Fault-Tolerant Search Algorithms Reliable Computation with Unreliable Information
This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning.
Saved in:
Main Author | |
---|---|
Format | eBook Book |
Language | English |
Published |
Berlin, Heidelberg
Springer Nature
2013
Springer Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Edition | 1 |
Series | Monographs in Theoretical Computer Science. An EATCS Series |
Subjects | |
Online Access | Get full text |
ISBN | 9783642173271 3642173276 3642173268 9783642173264 |
ISSN | 1431-2654 |
DOI | 10.1007/978-3-642-17327-1 |
Cover
Abstract | This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning. |
---|---|
AbstractList | This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning. Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent complexity, information systems are naturally prone to errors, which may appear at any level - as imprecisions in the data, bugs in the software, or transient or permanent hardware failures. This book provides a concise, rigorous and up-to-date account of different approaches to fault-tolerance in the context of algorithmic search theory. Thanks to their basic structure, search problems offer insights into how fault-tolerant techniques may be applied in various scenarios. In the first part of the book, a paradigmatic model for fault-tolerant search is presented, the Ulam-Renyi problem. Following a didactic approach, the author takes the reader on a tour of Ulam-Renyi problem variants of increasing complexity. In the context of this basic model, fundamental combinatorial and algorithmic issues in the design of fault-tolerant search procedures are discussed. The algorithmic efficiency achievable is analyzed with respect to the statistical nature of the error sources, and the amount of information on which the search algorithm bases its decisions. In the second part of the book, more general models of faults and fault-tolerance are considered. Special attention is given to the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning. This book will be of special value to researchers from the areas of combinatorial search and fault-tolerant computation, but also to researchers in learning and coding theory, databases, and artificial intelligence. Only basic training in discrete mathematics is assumed. Parts of the book can be used as the basis for specialized graduate courses on combinatorial search, or as supporting material for a graduate or undergraduate course on error-correcting codes. |
Author | Cicalese, Ferdinando |
Author_xml | – sequence: 1 fullname: Cicalese, Ferdinando |
BackLink | https://cir.nii.ac.jp/crid/1130000794450023680$$DView record in CiNii |
BookMark | eNpd0E1PAjEQBuAa0YjID_BGjInxUJnZfm2PSEBNSDxIvDZl6cLKssXton_fwnrRS5u-eWYmnUvSqXzlCLlGeEAANdQqpYxKnlBULFEUT0g_ZiwmxwBP_707pIucIU2k4Oekm0qutVaKXZB-CB8AgCBlirpLBlO7Lxs696WrbdUM3pyts_VgVK58XTTrbbgiZ7ktg-v_3j3yPp3Mx8909vr0Mh7NqGUKMaHcCicgZ0pizoExrYElQok0V0xZtAtpHbcLrZeQCZemS-AiF44vFV8mIhOsR-7bxjZs3HdY-7IJ5qt0C-83wfz5XrTD1oZdXVQrV5tWIZjDwg7aMBO9ORaYQ8VdW7Gr_efehcYcG2euampbmsnjGIVOhJZR3rayKgqTFYcTkcWdgdKcC4CEyRQiu2lZZoMtIzNbX_lVbXfrYATXIk5nPw8reZE |
ContentType | eBook Book |
Copyright | Springer-Verlag Berlin Heidelberg 2013 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2013 |
DBID | I4C RYH |
DEWEY | 004 |
DOI | 10.1007/978-3-642-17327-1 |
DatabaseName | Casalini Torrossa eBooks Institutional Catalogue CiNii Complete |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics Computer Science |
EISBN | 9783642173271 3642173276 |
Edition | 1 2013 |
ExternalDocumentID | 9783642173271 160554 EBC1592596 BB14398096 5495642 |
GroupedDBID | -JY -K2 0D6 0DA 20A 38. AABBV AARVG AAUBL AAWHR ABFTD ABMLC ABMNI ACBPT AEJLV AEKFX AETDV AEZAY AFJMS ALMA_UNASSIGNED_HOLDINGS ARZOH AZZ BBABE CZZ EFU I4C IEZ MA. MYL SBO TPJZQ UZ6 Z7R Z7U Z7X Z7Z Z81 Z83 Z84 Z85 Z88 RYH SAO Z5O Z7W Z7Y Z87 |
ID | FETCH-LOGICAL-a37112-4a5e50f3761f4033990325758f737a1ab6ae4ab99d0c5e88d045f5e4d74d25c53 |
ISBN | 9783642173271 3642173276 3642173268 9783642173264 |
ISSN | 1431-2654 |
IngestDate | Fri Nov 08 03:13:59 EST 2024 Fri May 23 03:22:38 EDT 2025 Mon Apr 21 07:48:08 EDT 2025 Thu Jun 26 21:54:19 EDT 2025 Sun May 11 05:59:07 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCallNum_Ident | Q |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-a37112-4a5e50f3761f4033990325758f737a1ab6ae4ab99d0c5e88d045f5e4d74d25c53 |
Notes | Bibliography: p. 199-207 |
OCLC | 864999773 |
PQID | EBC1592596 |
PageCount | 218 |
ParticipantIDs | askewsholts_vlebooks_9783642173271 springer_books_10_1007_978_3_642_17327_1 proquest_ebookcentral_EBC1592596 nii_cinii_1130000794450023680 casalini_monographs_5495642 |
PublicationCentury | 2000 |
PublicationDate | 2013 c2013 2013-11-29 |
PublicationDateYYYYMMDD | 2013-01-01 2013-11-29 |
PublicationDate_xml | – year: 2013 text: 2013 |
PublicationDecade | 2010 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Netherlands – name: Heidelberg – name: Berlin, Heidelberg |
PublicationSeriesTitle | Monographs in Theoretical Computer Science. An EATCS Series |
PublicationSeriesTitleAlternate | Monographs Theoret.Computer Science(formerly:EATCS) |
PublicationYear | 2013 |
Publisher | Springer Nature Springer Springer Berlin / Heidelberg Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Nature – name: Springer – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
RelatedPersons | Rozenberg, Grzegorz Henzinger, Monika Salomaa, Arto Nielsen, Mogens Hromkovič, Juraj |
RelatedPersons_xml | – sequence: 1 givenname: Monika surname: Henzinger fullname: Henzinger, Monika – sequence: 2 givenname: Juraj surname: Hromkovič fullname: Hromkovič, Juraj – sequence: 3 givenname: Mogens surname: Nielsen fullname: Nielsen, Mogens – sequence: 4 givenname: Grzegorz surname: Rozenberg fullname: Rozenberg, Grzegorz – sequence: 5 givenname: Arto surname: Salomaa fullname: Salomaa, Arto |
SSID | ssj0001066819 ssib002801809 |
Score | 2.0685968 |
Snippet | This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to... Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial... |
SourceID | askewsholts springer proquest nii casalini |
SourceType | Aggregation Database Publisher |
SubjectTerms | Algorithms Computer algorithms Computer Science Data processing Computer science Fault-tolerant computing Querying (Computer science) Theory of Computation |
Subtitle | Reliable Computation with Unreliable Information |
TableOfContents | Intro -- Preface -- Acknowledgments -- Contents -- Chapter 1 Prologue: What This Book Is About -- 1.1 Part I: The Basic Model -- 1.1.1 Adaptive vs. Non-adaptive Search -- 1.1.2 Q-ary Search with Lies -- 1.1.3 Half-Lies, Erasures and Other Types of Errors -- 1.1.4 Heuristics -- 1.2 Part II: More Models and Applications -- 1.2.1 Erasure Errors, Delays and Time-outs -- 1.2.2 Group Testing -- 1.2.3 Memory Faults and Resilient Search -- 1.2.4 A Model of Learning -- 1.3 Bibliographic Notes -- Part I The Ulam-Rényi Game and Its Variants -- Chapter 2 Fault-Tolerant Search à la Ulam-Rényi -- 2.1 Introduction -- 2.1.1 The Binary Ulam-Rényi Game -- 2.2 The Volume Bound -- 2.3 Borderline States Satisfying the Volume Bound with Equality -- 2.4 The Solution of the 20 Question Game with Lies -- 2.5 Asymptotics for the Ulam-Rényi Problem -- 2.6 Heuristics for the Ulam-Rényi Problem -- Algorithm 1 -- Algorithm 2 -- 2.6.1 Experimental Validation of the Heuristics -- 2.7 Bibliographic Notes -- 2.8 Exercises -- Chapter 3 Adaptive vs. Non-adaptive Search -- 3.1 Coding in a Channel with Noiseless Feedback -- 3.2 No Feedback Equals Error-Correcting Codes -- 3.3 Elements of the Theory of Error-Correcting Codes -- 3.3.1 Linear and Hamming Codes -- 3.3.2 MDS Codes and the Reed-Solomon Codes -- 3.3.3 Bounds on Codes -- 3.4 Fault-Tolerant q-ary Search and Minimum Feedback -- 3.4.1 Fault-Tolerant q-ary search -- 3.4.2 Perfect Strategies and Least Adaptiveness: M=qm -- The Non-adaptive Second Batch of Questions -- Shrinking the First Batch of Questions -- 3.4.3 Arbitrary Cardinality of the Search Space: Least Adaptive Quasi-perfect Strategies -- More About Perfect Minimally Adaptive Strategies -- Quasi-perfect Strategies: The Main Theorem -- 3.5 Some Finite Exact Results for the q-ary Adaptive Ulam-Rényi game -- An Infinite Sequence of Winning States for q-ary Search Bounds for Two-Stage Algorithms with One Positive -- More Positives -- More Errors -- 7.3 Some Typical Applications of Group Testing in Computational Biology -- 7.4 Bibliographic Notes -- 7.5 Exercises -- Chapter 8 Resilient Search -- 8.1 The Definition of the Problem and a Lower Bound -- 8.2 Randomized Resilient Search -- 8.3 Optimal Deterministic Resilient Search -- 8.3.1 The Verification Procedure -- 8.4 Bibliographic Notes -- 8.5 Exercises -- Chapter 9 A Model for Learning -- 9.1 Computational Learning -- 9.2 Predicting from Expert Advice -- 9.3 Learning in Noisy Environments -- 9.3.1 Rényi's Probabilistic Example -- 9.3.2 Learning with Negative Reinforcement -- 9.3.3 Supervised Learning for Online Prediction -- 9.4 Bibliographic Notes -- 9.5 Exercises -- Bibliography Coping with Many Lies When M=qm -- 3.6 Bibliographic Notes -- 3.7 Exercises -- Chapter 4 Weighted Errors over a General Channel -- 4.1 Introduction -- 4.2 Two-Batch Search with Weighted Lies -- 4.3 The Lower Bound: The Winning Strategy -- 4.3.1 The First Batch of Questions -- 4.3.2 The Second Batch of Questions -- 4.4 The Upper Bound -- 4.5 Other Noise Models: Unidirectional Errors -- 4.6 Bibliographic Notes -- 4.7 Exercises -- Chapter 5 Variations on a Theme of Ulam and Rényi: More Types of Questions and Lies -- 5.1 Comparison-Based Search: The Multiple-Interval Queries -- 5.2 Query Optimal Multi-interval Search with k = O(e2) -- 5.2.1 The Case of Two Lies: A Canonical Representation of States and 2-Interval Queries -- 5.2.2 About Comparison Questions -- 5.3 Linearly Bounded Number of Lies -- 5.4 Prefix-Bounded Numbers of Lies -- 5.5 Bibliographic Notes -- 5.6 Exercises -- Part II Other Models -- Chapter 6 Delays and Time Outs -- 6.1 Search with Fixed Batches of Questions and Variable Delay in Answers -- 6.2 Search with Variable Batches and Delays -- 6.3 Lost Answers and Delays -- 6.3.1 Extensions and Generalizations -- 6.3.2 The Proof of Proposition 6.1 -- 6.3.3 Broadcast with Latency vs. Search with Delay -- Broadcast in the Postal Model -- Broadcast and Comparison Search Are Isomorphic Problems -- 6.4 Bibliographic Notes -- 6.5 Exercises -- Chapter 7 Group Testing -- 7.1 Group Testing with Subset Tests -- 7.1.1 The (p,v,n)-super-selector -- 7.1.2 Approximate Group Testing -- 7.1.3 Bounds on the Size of a (p, v, n)-super-selector -- 7.2 Interval Group Testing -- Sets of Queries and YES-Sets -- 7.2.1 Non-adaptive Fault-Tolerant Interval Group Testing -- 7.2.2 Two-Stage Fault-Tolerant Interval Group Testing -- An Averaging Argument for Lower Bound on Two-Stage Interval Group Testing -- The Averaging Argument in Use -- Yes-sets and Errors |
Title | Fault-Tolerant Search Algorithms |
URI | http://digital.casalini.it/9783642173271 https://cir.nii.ac.jp/crid/1130000794450023680 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=1592596 http://link.springer.com/10.1007/978-3-642-17327-1 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642173271&uid=none |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB7R5cJegAJiKUUW4oCEgpK1Hcfc2NVWVUW5UKreLDtxYEXISk22h_56xs67qoTgYu0mkcfy58c3Y88MwLtI20gLJoOMMR0wnTOcUvEySCPjdqPM0KXzHT7_Gp9-Z2dX_GpIWuq9S2rzMb2916_kf1DFZ4ir85L9B2T7SvEB_kZ8sUSEsbxDfvu_bc4hvS_qoN4VFrea-kNrutDFjx3q-j9_V17Rv7bF1jtGpT5zQ4O0t7vuy_5dGzh1fBy_drjZJuHiicUB5AzNu7F5wKVqmJgHOvPgRG2kzrtVIHFj9y6i43sT-GXgPhVBNOwY_T2-1QrplkxQDTqAAyHCGTz8vDn7cjlYuZDRIOdwTjWdzKQJezS0oTtrbsP9TmTOYa6rX7jc41ZQV4476Eo7l1GkAuV2O1EL7pxke4Jw8QRmzmnkKTyw5SE87lJlkHblPIT5eR8et3oG36b4kQY_MuBHPpEOITJCjzj0yIAeGaH3HC5PNhfr06DNbhFoKpDl4sTgloc5rvBRzkKKTDGkuIDyJBdU6EibWFumjZRZmHKbJBmy75xblgmWLXnK6QuYlbvSvgQiZZ4z6qKnWcM401JYnkuaxMwYI_PlAt6OulHdFP4kvlIjHES0gKOudxVOlCZieqW4U6EZVnGMHa7SrSsjdwiKgEnGuM9BkIQLIB0UytfeXi5Wm9UaKTNq2fEC3ncQqUZ-FzMb26GoQinKN0VFr_4i7QgeDYP9Nczq6709RnZYmzftEPwDhedZhw |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Fault-tolerant+search+algorithms+%3A+reliable+computation+with+unreliable+information&rft.au=Cicalese%2C+Ferdinando&rft.date=2013-01-01&rft.pub=Springer&rft.isbn=9783642173264&rft_id=info:doi/10.1007%2F978-3-642-17327-1&rft.externalDocID=BB14398096 |
thumbnail_m | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97836421%2F9783642173271.jpg |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-642-17327-1 |