{"id":937,"date":"2011-09-23T11:07:37","date_gmt":"2011-09-23T15:07:37","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/pamphlet\/?p=937"},"modified":"2011-09-23T11:07:37","modified_gmt":"2011-09-23T15:07:37","slug":"tales-of-peer-review-episode-1-boyer-and-moores-mjrty-algorithm","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/2011\/09\/23\/tales-of-peer-review-episode-1-boyer-and-moores-mjrty-algorithm\/","title":{"rendered":"Tales of peer review, episode 1: Boyer and Moore&#8217;s MJRTY algorithm"},"content":{"rendered":"<p>I&#8217;m generally a big fan of peer review. I think it plays an important role in the improvement and &#8220;<a href=\"http:\/\/en.wikipedia.org\/wiki\/Chromatography\">chromatography<\/a>&#8221; of the scholarly literature. But sometimes. Sometimes.<\/p>\n<table width=\"200\" align=\"right\" bgcolor=\"#F7EFE5\">\n<tbody>\n<tr>\n<td><a href=\"http:\/\/blogs.law.harvard.edu\/pamphlet\/files\/2011\/09\/mjrty-pattern1.png\"><img decoding=\"async\" src=\"http:\/\/blogs.law.harvard.edu\/pamphlet\/files\/2011\/09\/mjrty-pattern1.png\" alt=\"The Boyer-Moore MJRTY algorithm allows efficient determination of which shape (triangle, circle, square) is in the majority without counting each shape.\" width=\"200\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\"><span style=\"color: #999999\">The Boyer-Moore MJRTY algorithm allows efficient determination of which shape (triangle, circle, square) is in the majority <em>without counting each shape<\/em>.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This past week I was reading <a href=\"http:\/\/www.cs.utexas.edu\/~boyer\/\">Robert Boyer<\/a> and <a href=\"http:\/\/www.cs.utexas.edu\/~moore\/\">J Strother Moore<\/a>&#8216;s paper on computing the majority element of a multiset, which presents a very clever simple algorithm for this fundamental problem and a description of a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Automated_theorem_proving\">mechanical proof<\/a> of its correctness. The authors aptly consider the work a &#8220;minor landmark\u00a0in the development of formal verification and automated reasoning&#8221;.<\/p>\n<p>Below is the postscript to that paper, in its entirety, which describes the history of the paper including how and why it was &#8220;repeatedly rejected for publication&#8221;. (It was eventually published as a chapter in a <a href=\"http:\/\/www.worldcat.org\/oclc\/24375294\">1991 festschrift for Woody Bledsoe<\/a>,\u00a0<em>ten years<\/em>\u00a0after it was written, and is now also\u00a0<a href=\"http:\/\/www.cs.utexas.edu\/users\/boyer\/mjrty.ps.Z\">available from Moore&#8217;s website<\/a>.)<\/p>\n<p style=\"padding-left: 30px\">In this paper we have described a linear time majority vote algorithm and discussed the mechanically checked correctness proof of a Fortran implementation of it. This work has a rather convoluted history which we would here like to clarify.<\/p>\n<p style=\"padding-left: 30px\">The algorithm described here was invented in 1980 while we worked at SRI International. A colleague at SRI, working on fault tolerance, was trying to specify some algorithms using the logic supported by &#8220;Boyer-Moore Theorem Prover.&#8221; He asked us for an elegant definition within that logic of the notion of the majority element of a list. Our answer to this challenge was the recursive expression of the algorithm described here.<\/p>\n<p style=\"padding-left: 30px\">In late 1980, we wrote a Fortran version of the algorithm and proved it correct mechanically. In February, 1981, we wrote this paper, describing that work. In our minds the paper was noteworthy because it simultaneously announced an interesting new algorithm and offered a mechanically checked correctness proof. We submitted the paper for publication.<\/p>\n<p style=\"padding-left: 30px\">In 1981 we moved to the University of Texas. Jay Misra, a colleague at UT, heard our presentation of the algorithm to an NSF site-visit team. According to Misra (private communication, 1990): &#8220;I wondered how to generalize [the algorithm] to detect elements that occur more than <em>n<\/em>\/<em>k<\/em> times, for all <em>k<\/em>, <em>k<\/em> \u2265 2. I developed algorithm 2 [given in Section 3 of [9]] which is directly inspired by your algorithm. Also, I showed that this algorithm is optimal [Section 5, <em>op. cit.<\/em>]. On a visit to Cornell, I showed all this to David Gries; he was inspired enough to contribute algorithm 1 [Section 2, <em>op. cit.<\/em>].&#8221; In 1982, Misra and Gries published their work [9], citing our technical report appropriately as &#8220;submitted for publication.&#8221;<\/p>\n<p style=\"padding-left: 30px\">However, our paper was repeatedly rejected for publication, largely because of its emphasis on Fortran and mechanical verification. A rewritten version emphasizing the algorithm itself was rejected on the grounds that the work was superceded by the paper of Misra and Gries!<\/p>\n<p style=\"padding-left: 30px\">When we were invited to contribute to the Bledsoe festschrift we decided to use the opportunity to put our original paper into the literature. We still think of this as a minor landmark in the development of formal verification and automated reasoning: here for the first time a new algorithm is presented along with its mechanically checked correctness proof\u2014eleven years after the work.<\/p>\n<p>I have to think the world would have been better off if Boyer and Moore had just posted the paper to the web in 1981 and been done with it. Unfortunately, the web hadn&#8217;t been developed yet.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;m generally a big fan of peer review. I think it plays an important role in the improvement and &#8220;chromatography&#8221; of the scholarly literature. But sometimes. Sometimes. The Boyer-Moore MJRTY algorithm allows efficient determination of which shape (triangle, circle, square) is in the majority without counting each shape. This past week I was reading Robert [&hellip;]<\/p>\n","protected":false},"author":2110,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[380,68],"tags":[],"class_list":["post-937","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-scholarly-communication"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5pLfN-f7","jetpack-related-posts":[{"id":471,"url":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/2010\/06\/09\/a-proposal-to-simplify-the-university-of-north-texas-open-access-policy\/","url_meta":{"origin":937,"position":0},"title":"A proposal to simplify the University of North Texas open-access policy","author":"Stuart Shieber","date":"Wednesday, June 9, 2010","format":false,"excerpt":"\"In High Places\", statue by Gerald Balciar, University of North Texas - Denton campus, installed 1990. Image via Wikipedia. The University of North Texas is engaged in a laudable process of designing an open-access policy for their community. Draft language for their policy is now available at their site on\u2026","rel":"","context":"In &quot;open access&quot;","block_context":{"text":"open access","link":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/category\/scholarly-communication\/open-access\/"},"img":{"alt_text":"","src":"http:\/\/upload.wikimedia.org\/wikipedia\/en\/thumb\/c\/c4\/UNT_Eagle_statue.jpg\/300px-UNT_Eagle_statue.jpg","width":350,"height":200},"classes":[]},{"id":32,"url":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/2009\/05\/28\/open-access-policies-and-academic-freedom\/","url_meta":{"origin":937,"position":1},"title":"Open-access policies and academic freedom","author":"Stuart Shieber","date":"Thursday, May 28, 2009","format":false,"excerpt":"I very occasionally hear expressed a concern about the Harvard open-access policy that it violates some aspect of academic freedom. The argument seems to be that by granting a prior license to Harvard, faculty may be forced to forgo publication in certain venues.\u00a0 Our rights as scholars to determine the\u2026","rel":"","context":"In &quot;open access&quot;","block_context":{"text":"open access","link":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/category\/scholarly-communication\/open-access\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2445,"url":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/2022\/07\/25\/moderating-principles\/","url_meta":{"origin":937,"position":2},"title":"Moderating principles","author":"Stuart Shieber","date":"Monday, July 25, 2022","format":false,"excerpt":"Some time around April 1994, I founded the Computation and Language E-Print Archive, the first preprint repository for a subfield of computer science. It was hosted on Paul Ginsparg\u2019s arXiv platform, which at the time had been hosting only physics papers, built out from the original arXiv repository for high-energy\u2026","rel":"","context":"In &quot;computational linguistics&quot;","block_context":{"text":"computational linguistics","link":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/category\/linguistics\/computational-linguistics\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":858,"url":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/2011\/06\/07\/the-nih-responds-to-my-letter\/","url_meta":{"origin":937,"position":3},"title":"The NIH responds to my letter","author":"Stuart Shieber","date":"Tuesday, June 7, 2011","format":false,"excerpt":"Front steps of National Library of Medicine, 2008, photo courtesy of NIH Image Bank Imagine my surprise when I actually received a response to my letters in recognition of the NIH public access policy, a form letter undoubtedly, but nonetheless gratefully received. And as a side effect, it allows us\u2026","rel":"","context":"In &quot;open access&quot;","block_context":{"text":"open access","link":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/category\/scholarly-communication\/open-access\/"},"img":{"alt_text":"Front steps of National Library of Medicine, 2008, photo courtesy of NIH Image Bank","src":"https:\/\/i0.wp.com\/blogs.law.harvard.edu\/pamphlet\/files\/2011\/06\/nlm-203x300.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":431,"url":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/2010\/05\/01\/worlds-most-excruciatingly-ironic-conference\/","url_meta":{"origin":937,"position":4},"title":"World&#8217;s most excruciatingly ironic conference?","author":"Stuart Shieber","date":"Saturday, May 1, 2010","format":false,"excerpt":"Could this be the world's most excruciatingly ironic conference? \u00a0The Second\u00a0International Symposium on\u00a0Peer Reviewing (ISPR 2010) is soliciting papers. Their call for papers emphasizes the sorry state of peer-review, calling for\u00a0\"more research and reflections [that] are urgently needed on research quality assurance and, specifically, on Peer Review.\" What could be\u2026","rel":"","context":"In &quot;scholarly communication&quot;","block_context":{"text":"scholarly communication","link":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/category\/scholarly-communication\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":56,"url":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/2009\/05\/27\/some-background-on-open-access\/","url_meta":{"origin":937,"position":5},"title":"Some background on open access","author":"Stuart Shieber","date":"Wednesday, May 27, 2009","format":false,"excerpt":"I assume that readers of the open access discussions on this blog are familiar with the state of play in the area, but just in case, here's some background. Peter Suber defines open access in his A Very Brief Introduction to Open Access as follows: \"Open-access (OA) literature is digital,\u2026","rel":"","context":"In &quot;meta&quot;","block_context":{"text":"meta","link":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/category\/meta\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/posts\/937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/users\/2110"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/comments?post=937"}],"version-history":[{"count":18,"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/posts\/937\/revisions"}],"predecessor-version":[{"id":958,"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/posts\/937\/revisions\/958"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/media?parent=937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/categories?post=937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/pamphlet\/wp-json\/wp\/v2\/tags?post=937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}