scholarly journals Efficiently Estimating Erdos-Renyi Graphs with Node Differential Privacy

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Adam Sealfon ◽  
Jonathan Ullman

We give a simple, computationally efficient, and node-differentially-private algorithm for estimating the parameter of an Erdos-Renyi graph---that is, estimating p in a G(n,p)---with near-optimal accuracy. Our algorithm nearly matches the information-theoretically optimal exponential-time algorithm for the same problem due to Borgs et al. (FOCS 2018). More generally, we give an optimal, computationally efficient, private algorithm for estimating the edge-density of any graph whose degree distribution is concentrated in a small interval.

Algorithmica ◽  
2011 ◽  
Vol 63 (1-2) ◽  
pp. 323-346 ◽  
Author(s):  
Daniel Binkele-Raible ◽  
Henning Fernau

2005 ◽  
Vol 52 (3) ◽  
pp. 337-364 ◽  
Author(s):  
Ramamohan Paturi ◽  
Pavel Pudlák ◽  
Michael E. Saks ◽  
Francis Zane

2020 ◽  
Vol 30 (04) ◽  
pp. 693-710
Author(s):  
William DeMeo ◽  
Peter Mayr ◽  
Nik Ruškuc

We investigate when fiber products of lattices are finitely generated and obtain a new characterization of bounded lattice homomorphisms onto lattices satisfying a property we call Dean’s condition (D) which arises from Dean’s solution to the word problem for finitely presented lattices. In particular, all finitely presented lattices and those satisfying Whitman’s condition satisfy (D). For lattice epimorphisms [Formula: see text], [Formula: see text], where [Formula: see text], [Formula: see text] are finitely generated and [Formula: see text] satisfies (D), we show the following: If [Formula: see text] and [Formula: see text] are bounded, then their fiber product (pullback) [Formula: see text] is finitely generated. While the converse is not true in general, it does hold when [Formula: see text] and [Formula: see text] are free. As a consequence, we obtain an (exponential time) algorithm to decide boundedness for finitely presented lattices and their finitely generated sublattices satisfying (D). This generalizes an unpublished result of Freese and Nation.


Author(s):  
Stefano Coniglio ◽  
Nicola Gatti ◽  
Alberto Marchesi

The problem of computing the strategy to commit to has been widely investigated in the scientific literature for the case where a single-follower is present. In the multi-follower setting though, results are only sporadic. In this paper, we address the multi-follower case for normal-form games, assuming that, after observing the leader’s commitment, the followers play pure strategies and reach a Nash equilibrium. We focus on the pessimistic case where, among many equilibria, one minimizing the leader’s utility is chosen (the opposite case is computationally trivial). We show that the problem is NP-hard even with only two followers, and propose an exact exponential-time algorithm which, for any number of followers, either finds an equilibrium when the game admits a finite one or, if not, an α-approximation of the supremum of the leader’ utility, for any α > 0.


2021 ◽  
Vol 46 (3) ◽  
pp. 1-39
Author(s):  
Mahmoud Abo Khamis ◽  
Phokion G. Kolaitis ◽  
Hung Q. Ngo ◽  
Dan Suciu

The query containment problem is a fundamental algorithmic problem in data management. While this problem is well understood under set semantics, it is by far less understood under bag semantics. In particular, it is a long-standing open question whether or not the conjunctive query containment problem under bag semantics is decidable. We unveil tight connections between information theory and the conjunctive query containment under bag semantics. These connections are established using information inequalities, which are considered to be the laws of information theory. Our first main result asserts that deciding the validity of a generalization of information inequalities is many-one equivalent to the restricted case of conjunctive query containment in which the containing query is acyclic; thus, either both these problems are decidable or both are undecidable. Our second main result identifies a new decidable case of the conjunctive query containment problem under bag semantics. Specifically, we give an exponential-time algorithm for conjunctive query containment under bag semantics, provided the containing query is chordal and admits a simple junction tree.


Sign in / Sign up

Export Citation Format

Share Document