Fault-Tolerant Search Algorithms Reliable Computation with Unreliable Information

This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning.

Saved in:
Bibliographic Details
Main Author Cicalese, Ferdinando
Format eBook Book
LanguageEnglish
Published Berlin, Heidelberg Springer Nature 2013
Springer
Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Edition1
SeriesMonographs in Theoretical Computer Science. An EATCS Series
Subjects
Online AccessGet full text
ISBN9783642173271
3642173276
3642173268
9783642173264
ISSN1431-2654
DOI10.1007/978-3-642-17327-1

Cover

Abstract This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning.
AbstractList This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning.
Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent complexity, information systems are naturally prone to errors, which may appear at any level - as imprecisions in the data, bugs in the software, or transient or permanent hardware failures. This book provides a concise, rigorous and up-to-date account of different approaches to fault-tolerance in the context of algorithmic search theory. Thanks to their basic structure, search problems offer insights into how fault-tolerant techniques may be applied in various scenarios. In the first part of the book, a paradigmatic model for fault-tolerant search is presented, the Ulam-Renyi problem. Following a didactic approach, the author takes the reader on a tour of Ulam-Renyi problem variants of increasing complexity. In the context of this basic model, fundamental combinatorial and algorithmic issues in the design of fault-tolerant search procedures are discussed. The algorithmic efficiency achievable is analyzed with respect to the statistical nature of the error sources, and the amount of information on which the search algorithm bases its decisions. In the second part of the book, more general models of faults and fault-tolerance are considered. Special attention is given to the application of fault-tolerant search procedures to specific problems in distributed computing, bioinformatics and computational learning. This book will be of special value to researchers from the areas of combinatorial search and fault-tolerant computation, but also to researchers in learning and coding theory, databases, and artificial intelligence. Only basic training in discrete mathematics is assumed. Parts of the book can be used as the basis for specialized graduate courses on combinatorial search, or as supporting material for a graduate or undergraduate course on error-correcting codes.
Author Cicalese, Ferdinando
Author_xml – sequence: 1
  fullname: Cicalese, Ferdinando
BackLink https://cir.nii.ac.jp/crid/1130000794450023680$$DView record in CiNii
BookMark eNpd0E1PAjEQBuAa0YjID_BGjInxUJnZfm2PSEBNSDxIvDZl6cLKssXton_fwnrRS5u-eWYmnUvSqXzlCLlGeEAANdQqpYxKnlBULFEUT0g_ZiwmxwBP_707pIucIU2k4Oekm0qutVaKXZB-CB8AgCBlirpLBlO7Lxs696WrbdUM3pyts_VgVK58XTTrbbgiZ7ktg-v_3j3yPp3Mx8909vr0Mh7NqGUKMaHcCicgZ0pizoExrYElQok0V0xZtAtpHbcLrZeQCZemS-AiF44vFV8mIhOsR-7bxjZs3HdY-7IJ5qt0C-83wfz5XrTD1oZdXVQrV5tWIZjDwg7aMBO9ORaYQ8VdW7Gr_efehcYcG2euampbmsnjGIVOhJZR3rayKgqTFYcTkcWdgdKcC4CEyRQiu2lZZoMtIzNbX_lVbXfrYATXIk5nPw8reZE
ContentType eBook
Book
Copyright Springer-Verlag Berlin Heidelberg 2013
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2013
DBID I4C
RYH
DEWEY 004
DOI 10.1007/978-3-642-17327-1
DatabaseName Casalini Torrossa eBooks Institutional Catalogue
CiNii Complete
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISBN 9783642173271
3642173276
Edition 1
2013
ExternalDocumentID 9783642173271
160554
EBC1592596
BB14398096
5495642
GroupedDBID -JY
-K2
0D6
0DA
20A
38.
AABBV
AARVG
AAUBL
AAWHR
ABFTD
ABMLC
ABMNI
ACBPT
AEJLV
AEKFX
AETDV
AEZAY
AFJMS
ALMA_UNASSIGNED_HOLDINGS
ARZOH
AZZ
BBABE
CZZ
EFU
I4C
IEZ
MA.
MYL
SBO
TPJZQ
UZ6
Z7R
Z7U
Z7X
Z7Z
Z81
Z83
Z84
Z85
Z88
RYH
SAO
Z5O
Z7W
Z7Y
Z87
ID FETCH-LOGICAL-a37112-4a5e50f3761f4033990325758f737a1ab6ae4ab99d0c5e88d045f5e4d74d25c53
ISBN 9783642173271
3642173276
3642173268
9783642173264
ISSN 1431-2654
IngestDate Fri Nov 08 03:13:59 EST 2024
Fri May 23 03:22:38 EDT 2025
Mon Apr 21 07:48:08 EDT 2025
Thu Jun 26 21:54:19 EDT 2025
Sun May 11 05:59:07 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum_Ident Q
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a37112-4a5e50f3761f4033990325758f737a1ab6ae4ab99d0c5e88d045f5e4d74d25c53
Notes Bibliography: p. 199-207
OCLC 864999773
PQID EBC1592596
PageCount 218
ParticipantIDs askewsholts_vlebooks_9783642173271
springer_books_10_1007_978_3_642_17327_1
proquest_ebookcentral_EBC1592596
nii_cinii_1130000794450023680
casalini_monographs_5495642
PublicationCentury 2000
PublicationDate 2013
c2013
2013-11-29
PublicationDateYYYYMMDD 2013-01-01
2013-11-29
PublicationDate_xml – year: 2013
  text: 2013
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Netherlands
– name: Heidelberg
– name: Berlin, Heidelberg
PublicationSeriesTitle Monographs in Theoretical Computer Science. An EATCS Series
PublicationSeriesTitleAlternate Monographs Theoret.Computer Science(formerly:EATCS)
PublicationYear 2013
Publisher Springer Nature
Springer
Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer Nature
– name: Springer
– name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
RelatedPersons Rozenberg, Grzegorz
Henzinger, Monika
Salomaa, Arto
Nielsen, Mogens
Hromkovič, Juraj
RelatedPersons_xml – sequence: 1
  givenname: Monika
  surname: Henzinger
  fullname: Henzinger, Monika
– sequence: 2
  givenname: Juraj
  surname: Hromkovič
  fullname: Hromkovič, Juraj
– sequence: 3
  givenname: Mogens
  surname: Nielsen
  fullname: Nielsen, Mogens
– sequence: 4
  givenname: Grzegorz
  surname: Rozenberg
  fullname: Rozenberg, Grzegorz
– sequence: 5
  givenname: Arto
  surname: Salomaa
  fullname: Salomaa, Arto
SSID ssj0001066819
ssib002801809
Score 2.0685968
Snippet This book examines approaches to fault-tolerance in the context of algorithmic search theory. It details the application of fault-tolerant search procedures to...
Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial...
SourceID askewsholts
springer
proquest
nii
casalini
SourceType Aggregation Database
Publisher
SubjectTerms Algorithms
Computer algorithms
Computer Science
Data processing Computer science
Fault-tolerant computing
Querying (Computer science)
Theory of Computation
Subtitle Reliable Computation with Unreliable Information
TableOfContents Intro -- Preface -- Acknowledgments -- Contents -- Chapter 1 Prologue: What This Book Is About -- 1.1 Part I: The Basic Model -- 1.1.1 Adaptive vs. Non-adaptive Search -- 1.1.2 Q-ary Search with Lies -- 1.1.3 Half-Lies, Erasures and Other Types of Errors -- 1.1.4 Heuristics -- 1.2 Part II: More Models and Applications -- 1.2.1 Erasure Errors, Delays and Time-outs -- 1.2.2 Group Testing -- 1.2.3 Memory Faults and Resilient Search -- 1.2.4 A Model of Learning -- 1.3 Bibliographic Notes -- Part I The Ulam-Rényi Game and Its Variants -- Chapter 2 Fault-Tolerant Search à la Ulam-Rényi -- 2.1 Introduction -- 2.1.1 The Binary Ulam-Rényi Game -- 2.2 The Volume Bound -- 2.3 Borderline States Satisfying the Volume Bound with Equality -- 2.4 The Solution of the 20 Question Game with Lies -- 2.5 Asymptotics for the Ulam-Rényi Problem -- 2.6 Heuristics for the Ulam-Rényi Problem -- Algorithm 1 -- Algorithm 2 -- 2.6.1 Experimental Validation of the Heuristics -- 2.7 Bibliographic Notes -- 2.8 Exercises -- Chapter 3 Adaptive vs. Non-adaptive Search -- 3.1 Coding in a Channel with Noiseless Feedback -- 3.2 No Feedback Equals Error-Correcting Codes -- 3.3 Elements of the Theory of Error-Correcting Codes -- 3.3.1 Linear and Hamming Codes -- 3.3.2 MDS Codes and the Reed-Solomon Codes -- 3.3.3 Bounds on Codes -- 3.4 Fault-Tolerant q-ary Search and Minimum Feedback -- 3.4.1 Fault-Tolerant q-ary search -- 3.4.2 Perfect Strategies and Least Adaptiveness: M=qm -- The Non-adaptive Second Batch of Questions -- Shrinking the First Batch of Questions -- 3.4.3 Arbitrary Cardinality of the Search Space: Least Adaptive Quasi-perfect Strategies -- More About Perfect Minimally Adaptive Strategies -- Quasi-perfect Strategies: The Main Theorem -- 3.5 Some Finite Exact Results for the q-ary Adaptive Ulam-Rényi game -- An Infinite Sequence of Winning States for q-ary Search
Bounds for Two-Stage Algorithms with One Positive -- More Positives -- More Errors -- 7.3 Some Typical Applications of Group Testing in Computational Biology -- 7.4 Bibliographic Notes -- 7.5 Exercises -- Chapter 8 Resilient Search -- 8.1 The Definition of the Problem and a Lower Bound -- 8.2 Randomized Resilient Search -- 8.3 Optimal Deterministic Resilient Search -- 8.3.1 The Verification Procedure -- 8.4 Bibliographic Notes -- 8.5 Exercises -- Chapter 9 A Model for Learning -- 9.1 Computational Learning -- 9.2 Predicting from Expert Advice -- 9.3 Learning in Noisy Environments -- 9.3.1 Rényi's Probabilistic Example -- 9.3.2 Learning with Negative Reinforcement -- 9.3.3 Supervised Learning for Online Prediction -- 9.4 Bibliographic Notes -- 9.5 Exercises -- Bibliography
Coping with Many Lies When M=qm -- 3.6 Bibliographic Notes -- 3.7 Exercises -- Chapter 4 Weighted Errors over a General Channel -- 4.1 Introduction -- 4.2 Two-Batch Search with Weighted Lies -- 4.3 The Lower Bound: The Winning Strategy -- 4.3.1 The First Batch of Questions -- 4.3.2 The Second Batch of Questions -- 4.4 The Upper Bound -- 4.5 Other Noise Models: Unidirectional Errors -- 4.6 Bibliographic Notes -- 4.7 Exercises -- Chapter 5 Variations on a Theme of Ulam and Rényi: More Types of Questions and Lies -- 5.1 Comparison-Based Search: The Multiple-Interval Queries -- 5.2 Query Optimal Multi-interval Search with k = O(e2) -- 5.2.1 The Case of Two Lies: A Canonical Representation of States and 2-Interval Queries -- 5.2.2 About Comparison Questions -- 5.3 Linearly Bounded Number of Lies -- 5.4 Prefix-Bounded Numbers of Lies -- 5.5 Bibliographic Notes -- 5.6 Exercises -- Part II Other Models -- Chapter 6 Delays and Time Outs -- 6.1 Search with Fixed Batches of Questions and Variable Delay in Answers -- 6.2 Search with Variable Batches and Delays -- 6.3 Lost Answers and Delays -- 6.3.1 Extensions and Generalizations -- 6.3.2 The Proof of Proposition 6.1 -- 6.3.3 Broadcast with Latency vs. Search with Delay -- Broadcast in the Postal Model -- Broadcast and Comparison Search Are Isomorphic Problems -- 6.4 Bibliographic Notes -- 6.5 Exercises -- Chapter 7 Group Testing -- 7.1 Group Testing with Subset Tests -- 7.1.1 The (p,v,n)-super-selector -- 7.1.2 Approximate Group Testing -- 7.1.3 Bounds on the Size of a (p, v, n)-super-selector -- 7.2 Interval Group Testing -- Sets of Queries and YES-Sets -- 7.2.1 Non-adaptive Fault-Tolerant Interval Group Testing -- 7.2.2 Two-Stage Fault-Tolerant Interval Group Testing -- An Averaging Argument for Lower Bound on Two-Stage Interval Group Testing -- The Averaging Argument in Use -- Yes-sets and Errors
Title Fault-Tolerant Search Algorithms
URI http://digital.casalini.it/9783642173271
https://cir.nii.ac.jp/crid/1130000794450023680
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=1592596
http://link.springer.com/10.1007/978-3-642-17327-1
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783642173271&uid=none
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB7R5cJegAJiKUUW4oCEgpK1Hcfc2NVWVUW5UKreLDtxYEXISk22h_56xs67qoTgYu0mkcfy58c3Y88MwLtI20gLJoOMMR0wnTOcUvEySCPjdqPM0KXzHT7_Gp9-Z2dX_GpIWuq9S2rzMb2916_kf1DFZ4ir85L9B2T7SvEB_kZ8sUSEsbxDfvu_bc4hvS_qoN4VFrea-kNrutDFjx3q-j9_V17Rv7bF1jtGpT5zQ4O0t7vuy_5dGzh1fBy_drjZJuHiicUB5AzNu7F5wKVqmJgHOvPgRG2kzrtVIHFj9y6i43sT-GXgPhVBNOwY_T2-1QrplkxQDTqAAyHCGTz8vDn7cjlYuZDRIOdwTjWdzKQJezS0oTtrbsP9TmTOYa6rX7jc41ZQV4476Eo7l1GkAuV2O1EL7pxke4Jw8QRmzmnkKTyw5SE87lJlkHblPIT5eR8et3oG36b4kQY_MuBHPpEOITJCjzj0yIAeGaH3HC5PNhfr06DNbhFoKpDl4sTgloc5rvBRzkKKTDGkuIDyJBdU6EibWFumjZRZmHKbJBmy75xblgmWLXnK6QuYlbvSvgQiZZ4z6qKnWcM401JYnkuaxMwYI_PlAt6OulHdFP4kvlIjHES0gKOudxVOlCZieqW4U6EZVnGMHa7SrSsjdwiKgEnGuM9BkIQLIB0UytfeXi5Wm9UaKTNq2fEC3ncQqUZ-FzMb26GoQinKN0VFr_4i7QgeDYP9Nczq6709RnZYmzftEPwDhedZhw
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Fault-tolerant+search+algorithms+%3A+reliable+computation+with+unreliable+information&rft.au=Cicalese%2C+Ferdinando&rft.date=2013-01-01&rft.pub=Springer&rft.isbn=9783642173264&rft_id=info:doi/10.1007%2F978-3-642-17327-1&rft.externalDocID=BB14398096
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97836421%2F9783642173271.jpg
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-3-642-17327-1