Skip to main content

Showing 1–12 of 12 results for author: Haeupler, B

Searching in archive math. Search in all archives.
.
  1. arXiv:2504.03605  [pdf, other

    cs.DM cs.CC cs.DS cs.IT math.CO

    Constant Rate Isometric Embeddings of Hamming Metric into Edit Metric

    Authors: Sudatta Bhattacharya, Sanjana Dey, Elazar Goldenberg, Mursalin Habib, Bernhard Haeupler, Karthik C. S., Michal Koucký

    Abstract: A function $\varphi: \{0,1\}^n \to \{0,1\}^N$ is called an isometric embedding of the $n$-dimensional Hamming metric space to the $N$-dimensional edit metric space if, for all $x, y \in \{0,1\}^n$, the Hamming distance between $x$ and $y$ is equal to the edit distance between $\varphi(x)$ and $\varphi(y)$. The rate of such an embedding is defined as the ratio $n/N$. It is well known in the literat… ▽ More

    Submitted 4 April, 2025; originally announced April 2025.

  2. arXiv:2502.15320  [pdf, ps, other

    cs.DS cs.DC math.OC

    Adversarially-Robust Gossip Algorithms for Approximate Quantile and Mean Computations

    Authors: Bernhard Haeupler, Marc Kaufmann, Raghu Raman Ravi, Ulysse Schaller

    Abstract: This paper presents gossip algorithms for aggregation tasks that demonstrate both robustness to adversarial corruptions of any order of magnitude and optimality across a substantial range of these corruption levels. Gossip algorithms distribute information in a scalable and efficient way by having random pairs of nodes exchange small messages. Value aggregation problems are of particular interest… ▽ More

    Submitted 30 April, 2025; v1 submitted 21 February, 2025; originally announced February 2025.

    Comments: 36 pages

  3. arXiv:2211.11726  [pdf, ps, other

    cs.DS cs.DC math.CO

    A Cut-Matching Game for Constant-Hop Expanders

    Authors: Bernhard Haeupler, Jonas Huebotter, Mohsen Ghaffari

    Abstract: This paper extends and generalizes the well-known cut-matching game framework and provides a novel cut-strategy that produces constant-hop expanders. Constant-hop expanders are a significant strengthening of regular expanders with the additional guarantee that any demand can be (obliviously) routed along constant-hop flow-paths - in contrast to the $Ω(\log n)$-hop paths in expanders. Cut-match… ▽ More

    Submitted 28 October, 2024; v1 submitted 21 November, 2022; originally announced November 2022.

  4. arXiv:2009.13307  [pdf, other

    cs.IT cs.DM math.CO

    Rate-Distance Trade-offs for List-Decodable Insertion-Deletion Codes

    Authors: Bernhard Haeupler, Amirbehshad Shahrasbi

    Abstract: This paper presents general bounds on the highest achievable rate for list-decodable insertion-deletion codes. In particular, we give novel outer and inner bounds for the highest achievable communication rate of any insertion-deletion code that can be list-decoded from any $γ$ fraction of insertions and any $δ$ fraction of deletions. Our bounds simultaneously generalize the known bounds for the pr… ▽ More

    Submitted 9 August, 2022; v1 submitted 28 September, 2020; originally announced September 2020.

  5. arXiv:2008.03091  [pdf, ps, other

    cs.DS cs.DC math.CO

    Low-Congestion Shortcuts for Graphs Excluding Dense Minors

    Authors: Mohsen Ghaffari, Bernhard Haeupler

    Abstract: We prove that any $n$-node graph $G$ with diameter $D$ admits shortcuts with congestion $O(δD \log n)$ and dilation $O(δD)$, where $δ$ is the maximum edge-density of any minor of $G$. Our proof is simple, elementary, and constructive - featuring a $\tildeΘ(δD)$-round distributed construction algorithm. Our results are tight up to $\tilde{O}(1)$ factors and generalize, simplify, unify, and strength… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

  6. arXiv:2007.09075  [pdf, ps, other

    cs.IT cs.DM cs.DS math.CO

    Efficient Linear and Affine Codes for Correcting Insertions/Deletions

    Authors: Kuan Cheng, Venkatesan Guruswami, Bernhard Haeupler, Xin Li

    Abstract: This paper studies \emph{linear} and \emph{affine} error-correcting codes for correcting synchronization errors such as insertions and deletions. We call such codes linear/affine insdel codes. Linear codes that can correct even a single deletion are limited to have information rate at most $1/2$ (achieved by the trivial 2-fold repetition code). Previously, it was (erroneously) reported that more… ▽ More

    Submitted 20 July, 2022; v1 submitted 17 July, 2020; originally announced July 2020.

  7. arXiv:1809.06727  [pdf, ps, other

    cs.DS cs.DM cs.MA math.CO

    Optimal strategies for patrolling fences

    Authors: Bernhard Haeupler, Fabian Kuhn, Anders Martinsson, Kalina Petrova, Pascal Pfister

    Abstract: A classical multi-agent fence patrolling problem asks: What is the maximum length $L$ of a line that $k$ agents with maximum speeds $v_1,\ldots,v_k$ can patrol if each point on the line needs to be visited at least once every unit of time. It is easy to see that $L = α\sum_{i=1}^k v_i$ for some efficiency $α\in [\frac{1}{2},1)$. After a series of works giving better and better efficiencies, it was… ▽ More

    Submitted 12 June, 2019; v1 submitted 18 September, 2018; originally announced September 2018.

    Comments: 19 pages, 3 figures. Part of our main result (circle strategy) is new to this version of the paper. A shorter version of this is to appear in the proceedings of ICALP 2019

  8. arXiv:1509.06430  [pdf, ps, other

    cs.DM cs.DS math.CO

    Parallel algorithms and concentration bounds for the Lovasz Local Lemma via witness DAGs

    Authors: Bernhard Haeupler, David G. Harris

    Abstract: The Lovász Local Lemma (LLL) is a cornerstone principle in the probabilistic method of combinatorics, and a seminal algorithm of Moser & Tardos (2010) provides an efficient randomized algorithm to implement it. This can be parallelized to give an algorithm that uses polynomially many processors and runs in $O(\log^3 n)$ time on an EREW PRAM, stemming from $O(\log n)$ adaptive computations of a max… ▽ More

    Submitted 28 September, 2017; v1 submitted 21 September, 2015; originally announced September 2015.

    Journal ref: ACM Transactions on Algorithms 13(4), Article #53 (2017)

  9. arXiv:1210.1193  [pdf, other

    cs.DS cs.DC math.CO

    Simple, Fast and Deterministic Gossip and Rumor Spreading

    Authors: Bernhard Haeupler

    Abstract: We study gossip algorithms for the rumor spreading problem which asks each node to deliver a rumor to all nodes in an unknown network. Gossip algorithms allow nodes only to call one neighbor per round and have recently attracted attention as message efficient, simple and robust solutions to the rumor spreading problem. Recently, non-uniform random gossip schemes were devised to allow efficient r… ▽ More

    Submitted 4 April, 2014; v1 submitted 3 October, 2012; originally announced October 2012.

  10. arXiv:1206.0154  [pdf, ps, other

    cs.DS cs.DC math.CO

    Bounds on Contention Management in Radio Networks

    Authors: Mohsen Ghaffari, Bernhard Haeupler, Nancy Lynch, Calvin Newport

    Abstract: The local broadcast problem assumes that processes in a wireless network are provided messages, one by one, that must be delivered to their neighbors. In this paper, we prove tight bounds for this problem in two well-studied wireless network models: the classical model, in which links are reliable and collisions consistent, and the more recent dual graph model, which introduces unreliable edges. O… ▽ More

    Submitted 3 October, 2012; v1 submitted 1 June, 2012; originally announced June 2012.

  11. arXiv:1205.7014  [pdf, ps, other

    cs.DS cs.DC math.CO

    Broadcast Throughput in Radio Networks: Routing vs. Network Coding

    Authors: Noga Alon, Mohsen Ghaffari, Bernhard Haeupler, Majid Khabbazian

    Abstract: The broadcast throughput in a network is defined as the average number of messages that can be transmitted per unit time from a given source to all other nodes when time goes to infinity. Classical broadcast algorithms treat messages as atomic tokens and route them from the source to the receivers by making intermediate nodes store and forward messages. The more recent network coding approach, i… ▽ More

    Submitted 28 August, 2014; v1 submitted 31 May, 2012; originally announced May 2012.

  12. arXiv:1005.3749  [pdf, ps, other

    math.CO

    Lower Bounds on the van der Waerden Numbers: Randomized- and Deterministic-Constructive

    Authors: William Gasarch, Bernhard Haeupler

    Abstract: The van der Waerden number W(k,2) is the smallest integer n such that every 2-coloring of 1 to n has a monochromatic arithmetic progression of length k. The existence of such an n for any k is due to van der Waerden but known upper bounds on W(k,2) are enormous. Much effort was put into developing lower bounds on W(k,2). Most of these lower bound proofs employ the probabilistic method often in com… ▽ More

    Submitted 7 April, 2011; v1 submitted 20 May, 2010; originally announced May 2010.

    MSC Class: 05D10

    Journal ref: Electronic Journal of Combinatorics, vol. 18, nr. P64, 2011