Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Venkatesan T. Chakaravarthy is active.

Publication


Featured researches published by Venkatesan T. Chakaravarthy.


international conference on data engineering | 2004

Recursive XML schemas, recursive XML queries, and relational storage: XML-to-SQL query translation

Rajasekar Krishnamurthy; Venkatesan T. Chakaravarthy; Raghav Kaushik; Jeffrey F. Naughton

We consider the problem of translating XML queries into SQL when XML documents have been stored in an RDBMS using a schema-based relational decomposition. Surprisingly, there is no published XML-to-SQL query translation algorithm for this scenario that handles recursive XML schemas. We present a generic algorithm to translate path expression queries into SQL in the presence of recursion in the schema and queries. This algorithm handles a general class of XML-to-relational mappings, which includes all techniques proposed in literature. Some of the salient features of this algorithm are: (i) It translates a path expression query into a single SQL query, irrespective of how complex the XML schema is, (ii) It uses the with clause in SQL99 to handle recursive queries even over nonrecursive schemas, (iii) It reconstructs recursive XML subtrees with a single SQL query and (iv) It shows that the support for linear recursion in SQL99 is sufficient for handling path expression queries over arbitrarily complex recursive XML schema.


symposium on principles of programming languages | 2003

New results on the computability and complexity of points--to analysis

Venkatesan T. Chakaravarthy

Given a program and two variables p and q, the goal of points-to analysis is to check if p can point to q in some execution of the program. This well-studied problem plays a crucial role in compiler optimization. The problem is known to be undecidable when dynamic memory is allowed. But the result is known only when variables are allowed to be structures. We extend the result to show that, the problem remains undecidable, even when only scalar variables are allowed. Our second result deals with a version of points-to analysis called flow-insensitive analysis, where one ignores the control flow of the program and assumes that the statements can be executed in any order. The problem is known to be NP-Hard, even when dynamic memory is not allowed and variables are scalar. We show that when the variables are further restricted to have well-defined data types, the problem is in P. The corresponding flow-sensitive version, even with further restrictions, is known to be PSPACE-Complete. Thus, our result gives some theoretical evidence that flow-insensitive analysis is easier than flow-sensitive analysis. Moreover, while most variations of the points-to analysis are known to be computationally hard, our result gives a rare instance of a non-trivial points-to problem solvable in polynomial time.


international conference on database theory | 2003

On the Difficulty of Finding Optimal Relational Decompositions for XML Workloads: A Complexity Theoretic Perspective

Rajasekar Krishnamurthy; Venkatesan T. Chakaravarthy; Jeffrey F. Naughton

A key problem that arises in the context of storing XML documents in relational databases is that of finding an optimal relational decomposition for a given set of XML documents and a given set of XML queries over those documents. While there have been a number of ad hoc solutions proposed for this problem, to our knowledge this paper represents a first step toward formalizing the problem and studying its complexity. It turns out that to even define what one means by an optimal decomposition, one first needs to specify an algorithm to translate XML queries to relational queries, and a cost model to evaluate the quality of the resulting relational queries. By examining an interesting problem embedded in choosing a relational decomposition, we show that choices of different translation algorithms and cost models result in very different complexities for the resulting optimization problems. Our results suggest that, contrary to the trend in previous work, the eventual development of practical algorithms for finding relational decompositions for XML workloads will require judicious choices of cost models and translation algorithms, rather than an exclusive focus on the decomposition problem in isolation.


symposium on principles of database systems | 2001

On the complexity of join predicates

Jin-Yi Cai; Venkatesan T. Chakaravarthy; Raghav Kaushik; Jeffrey F. Naughton

We consider the complexity of join problems, focusing on equijoins, spatial-overlap joins, and set-containment joins. We use a graph pebbling model to characterize these joins combinatorially, by the length of their optimal pebbling strategies and computationally, by the complexity of discovering these strategies. Our results show that equijoins are the easiest of all joins, with optimal pebbling strategies that meet the lower bound over all join problems and that can be found in linear time. By contrast, spatial-overlap and set-containment joins are the hardest joins, with instances where optimal pebbling strategies reach the upper bound over all join problems and with the problem of discovering optimal pebbling strategies being NP-complete. For set-containment joins, we show that discovering the optimal pebbling is also MAX-SNP-Complete. As a consequence, we show that unless NP = P, there is a constant ∈o, such that this problem cannot be approximated within a factor of 1 + ∈&Ogr; in polynomial time. Our results shed some light on the difficulty the applied community has had in finding “good” algorithms for spatial-overlap and set-containment joins.


Theory of Computing Systems \/ Mathematical Systems Theory | 2006

Time-Space Tradeoff in Derandomizing Probabilistic Logspace

Jin-Yi Cai; Venkatesan T. Chakaravarthy; Dieter van Melkebeek

Nisan showed that any randomized logarithmic space algorithm (running in polynomial time and with two-sided error) can be simulated by a deterministic algorithm that runs simultaneously in polynomial time and Θ(log2 n) space. Subsequently Saks and Zhou improved the space complexity and showed that a deterministic simulation can be carried out in space Θ(log1.5n). However, their simulation runs in time nΘ(log^{0.5}n). We prove a time--space tradeoff that interpolates these two simulations. Specifically, we prove that, for any 0 ≤ α ≤ 0.5, any randomized logarithmic space algorithm (running in polynomial time and with two-sided error) can be simulated deterministically in time nO(log^{0.5-α}n) and space O(log^{1.5+α}n). That is, we prove that BPL ⊆ DTISP[nO(log^{0.5-α}n), O(log1.5+αn)].


symposium on theoretical aspects of computer science | 2003

Competing Provers Yield Improved Karp-Lipton Collapse Results

Jin-Yi Cai; Venkatesan T. Chakaravarthy; Lane A. Hemaspaandra; Mitsunori Ogihara

Via competing provers, we show that if a language A is self-reducible and has polynomial-size circuits then S2A = S2. Building on this, we strengthen the Kamper-AFK Theorem, namely, we prove that if NP ? (NP ? coNP)/poly then the polynomial hierarchy collapses to S2NP?coNP. We also strengthen Yaps Theorem, namely, we prove that if NP ? coNP/poly then the polynomial hierarchy collapses to S2NP. Under the same assumptions, the best previously known collapses were to ZPPNP and ZPPNPNP respectively ([20,6], building on [18,1,17,30]). It is known that S2 ? ZPPNP [8]. That result and its relativized version show that our new collapses indeed improve the previously known results. Since the Kamper-AFK Theorem and Yaps Theorem are used in the literature as bridges in a variety of results--ranging from the study of unique solutions to issues of approximation--our results implicitly strengthen all those results.


Acta Informatica | 2002

On the Non-Approximability of Points-to Analysis

Venkatesan T. Chakaravarthy; Susan Horwitz

Abstract. Determining points-to sets is an important static-analysis problem. Most of the classic static analyses (used e.g., by compilers or in programming environments) rely on knowing which variables might be used or defined by each expression in a program. In the presence of pointers, the use/def set of an expression like *p = *q can only be determined given (safe) points-to sets for p and q.Previous work has shown that both precise flow-sensitive and precise flow-insensitive pointer analysis is NP-Hard, even when restricted to single-procedure programs with no dynamic memory allocation. In this paper, we show that it is not even possible to compute good approximations to the precise solutions (i.e., to compute points-to sets whose sizes are within a constant factor of the sizes of the precise points-to sets) unless P=NP.


symposium on theoretical aspects of computer science | 2008

Finding Irrefutable Certificates for S 2 p via Arthur and Merlin.

Venkatesan T. Chakaravarthy; Sambuddha Roy

We show that Sp2 ⊆ P , where Sp2 is the symmetric alternation class and prAM refers to the promise version of the Arthur-Merlin class AM. This is derived as a consequence of our main result that presents an FP algorithm for finding a small set of “collectively irrefutable certificates” of a given S2-type matrix. The main result also yields some new consequences of the hypothesis that NP has polynomial size circuits. It is known that the above hypothesis implies a collapse of the polynomial time hierarchy (PH) to Sp2 ⊆ ZPP NP [5, 14]. Under the same hypothesis, we show that PH collapses to P. We also describe an FP algorithm for learning polynomial size circuits for SAT, assuming such circuits exist. For the same problem, the previously best known result was a ZPP algorithm [4].


combinatorial pattern matching | 2002

The Problem of Context Sensitive String Matching

Venkatesan T. Chakaravarthy; Rajasekar Krishnamurthy

In the context sensitive string matching problem, we are given a pattern and a text. The pattern is a string over variables and constants and the text is a string of constants. The goal is to find if there is a mapping from variables to strings of constants so that on applying this mapping to the pattern we get the given text. Languages like Perl and Python support such a sophisticated string matching. The problem is known to be NP-Complete. In this paper, we consider a weighted version of this problem that checks how close the pattern can be matched with the text. We show that this variation is MAXSNP-Complete and cannot be approximated within a factor of 3313/3312. We show that even the restriction, where the pattern consists of variables only, is NP-Complete and MAXSNP-Complete. When the alphabet is bounded, we give an approximation algorithm for this restriction.


Electronic Colloquium on Computational Complexity | 2009

Arthur and Merlin as Oracles.

Venkatesan T. Chakaravarthy; Sambuddha Roy

Collaboration


Dive into the Venkatesan T. Chakaravarthy's collaboration.

Top Co-Authors

Avatar

Jin-Yi Cai

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Jeffrey F. Naughton

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dieter van Melkebeek

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Susan Horwitz

University of Wisconsin-Madison

View shared research outputs
Researchain Logo
Decentralizing Knowledge