS
INTRODUCTION
i4-----r~----------~-r--------------------04
~----------~I-----03
il-----L~----------; ~------------------Ol
Fig. I 4-Sorter
119
120 DAVID C. VAN VOORHIS
is
r-----------------~~~------------------------os
i7
i6
i5
i4
i3
i2
il j-------------------; __J------------------------ 0 1
i6
i5
i4
i3
i2
il ~------------------------01
Similarly, we can apply to input leads ij 1 ' ij2' ... , ijk' k ~ I distinct values
higher than the remaining N-k input values, and follow their paths to 0N.k + I ' . . . , oN"
Pruning the comparators traversed by these paths separates the N-sorter into k
wires and an (N-k)-sorter. Let p(k,T) represent the greatest number of comparators
that can be pruned from hI-sorter T for any of the (~) different choices of k
input leads. Then we define
where T ranges over all N-sorters. That is, P(k,N) represents the greatest number
of comparators that we can guarantee to eliminate from every N-sorter by selecting
ij I ' ij2' ... ,ijk judiciously. It follows immediately that
Using (3) in (2) yields the strongest lower bound previously known for SeN),
namely
In the next section we derive a bound for P(2,N), which in turn provides an even
stronger lower bound for SeN).
BOUNDING P(2,N) *
Let T be any N-sorter. The MAX subnetwork of T, MAX(T), includes N-I
comparators, which we label c l ' c2 ' ... , CN. 1 . Comparator cj is a branch node of
*In this section we assume several properties of binary trees which are derived, for example, in
Knuth( 1968A).
122 DAVID C. VAN VOORHIS
i8----~~--~.-----------------~ ..-------------------------08
i4----~~--~~------~
i3
il----~~--~J------------------;~-------------------------Ol
the binary tree MAX(T); therefore, it is also the root node of a smaller binary tree
c..J The two subtrees of C.J - i.e. the portions of MAX(T) leading to the two inputs
of c.J - are denoted L(C.)
J
and R(C.).J
Let Pj 1 be the longest path in MAX(T) that traverses L(C j), and let Pj2 be the
longest path in MAX(T) that traverses R(C.).
J
We define nc(C.) J
to be the number of
comparators from i.J 1 to c.,J plus the number from i.J 2 to c.,J plus the number
from c.J to ON. (Comparator c.J itself is counted exactly once.) The numbers
nc(C.)
J
are included in parentheses following c.J in Fig. 5, for the MAX subnetwork
indicated in Fig. 3. If the number of comparators on path qj is denoted nc(qj)'
then the two paths from ijl and ij2 through cj to ON and ON -1 together in-
clude nc(C.)J
+ nc(q.)J comparators. Therefore,
r-------------------------08
'-~~~~~~----------~"----07
°6
°5
i4 04
i3 03
i2 °2
i8 ~----------~~-----------r~------------08
i6
i5
i4
i3
i2
il
MAX2(T) is a binary tree, so the path lengths nc(qj)' l";;;j";;; N-I, satisfy
" -nc(q·) (6)
L.J 2 )=1.
I ,,;;; j ,,;;; N-l
(7)
where
f(MAX(T) ) (9)
Given any N-sorter the bound derived for p(2, T) depends only upon the struc-
ture of the subnetwork MAX(T); therefore, we may use (8) and (9) in (1) to
obtain
where B ranges over the binary trees with N leaves. Also, defining
(12)
Knuth(l968A) shows that the number of binary trees with N leaves is 2N~1 e~l),
so that (11) and (12) provide a useful bound only for small N. However, the
following theorem enables us to develop a recursive relation for the functipn F(N).
Let L(B), R(B), and Ip(B) represent, respectively, the left and right subtrees of
TOWARD A LOWER BOUND FOR SORTING NETWORKS 125
binary tree B, and the length of the longest path of B. If we define f(0) = 1p(0) =
0, where 0 is the binary tree with one leaf, then
Proof:
If B has N leaves, then L(B) has k leaves, and R(B) has N-k leaves, where
1 ~ k ~ N-l. Let the k-l comparators in L(B) be labeled cL , 1 ,c,L2 , ..• , cL,k·l ,
and let the N-k-l comparators in R(B) be labeled C R ,I' C R ,2' . . . , C R ,N.k.l. The
N-l comparators of B can be labeled so that
l~j~k-l,
(14)
k~j~N-2,
OR, j-k+l '
and CN . 1 is the comparator joining the roots of L(B) and R(B). With these labels
we see that
1 ~j ~k-l, (15)
since the path from CL,j to ON includes one more comparator (C N . 1 ) than the
path from cLJ to the root of L(B). Similarly,
k~j~N-2. (16)
feB) =
L: 2 nc(C Lj ) + 1
l~j~k-l
From the definition f(0) = 0 it follows that F(1) = O. When L(B) has k
leaves, Ip(L(B)) ~ fTOg 2 k1
and Ip(R(B)) ~ fTog 2 (N-k)l; therefore, Theorem 1
implies that
Corollary 1: F( 1) = 0;
~ IIog2k1 + rl g2(N-k)l]
O
F(N) ~ min 2 F(k) + F(N-k) + 2 . (19)
1 ~k~N-l
No closed form solution is known for the recurrence relation given in (19),
although when N = 2m + q ~ 128 the right-hand-side of (19) achieves its minimum
value for k = max[2 m -1, q]. (We suggest that this holds in general.) We can dis-
cover the asymptotic growth of F(N) by considering the function defined by
G(1) = 0;
Theorem 2:
Proof:
G(1) = 0;
(23)
(24)
In the next section we use the bounds derived for P(2,N) to obtain a lower
bound for S(N).
The lower bounds L(N), 1';;; N .;;; 8, were first proved by Floyd and Knuth
(1970A). However, the value L(7) = 16 originally required a 20 hour computer
check of comparator networks containing 15 comparators, whereas this result
follows immediately from S(5) = 9 and P(2,7) = 7. The upper bounds U(N) are
those reported by Green(l970A).
In order to develop a bound for the asymptotic growth of S(N) we define the
following two functions Ll (N) and L2(N), which are both lower bounds for S(N).
(27)
(28)
It is impossible to solve for L2(N) since P(2,N) is not known exactly. However,
since F(N) ~ G(N) and G(N) is strictly increasing, Corollary 2 implies that
L2(2 m+ 1) ~ L2(2 m ) + L:
1 ..;; r ..;; 2
m-1 IIog2(F(2m+2r))l
TOWARD A LOWER BOUND FOR SORTING NETWORKS 129
If we define
D(2 m+1);;;:. L:
4:;;;;;r:;;;;;m
(YlrIog 2(Ylr4r+I)1.r-l )2r, m ;;;:. 4. (32)
Evidently the right-hand-side of (32) is zero for m < 8, and when m = 2k ;;;:. 8,
(32) can be expressed as
(33)
Since L2(2 m) is a lower bound for S(2m), we conclude from (28), (31), and
(33) that
(34)
This represents a significant improvement over the strongest bound previously known
for SeN), given by (4), although it still diverges rapidly from the strongest upper
bound known [Van Voorhis0971A)],
(35)
CONCLUSION
We have observed that the function P(k,N) can be used to bound SeN) from
below. We have shown that PO ,N) = fTc>g)~l , and that in most cases P(2,N) =
[log2 (F(N) )1, where F(N) satisfies (19). P( I ,N) and P(2,N) together provide a
lower bound for SeN) which is exact for N:;;;;; 8, although for large N it diverges
rapidly from the strongest upper bound known. The next improvement in the lower
bound for SeN) will probably result from an approximation of P(3,N).
ISOMORPHISM OF PLANAR GRAPHS (WORKING PAPER)
Cornell University
ABSTRACT
INTRODUCTION
G •
(iii) Each vertex of G which is not an articulation point of
G occurs exactly once among the~. and each articula-
tion point occurs at least twice. ~
(iv) For each i ,j ,i;o!j ,Y.~ n Y.] contains at most one vertex;
furthermore, this vertex (if any) is an articulation point.
The subgraphs G. of G are called the biconnected components
~
of G .
DETERMINING TRICONNECTIVITY
TREE ISOMORPHISM
If the trees are unrooted, unique roots are found using the
method described above. Level numbers are calculated for all
vertices. (The root is level 0.) Next, for each occurrence of a
label ~ an ordered pair (i,~) is constructed; i is the level
of this occurrence of ~. This set of ordered pairs is sorted
lexicographically using two radix sorts to give, for each level i,
a list J(. of the labels (in order) occurring at this level.
1
2) If el r- e rl then el r e2
~t,
3) Assume there exists a path Pl: e l => e 3 · Further assume
that there exists a corresponding path P2: e 2 ~> e 4 .
By corresponding we mean that both paths are the same
length, that the number of edges clockwise between the
edge into and the edge out of corresponding vertices
agree, and that corresponding edges have the same value
of A. Then either
(a) el I- e 3 and e 2 ~ e 4 or
r
(b) el ~ e 3 e2 and f- e: by the same sequence of right
and left turns.
+ .E M _h. log(b./2))
1E: - 0 1 1
Clearly the bound holds when the algorithm has terminated. Con-
sider what happens when an index io is selected from r Cer-
tain blocks will be partitioned. The remaining time will be
bounded by some new T' • The time spent in partitioning is
bounded by kb. We must show that
10
kb. +T'<T
10
ISOMORPHISM ALGORITHM
Michael J. Fischer
1. INTRODUCTION
2. THE ALGORITHMS
(ii) Let A and B be Sn_l trees, and assume that A and B have
no nodes in common. Then the tree obtained by
attaching the root of A to the root of B is an S tree.
n
v
Figure 3.3. Decompositions of an S tree A.
n
158 MICHAEL J. FISCHER
~ if u = a l •
EFFICIENCY OF EQUIVALENCE ALGORITHMS 159
A p
I
a
A'
Let n be the path from n(v) to the root of P. From the defi-
nition of embedding, each of the nodes n(v), n(aO)'···' n(an _ l )
appears on n, and no node in P. except for n(a.) is in n, O<i<n-l.
~ ~ --
As a consequence of the find, each of the nodes n(a.) is
~
linked directly to the root p of pI, and since the path n did not
run through any nodes of P. except for the root, P. is a subtree
~ ~
For n not of the form 3(2k -l), we form the next shorter
sequence that is of that form and then extend it arbitrarily to
get a sequence of length exactly n. This will have the effect
only of changing the constant in (3.1). 0
EFFICIENCY OF EQUIVALENCE ALGORITHMS 161
4. UPPER BOUNDS
n
T(a) <n+ L9. .• (4.1)
i=l 1
2l\, 2l n 2
n > -2 L (£.-2) > -2 L (9..-2) - 2n (4.2)
- iEI 1 - i=l 1
n
or L (9.._2)2 (4.3)
i=l 1
n
The maximum value for L
9.. is achieved when all the
i=l 1
9.. 's are equal, for if they are not all the same, replacing each
b~ the mean 9. can only cause I
i=l
(9.._2)2 to decrease.
1
Hence, from
From (4.5),
9.<2+~ (4.6)
k h
n > L weight(u.) > k·2 , (4.8)
i=l 1
h
so k < n/2 .
lHJ
R(F) = I (# nodes in N of height h)o2 h (4.11)
h=O
By the corollary to Lemma 4.7, the number of nodes in N of height
h
h is at most n/2 • so
lHJ
R(F) ~ I ( nh )o2 h < (H+l)n n·log(n+l). (4.12)
h=O 2
- n. (4.15)
2
n(log(n+l)) > - n, (4.16)
2
so 2n(10g(n+l)) > (4.17)
n
I~. is achieved when all the ~. 's are
The maximum value for
i=l 1. 1.
equal, for if they are not all the same, replacing each by the
n
mean ~ can only cause I 2(~i-3) to decrease. Hence, from (4.13)
i=l
and (4.17), we get
5. CONCLUSION
the introduction, show that each heuristic does indeed improve the
worst case behavior of the algorithm, and together they are better
than either alone.
ACKNOWLEDGEMENT
169
170 PANEL DISCUSSION
The last general question I have is: "Are there any iIn-
portant open probleIns that you wish to bring up to this audience?"
the wrong definition, but on the other hand, when Mike Fischer
makes the interesting conjecture, "Does there exist a linear
time algorithm for the equivalence problem?" we're in an awk-
ward position. We might be able to find one and thereby settle
it, but if none does exist, we don't have a formal definition
enabling us to prove that there is none. We don't have a good
enough hold on the general concept of a data structure or an
algorithm for this type of data manipulation. In that sense, I
think some more methodological work needs to be done.
MILLER: Thank you, gentlemen. I'm sure that each of you would
like to ask each other some questions; however, that's unfair.
You can talk among yourselves many times later, I'm sure. Let's
use this opportunity to get some questions and comments from
the audience.
RABIN: Well, from our experience, not too much was done
about that. It is an extremely important issue, but we had the
experience in some work that Sam [Winograd] and I did during
the past year, that deeper understanding of complexity problems
is a key also for treatment of this problem of numerical analysis.
The methods for polynomial preconditioning and fast evaluation
of polynomials were usually, if you look at some of the textbooks,
discounted as leading to bad numerical results. Now, we worked
on the problem of evaluating elementary functions, which even-
tually boils down to the question of finding the value of a rational
function. We tried to use preconditioning to speed it up, and it
turned out that if you just do it blindly, if you take any cookbook
method for preconditioning, it really subverts your accuracy,
but if you do it carefully, and you use all you know in an adaptive
way, then you could, in fact, combine considerable time savings
with the original accuracy, which in the example which we worked
out was last bit accuracy in double precision evaluation. Now,
over the whole range, I think that is a big problem. However,
the problem of accuracy wouldn't come up, of course, if you go
to the non-numerical applications, which I was advocating before,
so that may be another incentive for going into non-numerical
problems.
KARP: If I can add just one further comment, I'm not convinced
of the notion that the length of a program is a measure at all of
the difficulty of writing it. It seems to me it's much easier to
write a long program to do something than to write a short one.
MILLER: Thank you, Don. Maybe the panel has some reply to
that. Does it need a reply?
RABIN: I think that we have really two issues here, which sort
of get intertwined. One is the question of specific algorithms
and there, the rules of the game are very important and you
have to devise a model for the given situation. If, for example,
you ar"e studying sorting, internal sort is different than what you
have when you consider sort from tapes or maybe from a disc.
That's one of the troublesome aspects of this area, that it is
quite model-dependent within certain limits. The question
whether something is "of complexity n, or n 2 , or n log n,
or even whether it is 3n or 5n is extremely important. You
can't decide such questions without having a rather specific
model. Even so, coming back to the remark I made at the be-
ginning, I'm hopeful about the fact there are certain general
observations and methods. We forgot to mention the idea of
preconditioning. This is well known from polynomials -- that
you do something with the coefficients before you do many
184 PANEL DISCUSSION
Aanderaa, S. O.
(1969A) See Cook and Aanderaa.
Arbib, M. A.
(1967 A) See Spira and Arbib.
Barnes, J. P. G.
(1965A) "An algorithm for solving non-linear equations
based on the secant method," Compo J., Vol. 8,
66 -72.
187
188 BIB LlOGRAPHY
Batcher, K. E.
(1968A) "Sorting networks and their applic ations, "
Proceedings AFIPS Spring Joint Computer
Conference, Vol. 32, 307 -314.
Belaga, E. G.
(195 8A) "Some problems in the computation of poly-
nomials," Dokl. Akad. Nauk SSSR, Vol. 123,
775-777 (Russian). See Math. Reviews,
Vol. 21 (1960) review number 3935.
Bittner, L.
(1959A) "Eine Verallgemeinerung des Lekantenver-
fahrens (regula falsi) zur naherungsweisen
Breechnung der Nullstellen eines nichtlinearen
Gleichungssystems," Wissen. Zeit. der
Technischen Hochschule Dresden, Vol. 9,
325 -329.
Blevins, P. R.
(1971A) See Ramamoorthy and Blevins.
Borodin, A.
(197lA) "Horner's rule is uniquely optimal," Theory
of Machines and Computations, edited by Z.
Kohavi and A. Paz, Academic Press, New
York, 45 -5 8.
Brauer, A.
(1939A) "On addition chains," Bull. Amer. Math.
Soc., Vol. 45, 736-739.
Brent, R. P.
(1970A) "Error analysis of algorithms for matrix
multiplication and triangular decomposition
using Winograd's identity," Numer. Math.,
Vol. 16, 145-156.
Conte, S. D.
(1967 A) See Brown and Conte.
190 BIBLIOGRAPHY
Cook, S. A.
(1966A) "On the minimum computation time of func-
tions," Doctoral Thesis, Harvard University,
Cambridge, Mas sachus etts.
Corneil, D. G.
(197lA) "An n 2 algorithm for determining the bridges
of a graph," Information Processing Letters,
Vol. 1, 51-55.
Davenport, H.
(1970A) Higher Arithmetic: The Introduction to the
Theory of Numbers, Hutchinson, London.
Dijkstra, E.
(1959A) "A note on two problems in connection with
graphs," Num. Math., Vol. 1, 269-27l.
Dinic, E. A.
(1970A) See Arlazarov, Dinic, Kronrod, and Faradzhev.
Dorn, W. S.
(1962A) "Generalizations of Horner's rule for poly-
nomial evaluation," IBM J. of Research and
Development, 239-245.
Dorr, F.
(1970A) "The direct solution of the discrete Pois son
equation on a rectangle," SIAM Review,
Vol. 12, 248-263.
BIBLIOGRAPHY 191
Edmonds, J.
(1965A) "Paths, trees and flowers," Canadian J. Math.
XVII, 449-467.
Eve, J.
(1964A) "The evaluation of polynomials," Numer.
Math., Vol. 6, 17-21.
Faradzhev, 1. A.
(1970A) See Arlazarov, Dinic, Kronrod, and Faradzhev.
Fiduccia, C. M.
(1971A) "Fast matrix multiplication," Proceedings
of Third Annual ACM Symposium on Theory
of Computing, 45-49.
Fike, C. T.
(1969A) See Sterbenz and Fike.
192 BIBLIOGRAPHY
Firest~e, R. M.
(1969A) See Feldstein and Firestone.
Fischer, M. J.
(1964A) See Galler and Fischer.
Fix, G.
(1968A) "Higher -order Rayleigh-Ritz approximations, "
J. Math. Mech., Vol. 18, 645-658.
Furman, M. E.
(1970A) "Application of a method of fast mutliplication
of matrices in the problem of finding the
transitive closure of a graph," Dokl. Akad.
Nauk. SSSR, Vol. 194, 524 (Russian). English
translation in Soviet Math. Dokl., Vol. 11, 1252.
Gentleman, M. W.
(1971A) Private communication.
BIBLIOGRAPHY 193
George, J. A.
(1971A) "Computer implementation of the finite ele-
ment method," Doctoral Thesis, Stanford
University, Stanford, California.
Graham, R. L.
(1971A) "Sorting by comparisons," Computers in
Number Theory, edited by A. O. L. Atkin
and B. J. Birch, Academic Press, New York,
263 -269.
Green, M. W.
(1970A) "Some observations on sorting," Cellular
Logic in Memory Arrays, Final Report,
Part 1, SRI Project 5509, Stanford Research
Institute, Menlo Park, California, 49-71.
Gulati, S.
(1972A) See Fix, Gulati, and Wakoff.
Hadian, A.
(1969A) "Optimality properties of various procedures
for ranking n different numbers using only
binary comparis ons," Technical Report No.
117, Department of Statistics, University of
Minnesota, Minneapolis, Minnesota.
Hall, M.
(1948A) "Distinct representatives of subsets," Bull.
Amer. Math. Soc., Vol. 54, 922-926.
Harary, F.
(1969A) Graph Theory, Addison-Wesley, Reading,
Massachusetts.
Harper, L. H.
(1970A) "Combinatorial coding theory," Proceedings
Second Chapel Hill Conference on Combinatorial
Mathematics and Its Applications, University
of North Carolina, 252 -260.
Hiroshi, O.
(1971A) See Ariyoshi, Shirakawa, and Hiroshi.
Hoare, C. A. R.
(1962A) "Quicksort," Comput. J., Vol. 5, 10-15.
Hopcroft, J.
(1971A) "An N log N algorithm for isomorphism of
planar triply connected graphs," Technical
Report ST AN -CS -71-192, Computer Science
Department, Stanford University, Stanford,
California.
Il'in, A. M.
(1967A) See Emel'yanov and Il'in.
Johnson, S. M.
(1959A) See Ford and Johnson.
Karp, R. M.
(1971A) See Hopcroft and Karp.
Karp (cont'd)
(1972A) See Edmonds and Karp.
this conference.
Kerr, L. R.
(1969A) See Hopcroft and Kerr.
Kiefer, J.
(1953A) "Sequential minimax search for a maximum, II
Proceedings Amer. Math. Soc., Vol. 4, 502-506.
Kislicyn, S. S.
(1962A) liOn a bound for the least mean number of
pairwise comparisons needed for a complete
ordering of n objects with different weights, "
Vestnik Leningrad, Univ. Ser. Mat. Meh.
Astronom., Vol. 17, 162-163 (Russian with
English summary).
198 BIBLIOGRAPHY
Kislicyn (cont1d)
th
(1964A) "On the selection of the k element of an
ordered set by pairwise comparisons, "
Sibirsk. Mat. Zh., Vol. 5, 557 -564 (Russian).
See Math. Reviews, Vol. 29, review number
2l9S.
Knuth, D. E.
(1962A) "Evaluation of polynomials by computers, "
Comm. ACM., Vol. 6, 595 -599.
Knuth (cont'd)
(1971A) "Mathematical analysis of algorithms, "
Technical Report No. STAN -CS -71-206,
Department of Computer Science, Stanford
University, Stanford, California.
Kokovkin-Shcherbak, N. 1.
(1965A) See Kljuev and Kokovkin-Shcherbak.
Kronrod, M. A.
(1970A) See Arlazarov, Dinic, Kronrod, and Faradzhev.
Kruskal, J.
(1956A) "On the shortest spanning subtree of a graph
and the traveling salesman problem, "
Proceedings Amer. Math. Soc., Vol. 7, 48-50.
200 BIBLIOGRAPHY
Lawler, E. L.
(1971A) "The complexity of combinational computations:
a survey," Proceedings of 1971 Polytechnic
Institute of Brooklyn Symposium on Computers
and Automata.
Lederberg, J.
(1964A) "Dendral-64: A system for computer construc-
tion' enumeration, and notation of organic
molecules as tree structures and cyclic graphs,
Part I: Notational algorithm for tree structures, "
Interim Report to the National Aeronautics and
Space Administration, Grant NSG 81-60, NASA
Cr 68898, STAR No. N-66-l4074.
"... Lehman, R. S.
(1959A) "Developments at an analytic corner of solu-
tions of elliptic partial differential equations, "
J. Math. Mech., Vol. 8, 727 -760.
Lin, S.
(1969A) See Hwang and Lin.
Littlewood, J. E.
(1926A) See Hardy, Littlewood, and Polya.
Liu, C. L.
(1971A) "Analysis of sorting algorithms," IEEE
Conference Record of the Twelfth Annual
Symposium on Switching and Automata Theory,
207 -215.
Maruyama, K.
(1971A) "Parallel methods and bounds of eval uating
polynomials," Report No. 437, Department
of Computer Science, University of Illinois,
Urbana, Illinois.
BIBLIOGRAPHY 201
Meyer, A. R.
(1971A) See Fischer and Meyer.
Miranker, W. L.
(1968A) See Karp and Miranker.
Moon, J. W.
(1968A) Topics on Tournaments, Holt, Rinehart, and
Winston, New York.
Morgenstern, J.
(1971A) "On linear algorithms," Theory of Machines
and Computations, edited by Z. Kohavi and
A. Paz, Academic Press, New York, 59-66.
Morris, R.
(1969A) "Some theorems on sorting," SIAM J. Appl.
Math., Vol. 17, 1-6.
Motzkin, T. S.
(1955A) "Evaluation of polynomials" and "Evalua-
tion of rational functions," Bull. Amer. Math .
.§.££., Vol. 61, 163 (abstracts).
Moursund, D. G.
(1967 A) "Optimal startinfi values for Newton-Raphson
calculation of x 72," Comm. ACM, Vol. 10,
430-432.
Munro, I.
(1971A) See Borodin and Munro.
Munro (cont'd)
(1971D) "Efficient determination of the transitive
closure of a directed graph," Information
Processing Letters, Vol. 1, 56-58.
Muraoka, Y.
(1971A) "Parallelism exposure and exploitation in
programs," Report No. 424, Department of
Computer Science, University of Illinois,
Urbana, Illinois.
Ofman, Yu
(1962A) See Karatsuba and Of man.
Ostrowski, A. M.
(1954A) "On two problems in abstract algebra con-
nected with Horner's rule," Studies in Mathe-
matics and Mechanics, Presented to R.
von Mises, Academic Press, New York, 40-48.
Pan, V. Ya
(1959A) "Schemes for computing polynomials with real
coefficients," Dokl. Akad. Nauk SSSR, Vol.
127, 266-269 (Russian). See Math. Reviews,
Vol. 23 (1962), review number B560. French
translation available from Laboratoire Central
BIBLIOGRAPHY 203
Pan (cont'd)
De L'Armement Traductions, 16 bix Avenue
Arcueit, France; translation number T -1. 524.
Paterson, M.
(1971A) See Munro and Paterson.
Phillips, D. L.
(l969A) See King and Phillips.
Pohl, 1.
(1969A) "A minimum storage algorithm for computing
the median," Report No. RC 2701, IBM
Watson Research Center, Yorktown Heights,
New York.
Polya, G.
(1926A) See Hardy, Littlewood, and Polya.
Rabin, M. o.
(1971A) "Proving simultaneous positivity of linear
forms," Third Annual ACM Symposium on
Theory of Computing, invited addres s.
Reingold, E. M.
(1970A) See Holt and Reingold.
Reingold (cont'd)
(197lA) "On some optimal algorithms," Doctoral
Thesis, Cornell University, Ithaca, New York.
Also available as Report No. 428 of the De-
partment of Computer Science, University of
Illinois, Urbana, Illinois.
Ris sanen, J.
(1971A) "On optimum root-finding algorithms," J.
Math. Anal. Appl., Vol. 36, 220-225.
Rogers, H.
(1967 A) Theory of Recursive Functions and Effective
Computability, McGraw-Hill, New York.
Saaty, T. L.
(1965A) See Busacker and Saaty.
Salomaa, A.
(1969A) Theory of A utomata, Pergamon Pres s,
Elmsford, New York.
Sandelius, M.
(196lA) "On an optimal search procedure," Amer.
Math. Monthly, Vol. 68, 133 -134.
Schonhage, A.
(1966A) "Multiplication of large numbers," Computing,
Vol. 1, 182 -196 (German with English summary).
See Comput. Rev., Vol. 8 (1967) review num-
ber 11544.
Schreier, J.
(1932A) "On tournament eliminations systems, "
Mathesis Polska, Vol. 7, 154-160 (Polish).
Schultz, M. H.
(1971A) "L 2 -error bounds for the Rayleigh-Ritz-
Galerkin method," SIAM J. Num. Anal.,
Vol. 8 737-748.
Schumaker, L.
(1972A) See Munteanu and Schumaker.
Scoins, H. 1.
(1968A) "Placing trees in lexicographic order, "
Machine Intelligence 3, American Elsevier
Publishing Co., New York, 43 -60.
Shirakawa, 1.
(1971A) See Ariyoshi, Shirakawa, and Hiroshi.
Silverman, H. F.
(1971A) See Gros sman and Silverman.
Slupecki, J.
(1951A) "On the system S of tournaments," Colloq.
Math., Vol. 2, 286-290.
BIBLIOGRAPHY 207
Smith, C. A. B.
(1947 A) "The counterfeit coin problem," Math. Gaz.,
Vol. 31, 31-39.
Sobel, M.
(1968A) "On an optimal search for the t best using
only binary errorless comparisons: the
ordering problem," Technical Report No. 113,
Department of Statistics, University of Minne-
sota, Minneapolis, Minnesota.
Spira, P. M.
(196 8A) "On the computation time of finite functions, "
IEEE Conference Record of the Ninth Annual
Symposium on Switching and Automata Theory,
69-75.
Spira (cont'd)
(1971A) "Complete linear proofs of systems of linear
inequalities," IEEE Conference Record of the
Twelfth Annual Symposium on Switching and
Automata Theory, 202-206.
Steinhaus, H.
(1958A) "Some remarks about tournaments," Cal-
cutta Mathematical Society, Golden Jubilee
Commemoration Volume, Part II, 323 -327.
Stockmeyer, L.
(1971A) See Paterson and Stockmeyer.
Stone, H. S.
(1971A) "Parallel processing with the perfect shuffle, "
IEEE Transactions on Computers, Vol. C -20,
153 -161.
Strassen, V.
(1969A) "Gaus sian elimination is not optimal, "
Numer. Math., Vol. 13, 354-356.
Tarjan, R.
(1971A) See Hopcroft and Tarjan.
Todd, J.
(1955A) "Motivation for working in numerical analysis, "
Comm. Pure Appl. Math., Vol. 8, 97 -116.
Toom, A. L.
(1963A) "The complexity of a scheme of functional
elements realizing the multiplication of inte-
gers," Dokl. Akad. Nauk SSSR, Vol. 150,
496-498 (Russian). English translation in
Soviet Math. Dokl., Vol. 4, 714-716.
Traub, J. F.
(1964A) Iterative Methods for the Solution of Eguations,
Prentice-Hall, Englewood Cliffs, New Jersey.
Tutte, W. T.
(1966A) Connectivity in Graphs, Oxford University
Press, London.
Ullman, J. D.
(1969A) See Hopcroft and Ullman.
Val'skii, R. E.
(1959A) "The smallest number of multiplications
necessary to raise a number to a given power,"
Problemy Kibernet, Vol. 2, 73 -74 (Rus sian).
English translation in Problems of Cybernetic s,
Vol. 2, 395-397.
Van Voorhis, D. C.
(1971A) "A generalization of the divide-sort-merge
strategy for sorting networks," Technical
Report No. 16, Digital Systems Laboratory,
Stanford University, Stanford, California.
Varaiya, P.
(1970A) See Cohen and Varaiya.
Varga, R, S.
(1962A) Matrix Iterative Analysis, Prentice-Hall, Inc.,
Englewood Cliffs, New Jersey.
Vari, T. M.
(1972A) "On the number of multiplications required
to compute quadratic functions," TR 72-120,
Department of Computer Science, Cornell
BIBLIOGRAPHY 211
Vari (cont'd)
University, Ithaca, New York
Vashakmadze, T. S.
(1969A) "On some optimal algorithms," Th~i~~
Sahemc. Univ. Gamoqeneb. Math. Inst. Srom.,
Vol. T~'--7--=i6-(Russian with Georgian summary).
Wakoff, G.
(1972A) See Fix, Gulati, and Wakoff.
Waksman, A.
(1970A) "On Winograd I s algorithm for inner products, "
IEEE Trans. Computers, Vol. 19, 360-361.
Weinberg, L.
(1965A) "Plane representations and codes for planar
graphs," Proceedings of the Third Annual
Allerton Conference on Circuit and System
Theory, 733 -744.
Wells, M. B.
(1965A) "Applications of a language for computing in
combinatorics," Information Processing
1965, Proceedings of IFIP Congres s 65,
497 -498.
Winograd, S.
(1965A) "On the time required to perform addition, "
J. Assoc. Comput. Mach., Vol. 12, 277-285.
Winograd (cont'd)
(1969A) "The number of arithmetic operations required
for certain computations," Proceedings of the
Third Annual Princeton Conference on Infor-
mation Sciences and Systems, 146-147.
Wolfe, P.
(1959A) "The secant method for simultaneous nonlinear
equations," Comm. ACM, Vol. 2, 12-13.
Wong, E.
(1964A) "A linear search problem," SIAM Review,
Vol. 6, 168-174.
Wright, E. M.
(1938A) See Hardy and Wright.
Zalesskii, A. E.
(1965A) "Reduction of certain combinatorial problems
to integer linear programming," Vesci Akad.
Navuk BSSR Ser. Fiz. -Ma_~~_~~"yuk, No.3,
24-28 (Russian).
SUBJECT INDEX
Adjacency 134
Algorithms 169, 183
Adaptive - 175
by tests 15
Deterministic - 87
Efficiency of - 41, 153
Equivalence problem - 155
Equivalence - 153
Error Analysis of - 178
for distributing records in a sequential file 111
for evaluating continued fractions 1
for evaluating quadratic forms 1
for evaluating rational functions 1
for finding canonical ordered trees 140
for finding roots of polynomials 41
for linear pattern matching 176
for permuting information in storage 105
for solving partial differential equations 73
for solving systems of linear equations 11, 15
for solving systems of nonlinear equations 61
Graph isomorphism - 131
Graph triconnectivity - 135
Iteration - 44
Labeled tree isomorphism - 140
213
214 SUBJECT INDEX
Language recognition - 87
Linear tree isomorphism - 131
Nondeterministic language recognition - 91
Nondeterministic - 90
Planar graph isomorphism - 131, 151
Running time of - 87
Series -parallel graph isomorphism - 132
Size of - 179
Storage for - 179
Straight line - for matrix multiplication 33
Tree isomorphism - 132, 140
Triply-connected planar graph isomorphism - 132, 143
Allocation 112
Articulation point 133
Assignment problems 115
Backtrack search 86
Band-Cholesky decomposition procedure 74
Biarticulation point pair 133
Bilinear chains 33
Bucket sort 141
Computation
Models for - 177, 181
scheme 22
Continued fractions 1
Convergence
Degree of - 174
Rate of - 42
Cook's theorem 90
Crucial operation 22
Efficiency
of algorithms 41, 61, 153
of equivalence algorithms 153
of iteration algorithms 45
with parallelism 53
Elliptic partial differential equations 73
Equations
Elliptic partial differential - 73
Solving linear - by means of tests 16
Systems of linear - 11
Systems of nonlinear - 61
Equivalence
of nondeterministic finite automata 101
of regular expres sions 101
program 155
Error analysis 178
Essential sets 14
Exact cover problem 95
Gaussian elimination 13
Graph 85, 132
Adjacency lists of a - 134
Adjacency structure of a - 134
Articulation point of a - 133
Biarticulation point pair of a - 133
Biconnected components of a - 133
Biconnected - 133
Chromatic number of a - 85, 95
Cycle in a - 132
Depth first search of a - 134
Hamiltonian circuit of a - 85, 94
isomorphism 101, 131
Path in a - 90, 132
Planar - 131
Search of a - 134
Series -parallel - 132
Spanning tree of a - 89, 132
Triconnected components of a - 135
Triply-connected - 132, 143
Hally's method 46
Hamiltonian circuit problem 94
Hermit polynomials 75
Horner's rule 2, 23, 53
Interpolation methods 63
Isomorphism
of graphs 101, 131
of labeled trees 140
of linear trees 131
of planar grap!1s 131, 151
of series -parallel graphs 132
of trees 140
of triply-connected planar graphs 132, 143
Iteration algorithms 44
Cost of - 44
SUBJECT INDEX 217
Efficiency of - 45
Local - 56
Operations of - 44
Parameters of - 44
with parallelism 56
Iteration scheme 56
Iterative procedures 41, 53, 54, 61
for approximating algebraic numbers 42
for finding roots of polynomials 41
for finding roots of quadratics 46
for high degree polynomials 49
for solving differential equations 74
for solving systems of equations 61
Order of - 42, 62
Parallel - 53, 55
Rate of convergence of - 42
with memory 45
Knapsack problem 95
Languages
Complete - 86
Context-sensitive - -recognition 101
Nondeterministic recognition of - 91
Recognition of - 86
recognized of deterministic algorithms 87
Reducibility of - 88
Liouville's theorem 47
Lower bounds 169
Equivalence problem - 156
for evaluating rational functions 2
for matrix multiplication 31, 38
for number of comparators 119
for permuting information in storage 105
for polynomial evaluation 21
218 SUBJECT INDEX
Matrix
Boolean - transposition 109
decomposition 40
multiplication 10, 31, 173, 175
Orthogonal - multiplication 10
transposition 107
-vector multiplication 32
N -bond 133
N -gon 133
N -sorter 119
Name
What's in a - 175, 177, 179, 185
Newton's method 46
Node cover problem 94
Nondeterministic algorithms 90
NP 91
o
Optimization problems 12
Ostrowski's index 41
P 88
P = NP 85, 92, 172, 177, 178, 181, 182, 184
Pages 105
Pan's method 1
Parallelism 53, 172
Partial differential equations 171
Elliptic - 73
Partition problem 97
Path 132
Polynomials
as bounds for computations 85
Crucial step in evaluation of - 22
Evaluation of - 53, 172
SUBJECT INDEX 219
Quadratic forms 1
Quaternions
Multiplication of - 40
SUBJECT INDEX 221
Test 11
Traveling salesman problem 112
222 SUBJECT INDEX
Trees 132
Binary - 120
Canonical ordered - 140
Isomorphism of - 131, 140
Labeled - 140
Linear - 131
Palm - 134
Rooted - 132
Spanning - of a graph 89, 132
A D
C Feldstein, A. 41
Fiduccia, C. 31, 39, 169, 177
Cohen, A. 41, 42 Firestone, R. 41
Conte, S. 68 Fischer, M. 153, 175, 177
Cook, S. 86, 89, 90, 92, Fix, G. 75, 80
93, 100, 112, 172 Floyd R. 105, 127, 169, 171,
173, 176, 178, 182
223
224 NAME INDEX
G M
H o
Hall, M. 90 O'Neil, P. 167
Harary, F. 132 Ostrowski, A. 21, 41, 45, 62,
Hardy, G. 47, 67, 112, 113 66
Harper, L. 112
Hiroshi, O. 135 P
Hopcroft, J. 31, 88, 101, 131,
132, 135, 145, 152, 154, 155, Pan, V. 1, 2, 3, 5, 21
164, 167, 169, 176, 178, 180, Paterson, M. 41, 49, 50, 52,
181, 184 53, 169, 172, 184, 185
Po1ya, G. 112, 113
K Pratt, V. 111, 176
T Wakoff, G. 75
Weinburg, L. 131, 140
Tarjan, R. 86, 101, 131, 132, Willoughby, R. 178
135, 136, 150, 152, 178, Winograd, S. 21, 30, 31, 39,
181 41, 53, 54, 55, 58, 64, 65,
Traub, J. 41, 45, 49, 54, 66, 169, 170, 179, 182
55, 66 Wolfe, P. 11, 12, 41, 54, 55,
Tutte, W. 133, 135 58, 64, 65, 66
Wright, E. 47, 67
U
Z
Ullman, J. 88, 101, 154, 155,
164 Za1esskii, A. 112