Lower bounds for polynomial kernelization

Size: px
Start display at page:

Download "Lower bounds for polynomial kernelization"

Transcription

1 Lower bounds for polynomial kernelization Part 2 Micha l Pilipczuk Institutt for Informatikk, Universitetet i Bergen August 20 th, 2014 Micha l Pilipczuk Kernelization lower bounds, part 2 1/33

2 Outline Goal: how to prove that for some problems polynomial kernels do not exist? Part 1: Introduction of the (cross)-composition framework. Basic example. Part 2: PPT reductions. Case study of several cross-compositions. Weak compositions. Micha l Pilipczuk Kernelization lower bounds, part 2 2/33

3 In the previous episode... Composition: an algorithm composing many instances into one instance simulating their OR. Micha l Pilipczuk Kernelization lower bounds, part 2 3/33

4 In the previous episode... Composition: an algorithm composing many instances into one instance simulating their OR. The new instance has parameter bounded polynomially in the maximum size of an input instance. Micha l Pilipczuk Kernelization lower bounds, part 2 3/33

5 In the previous episode... Composition: an algorithm composing many instances into one instance simulating their OR. The new instance has parameter bounded polynomially in the maximum size of an input instance. Composition+Compression gives OR-Distillation Micha l Pilipczuk Kernelization lower bounds, part 2 3/33

6 In the previous episode... Composition: an algorithm composing many instances into one instance simulating their OR. The new instance has parameter bounded polynomially in the maximum size of an input instance. Composition+Compression gives OR-Distillation OR-Distillation of an NP-hard language contradicts conp NP/poly. Micha l Pilipczuk Kernelization lower bounds, part 2 3/33

7 In the previous episode... Composition: an algorithm composing many instances into one instance simulating their OR. The new instance has parameter bounded polynomially in the maximum size of an input instance. Composition+Compression gives OR-Distillation OR-Distillation of an NP-hard language contradicts conp NP/poly. Corollary: To show no-poly-kernel it suffices to construct a composition algorithm. Micha l Pilipczuk Kernelization lower bounds, part 2 3/33

8 In the previous episode... Cross-composition An unparameterized problem Q cross-composes into a parameterized problem L, if there exists a polynomial equivalence relation R and an algorithm that, given R-equivalent strings x 1, x 2,..., x t, in time poly ( t + t i=1 x i ) produces one instance (y, k ) such that (y, k ) L iff x i Q for at least one i = 1, 2,..., t, k = poly (log t + max t i=1 x i ). Cross-composition theorem Bodlaender et al.; STACS 2011, SIDMA 2014 If some NP-hard problem Q cross-composes into L, then L does not admit a polynomial compression into any language R, unless NP conp/poly. Micha l Pilipczuk Kernelization lower bounds, part 2 4/33

9 PPTs Idea: Hardness of kernelization can be transferred via reductions, similarly to NP-hardness. Micha l Pilipczuk Kernelization lower bounds, part 2 5/33

10 PPTs Idea: Hardness of kernelization can be transferred via reductions, similarly to NP-hardness. Polynomial parameter transformation (PPT) A polynomial parameter transformation from a parameterized problem P to a parameterized problem Q is a polynomial-time algorithm that transforms a given instance (x, k) of P into an equivalent instance (y, k ) of Q such that k = poly(k). Micha l Pilipczuk Kernelization lower bounds, part 2 5/33

11 PPTs: properties Observation If problem P PPT-reduces to Q, and P does not admit a polynomial compression algorithm (into any language R), then neither does Q. Micha l Pilipczuk Kernelization lower bounds, part 2 6/33

12 PPTs: properties Observation If problem P PPT-reduces to Q, and P does not admit a polynomial compression algorithm (into any language R), then neither does Q. Proof: Compose the PPT-reduction with the assumed compression for Q. Micha l Pilipczuk Kernelization lower bounds, part 2 6/33

13 Application 2: Steiner Tree Steiner Tree Input: Parameter: k + T Question: Graph G with designated terminals T V (G), and an integer k Is there a set X V (G) \ T, such that X k and G[T X ] is connected? Micha l Pilipczuk Kernelization lower bounds, part 2 7/33

14 Application 2: Steiner Tree Steiner Tree Input: Parameter: k + T Question: Graph G with designated terminals T V (G), and an integer k Is there a set X V (G) \ T, such that X k and G[T X ] is connected? Follows from a PPT from Set Cover par. by U. Micha l Pilipczuk Kernelization lower bounds, part 2 7/33

15 Application 2: Steiner Tree Steiner Tree Input: Parameter: k + T Question: Graph G with designated terminals T V (G), and an integer k Is there a set X V (G) \ T, such that X k and G[T X ] is connected? Follows from a PPT from Set Cover par. by U. But we will present an alternative approach. Micha l Pilipczuk Kernelization lower bounds, part 2 7/33

16 The pivot problem technique Introduce an simpler problem P, which is almost trivially compositional. Micha l Pilipczuk Kernelization lower bounds, part 2 8/33

17 The pivot problem technique Introduce an simpler problem P, which is almost trivially compositional. Then design a PPT from P to the target problem. Micha l Pilipczuk Kernelization lower bounds, part 2 8/33

18 The pivot problem technique Introduce an simpler problem P, which is almost trivially compositional. Then design a PPT from P to the target problem. Move the weight of the proof to the transformation and the actual definition of P. Micha l Pilipczuk Kernelization lower bounds, part 2 8/33

19 The pivot problem technique Introduce an simpler problem P, which is almost trivially compositional. Then design a PPT from P to the target problem. Move the weight of the proof to the transformation and the actual definition of P. Idea: Extract the essence of the problem. Micha l Pilipczuk Kernelization lower bounds, part 2 8/33

20 Colourful Graph Motif Colourful Graph Motif Input: Parameter: Question: Graph G and a colouring function C : V (G) {1, 2,..., k} k Does there exists a connected subgraph H of G containing exactly one vertex of each colour? Micha l Pilipczuk Kernelization lower bounds, part 2 9/33

21 Colourful Graph Motif example Micha l Pilipczuk Kernelization lower bounds, part 2 10/33

22 Colourful Graph Motif example Micha l Pilipczuk Kernelization lower bounds, part 2 10/33

23 About CGM Introduced by Fellows et al. (ICALP 2007, JCSS 2011). Micha l Pilipczuk Kernelization lower bounds, part 2 11/33

24 About CGM Introduced by Fellows et al. (ICALP 2007, JCSS 2011). NP-hard even on trees. Micha l Pilipczuk Kernelization lower bounds, part 2 11/33

25 About CGM Introduced by Fellows et al. (ICALP 2007, JCSS 2011). NP-hard even on trees. Interesting FPT algorithms for various variants using the algebraic approach. Micha l Pilipczuk Kernelization lower bounds, part 2 11/33

26 About CGM Introduced by Fellows et al. (ICALP 2007, JCSS 2011). NP-hard even on trees. Interesting FPT algorithms for various variants using the algebraic approach. Trivial composition algorithm: take the disjoint union of instances, reuse colors. Micha l Pilipczuk Kernelization lower bounds, part 2 11/33

27 About CGM Introduced by Fellows et al. (ICALP 2007, JCSS 2011). NP-hard even on trees. Interesting FPT algorithms for various variants using the algebraic approach. Trivial composition algorithm: take the disjoint union of instances, reuse colors. Hence, CGM does not have a polykernel unless conp NP/poly. Micha l Pilipczuk Kernelization lower bounds, part 2 11/33

28 About CGM Introduced by Fellows et al. (ICALP 2007, JCSS 2011). NP-hard even on trees. Interesting FPT algorithms for various variants using the algebraic approach. Trivial composition algorithm: take the disjoint union of instances, reuse colors. Hence, CGM does not have a polykernel unless conp NP/poly. Now: PPT-reduction from CGM to ST. Micha l Pilipczuk Kernelization lower bounds, part 2 11/33

29 From CGM to ST Micha l Pilipczuk Kernelization lower bounds, part 2 12/33

30 From CGM to ST Attach a terminal to every colour class Give budget k for Steiner nodes Micha l Pilipczuk Kernelization lower bounds, part 2 12/33

31 From CGM to ST Attach a terminal to every colour class Give budget k for Steiner nodes Micha l Pilipczuk Kernelization lower bounds, part 2 12/33

32 Wrapping up CGM does not admit a polynomial kernel, unless conp NP/poly. Micha l Pilipczuk Kernelization lower bounds, part 2 13/33

33 Wrapping up CGM does not admit a polynomial kernel, unless conp NP/poly. CGM PPT-reduces to Steiner Tree par. by k + T. Micha l Pilipczuk Kernelization lower bounds, part 2 13/33

34 Wrapping up CGM does not admit a polynomial kernel, unless conp NP/poly. CGM PPT-reduces to Steiner Tree par. by k + T. Hence Steiner Tree par. by k + T does not admit a polynomial kernel, unless conp NP/poly. Micha l Pilipczuk Kernelization lower bounds, part 2 13/33

35 Application 3: Set Cover par. by U Set Cover Input: Universe U, a family of subsets F 2 U, integer k Parameter: U Question: Is there a subfamily G F, G k, such that G = U? Micha l Pilipczuk Kernelization lower bounds, part 2 14/33

36 Application 3: Set Cover par. by U Set Cover Input: Universe U, a family of subsets F 2 U, integer k Parameter: U Question: Is there a subfamily G F, G k, such that G = U? Convention: We view it as a bipartite graph with one side (blue) trying to dominate the other one (red). Micha l Pilipczuk Kernelization lower bounds, part 2 14/33

37 Application 3: Set Cover par. by U Set Cover Input: Universe U, a family of subsets F 2 U, integer k Parameter: U Question: Is there a subfamily G F, G k, such that G = U? Convention: We view it as a bipartite graph with one side (blue) trying to dominate the other one (red). W.l.o.g. k U. Micha l Pilipczuk Kernelization lower bounds, part 2 14/33

38 Colourful Set Cover Colourful Set Cover Input: Parameter: Question: Universe U and families F 1, F 2,..., F k 2 U U + k Is there a family G containing exactly one set from each family F i, such that G = U? Micha l Pilipczuk Kernelization lower bounds, part 2 15/33

39 Equivalence of the problems SC PPT CSC: Micha l Pilipczuk Kernelization lower bounds, part 2 16/33

40 Equivalence of the problems SC PPT CSC: Put F i = F for every i. Micha l Pilipczuk Kernelization lower bounds, part 2 16/33

41 Equivalence of the problems SC PPT CSC: Put F i = F for every i. CSC PPT SC: Micha l Pilipczuk Kernelization lower bounds, part 2 16/33

42 Equivalence of the problems SC PPT CSC: Put F i = F for every i. CSC PPT SC: Add k elements e 1, e 2,..., e k ; include e i in every set from F i. Micha l Pilipczuk Kernelization lower bounds, part 2 16/33

43 Equivalence of the problems SC PPT CSC: Put F i = F for every i. CSC PPT SC: Add k elements e 1, e 2,..., e k ; include e i in every set from F i. Then take F = F i. Micha l Pilipczuk Kernelization lower bounds, part 2 16/33

44 Equivalence of the problems SC PPT CSC: Put F i = F for every i. CSC PPT SC: Add k elements e 1, e 2,..., e k ; include e i in every set from F i. Then take F = F i. We will cross-compose Colourful Set Cover into itself. Micha l Pilipczuk Kernelization lower bounds, part 2 16/33

45 Equivalence of the problems SC PPT CSC: Put F i = F for every i. CSC PPT SC: Add k elements e 1, e 2,..., e k ; include e i in every set from F i. Then take F = F i. We will cross-compose Colourful Set Cover into itself. Assumption: the same universe U, the same k, and t being a power of 2. Micha l Pilipczuk Kernelization lower bounds, part 2 16/33

46 Cross-composing into Colourful Set Cover Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

47 Cross-composing into Colourful Set Cover U Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

48 Cross-composing into Colourful Set Cover k F 1 1 F 2 1 F 1 2 F 2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ U Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

49 Cross-composing into Colourful Set Cover k F 1 1 F 2 1 F 1 2 F 2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ U Problem: Ensure consistent instance choice (choices from the same row) Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

50 Cross-composing into Colourful Set Cover k F 1 1 F 2 1 F 1 2 F 2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ U Problem: Ensure consistent instance choice (choices from the same row) Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

51 Cross-composing into Colourful Set Cover k F 1 1 F 2 1 F 1 2 F 2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ Problem: Ensure consistent instance choice (choices from the same row) Solution: Equality gadgets Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

52 Cross-composing into Colourful Set Cover k F 1 1 F 2 1 F 1 2 F 2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ U 1 j 1 < j 2 k make a gadget Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

53 Cross-composing into Colourful Set Cover k F1 1 F1 2 F2 1 F2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ (3, 4) U 1 j 1 < j 2 k make a gadget log t pairs Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

54 Cross-composing into Colourful Set Cover k F1 1 F1 2 F2 1 F2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ (3, 4) U 1 j 1 < j 2 k make a gadget log t pairs i add bin(i) to sets from F i 3 Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

55 Cross-composing into Colourful Set Cover k F1 1 F1 2 F2 1 F2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ (3, 4) U 1 j 1 < j 2 k make a gadget log t pairs i add bin(i) to sets from F i 3 Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) i add bin(i) to sets from F i 4 Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

56 Cross-composing into Colourful Set Cover k F1 1 F1 2 F2 1 F2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ (3, 4) U Eq. gadgets are covered Instance choices are equal log t pairs i add bin(i) to sets from F i 3 Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) i add bin(i) to sets from F i 4 Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

57 Cross-composing into Colourful Set Cover k F1 1 F1 2 F2 1 F2 2 F 1 3 F 2 3 F 1 4 F 2 4 F 1 5 F F 1 k F 2 k t instances {}}{ (3, 4) U New parameter: U + O(k 2 log t) log t pairs i add bin(i) to sets from F i 3 Input: Instances (U, (F i j ) 1 j k ) Output: Instance (U, (F j ) 1 j k ) i add bin(i) to sets from F i 4 Micha l Pilipczuk Kernelization lower bounds, part 2 17/33

58 Wrapping up SC and CSC are equivalent wrt. PPTs. Micha l Pilipczuk Kernelization lower bounds, part 2 18/33

59 Wrapping up SC and CSC are equivalent wrt. PPTs. CSC does not admit a polynomial compression, unless NP conp/poly. Micha l Pilipczuk Kernelization lower bounds, part 2 18/33

60 Wrapping up SC and CSC are equivalent wrt. PPTs. CSC does not admit a polynomial compression, unless NP conp/poly. So neither does SC. Micha l Pilipczuk Kernelization lower bounds, part 2 18/33

61 Wrapping up SC and CSC are equivalent wrt. PPTs. CSC does not admit a polynomial compression, unless NP conp/poly. So neither does SC. Note: parameterization of Set Cover by F also does not admit a polynomial compression. Micha l Pilipczuk Kernelization lower bounds, part 2 18/33

62 Wrapping up SC and CSC are equivalent wrt. PPTs. CSC does not admit a polynomial compression, unless NP conp/poly. So neither does SC. Note: parameterization of Set Cover by F also does not admit a polynomial compression. The composition is quite different. Micha l Pilipczuk Kernelization lower bounds, part 2 18/33

63 Structural parameters Idea: Parameterize the problem by a quantitative measure of structure of the graph, rather than intended solution size. Micha l Pilipczuk Kernelization lower bounds, part 2 19/33

64 Structural parameters Idea: Parameterize the problem by a quantitative measure of structure of the graph, rather than intended solution size. Example: treewidth parameterizations Micha l Pilipczuk Kernelization lower bounds, part 2 19/33

65 Structural parameters Idea: Parameterize the problem by a quantitative measure of structure of the graph, rather than intended solution size. Example: treewidth parameterizations From kernelization point of view: work of Bodlaender, Jansen, and Kratsch. Micha l Pilipczuk Kernelization lower bounds, part 2 19/33

66 Structural parameters Idea: Parameterize the problem by a quantitative measure of structure of the graph, rather than intended solution size. Example: treewidth parameterizations From kernelization point of view: work of Bodlaender, Jansen, and Kratsch. Original motivation of cross-composition. Micha l Pilipczuk Kernelization lower bounds, part 2 19/33

67 Application 4: Clique par. by vertex cover Clique/VC Input: Graph G, a vertex cover X of G, integer k Parameter: X Question: Is there a clique of size k in G? Micha l Pilipczuk Kernelization lower bounds, part 2 20/33

68 Application 4: Clique par. by vertex cover Clique/VC Input: Graph G, a vertex cover X of G, integer k Parameter: X Question: Is there a clique of size k in G? W.l.o.g. k X + 1. Micha l Pilipczuk Kernelization lower bounds, part 2 20/33

69 Application 4: Clique par. by vertex cover Clique/VC Input: Graph G, a vertex cover X of G, integer k Parameter: X Question: Is there a clique of size k in G? W.l.o.g. k X + 1. Trivially FPT. Micha l Pilipczuk Kernelization lower bounds, part 2 20/33

70 Application 4: Clique par. by vertex cover Clique/VC Input: Graph G, a vertex cover X of G, integer k Parameter: X Question: Is there a clique of size k in G? W.l.o.g. k X + 1. Trivially FPT. We make a cross-composition from the standard Clique problem. Micha l Pilipczuk Kernelization lower bounds, part 2 20/33

71 Application 4: Clique par. by vertex cover Clique/VC Input: Graph G, a vertex cover X of G, integer k Parameter: X Question: Is there a clique of size k in G? W.l.o.g. k X + 1. Trivially FPT. We make a cross-composition from the standard Clique problem. Assume the same number of vertices n and the same target size of the clique k. Micha l Pilipczuk Kernelization lower bounds, part 2 20/33

72 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

73 Cross-composing into Clique/VC I t vertices Input: Instances (G i, k) Output: Instance (G, X, k ) Size constraints force us to take one vertex from I. X Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

74 Cross-composing into Clique/VC I t vertices Input: Instances (G i, k) Output: Instance (G, X, k ) Size constraints force us to take one vertex from I. Neighbourhood of i-th vertex from I acts as instance (G i, k). X Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

75 Cross-composing into Clique/VC I t vertices Input: Instances (G i, k) Output: Instance (G, X, k ) Size constraints force us to take one vertex from I. Neighbourhood of i-th vertex from I acts as instance (G i, k). X Problem: Design a universal modulator X. Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

76 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) 1... All connections are present except ones in the same row/column k n Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

77 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

78 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) all (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

79 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) all a (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

80 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

81 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

82 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

83 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

84 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) (a, b) E(G i ) all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

85 Cross-composing into Clique/VC Input: Instances (G i, k) Output: Instance (G, X, k ) (a, b) / E(G i ) all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

86 Cross-composing into Clique/VC Requested size of the clique: ( k = k + n 2) + 1 all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

87 Cross-composing into Clique/VC i-th vertex is chosen from I (a, b) / E(G i ), columns a and b cannot be chosen simultaneously all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

88 Cross-composing into Clique/VC New parameter: ( X = kn + 3 n 2) all a b (a, b) k n ( n 2) triples Micha l Pilipczuk Kernelization lower bounds, part 2 21/33

89 Conclusion of the case study Making compositions is highly non-trivial. Micha l Pilipczuk Kernelization lower bounds, part 2 22/33

90 Conclusion of the case study Making compositions is highly non-trivial. Requires good understanding of the problem. Micha l Pilipczuk Kernelization lower bounds, part 2 22/33

91 Conclusion of the case study Making compositions is highly non-trivial. Requires good understanding of the problem. Intuitively, what we exploit is choice. We need to identify it, and build a technical construction on top of it. Micha l Pilipczuk Kernelization lower bounds, part 2 22/33

92 Conclusion of the case study Making compositions is highly non-trivial. Requires good understanding of the problem. Intuitively, what we exploit is choice. We need to identify it, and build a technical construction on top of it. Often it requires a lot of gadgeteering... Micha l Pilipczuk Kernelization lower bounds, part 2 22/33

93 Conclusion of the case study Making compositions is highly non-trivial. Requires good understanding of the problem. Intuitively, what we exploit is choice. We need to identify it, and build a technical construction on top of it. Often it requires a lot of gadgeteering experience... Micha l Pilipczuk Kernelization lower bounds, part 2 22/33

94 Conclusion of the case study Making compositions is highly non-trivial. Requires good understanding of the problem. Intuitively, what we exploit is choice. We need to identify it, and build a technical construction on top of it. Often it requires a lot of gadgeteering experience tricks that I did not mention... Micha l Pilipczuk Kernelization lower bounds, part 2 22/33

95 Conclusion of the case study Making compositions is highly non-trivial. Requires good understanding of the problem. Intuitively, what we exploit is choice. We need to identify it, and build a technical construction on top of it. Often it requires a lot of gadgeteering experience tricks that I did not mention... or clever ideas. Micha l Pilipczuk Kernelization lower bounds, part 2 22/33

96 Weak compositions We have seen an O(k 2 ) kernel for Feedback Vertex Set (bitsize O(k 2 log k)). Micha l Pilipczuk Kernelization lower bounds, part 2 23/33

97 Weak compositions We have seen an O(k 2 ) kernel for Feedback Vertex Set (bitsize O(k 2 log k)). Can we prove that a subquadratic kernel is unlikely? Micha l Pilipczuk Kernelization lower bounds, part 2 23/33

98 Weak compositions We have seen an O(k 2 ) kernel for Feedback Vertex Set (bitsize O(k 2 log k)). Can we prove that a subquadratic kernel is unlikely? YES Micha l Pilipczuk Kernelization lower bounds, part 2 23/33

99 Weak compositions We have seen an O(k 2 ) kernel for Feedback Vertex Set (bitsize O(k 2 log k)). Can we prove that a subquadratic kernel is unlikely? YES Weak compositions: proving lower bounds on kernelization complexity for problems that do have polynomial kernels. Micha l Pilipczuk Kernelization lower bounds, part 2 23/33

100 Weak compositions We have seen an O(k 2 ) kernel for Feedback Vertex Set (bitsize O(k 2 log k)). Can we prove that a subquadratic kernel is unlikely? YES Weak compositions: proving lower bounds on kernelization complexity for problems that do have polynomial kernels. First results by Dell and van Melkebeek (STOC 2010), the framework here by (Dell, Marx; Hermelin, Wu; SODA 2012). Micha l Pilipczuk Kernelization lower bounds, part 2 23/33

101 Back to Fortnow and Santhanam OR-distillation of t = k 1000 instances of size k into one instance with bitsize k 7 is unlikely. Micha l Pilipczuk Kernelization lower bounds, part 2 24/33

102 Back to Fortnow and Santhanam OR-distillation of t = k 1000 instances of size k into one instance with bitsize k 7 is unlikely. Well, it should be unlikely even if we required any bitsize sublinear in t. Micha l Pilipczuk Kernelization lower bounds, part 2 24/33

103 Back to Fortnow and Santhanam OR-distillation of t = k 1000 instances of size k into one instance with bitsize k 7 is unlikely. Well, it should be unlikely even if we required any bitsize sublinear in t. If one examines the proof, then one can exclude OR-distillation into bitsize O(t 1 ɛ k c ), for any constants ɛ > 0 and c. Micha l Pilipczuk Kernelization lower bounds, part 2 24/33

104 Back to Fortnow and Santhanam OR-distillation of t = k 1000 instances of size k into one instance with bitsize k 7 is unlikely. Well, it should be unlikely even if we required any bitsize sublinear in t. If one examines the proof, then one can exclude OR-distillation into bitsize O(t 1 ɛ k c ), for any constants ɛ > 0 and c. Let s look again at the proof of the cross-composition Theorem. Micha l Pilipczuk Kernelization lower bounds, part 2 24/33

105 Cross-composition proof, recap k = max x i, log t = O(k) L Q Q compo compo compo poly(k) poly(k) poly(k) cmpr cmpr cmpr OR-R R Micha l Pilipczuk Kernelization lower bounds, part 2 25/33

106 Cross-composition proof, recap k = max x i, log t = O(k) L Q Q compo compo compo poly(k) poly(k) poly(k) cmpr K O(K d ɛ ) cmpr cmpr OR-R R Micha l Pilipczuk Kernelization lower bounds, part 2 25/33

107 Cross-composition proof, recap k = max x i, log t = O(k) L Q Q compo t O(t 1/d ) compo compo poly(k) poly(k) poly(k) cmpr K O(K d ɛ ) cmpr cmpr OR-R R Micha l Pilipczuk Kernelization lower bounds, part 2 25/33

108 Weak compositions, formally It seems that a composition with output bitsize dependence on t being O(t 1/d ) should exclude compression into bitsize O(k d ɛ ). Micha l Pilipczuk Kernelization lower bounds, part 2 26/33

109 Weak compositions, formally It seems that a composition with output bitsize dependence on t being O(t 1/d ) should exclude compression into bitsize O(k d ɛ ). Weak cross-composition An unparameterized problem Q weakly cross-composes into a parameterized problem L, if there exists a polynomial equivalence relation R, a real constant d 1, and an algorithm that, given R-equivalent strings x 1, x 2,..., x t, in time poly ( t + t i=1 x i ) produces one instance (y, k ) such that (y, k ) L iff x i Q for at least one i = 1, 2,..., t, k = t 1/d+o(1) poly (max t i=1 x i ). Micha l Pilipczuk Kernelization lower bounds, part 2 26/33

110 Weak cross-composition theorem Constant d will be called the dimension of the weak cross-composition. Micha l Pilipczuk Kernelization lower bounds, part 2 27/33

111 Weak cross-composition theorem Constant d will be called the dimension of the weak cross-composition. Weak cross-composition theorem Suppose some NP-hard problem Q admits a weak cross-composition into L with dimension d. Suppose further that L admits a polynomial compression with bitsize O(k d ɛ ), for some ɛ > 0. Then NP conp/poly. Micha l Pilipczuk Kernelization lower bounds, part 2 27/33

112 Weak cross-composition theorem Constant d will be called the dimension of the weak cross-composition. Weak cross-composition theorem Suppose some NP-hard problem Q admits a weak cross-composition into L with dimension d. Suppose further that L admits a polynomial compression with bitsize O(k d ɛ ), for some ɛ > 0. Then NP conp/poly. Note: Also called cross-composition of bounded cost by Bodlaender et al. (SIDMA, 2014). Micha l Pilipczuk Kernelization lower bounds, part 2 27/33

113 Lower bound for Vertex Cover Using weak cross-composition we now prove that Vertex Cover does not admit a kernel with bitsize O(k 2 ɛ ), for any ɛ > 0. (unless...) Micha l Pilipczuk Kernelization lower bounds, part 2 28/33

114 Lower bound for Vertex Cover Using weak cross-composition we now prove that Vertex Cover does not admit a kernel with bitsize O(k 2 ɛ ), for any ɛ > 0. (unless...) But it had a linear kernel!? Micha l Pilipczuk Kernelization lower bounds, part 2 28/33

115 Lower bound for Vertex Cover Using weak cross-composition we now prove that Vertex Cover does not admit a kernel with bitsize O(k 2 ɛ ), for any ɛ > 0. (unless...) But it had a linear kernel!? Vertex Cover has a kernel with 2k vertices, which therefore requires O(k 2 ) bits to be encoded. Micha l Pilipczuk Kernelization lower bounds, part 2 28/33

116 Lower bound for Vertex Cover Using weak cross-composition we now prove that Vertex Cover does not admit a kernel with bitsize O(k 2 ɛ ), for any ɛ > 0. (unless...) But it had a linear kernel!? Vertex Cover has a kernel with 2k vertices, which therefore requires O(k 2 ) bits to be encoded. Crux: choose an appropriate problem Q to start with. Micha l Pilipczuk Kernelization lower bounds, part 2 28/33

117 Multicolored Biclique Multicolored Biclique Input: Bipartite graph H with bipartition A B, where A = A 1... A k, B = B 1... B k. Question: Is there a biclique of size K k,k in H that contains one vertex from each A i and each B i? Micha l Pilipczuk Kernelization lower bounds, part 2 29/33

118 Multicolored Biclique Multicolored Biclique Input: Bipartite graph H with bipartition A B, where A = A 1... A k, B = B 1... B k. Question: Is there a biclique of size K k,k in H that contains one vertex from each A i and each B i? Multicolored Biclique is NP-hard even if each A i and B i has the same size. Micha l Pilipczuk Kernelization lower bounds, part 2 29/33

119 Multicolored Biclique Multicolored Biclique Input: Bipartite graph H with bipartition A B, where A = A 1... A k, B = B 1... B k. Question: Is there a biclique of size K k,k in H that contains one vertex from each A i and each B i? Multicolored Biclique is NP-hard even if each A i and B i has the same size. We provide a weak cross composition of dimension 2 from this version into Vertex Cover. Micha l Pilipczuk Kernelization lower bounds, part 2 29/33

120 Multicolored Biclique Multicolored Biclique Input: Bipartite graph H with bipartition A B, where A = A 1... A k, B = B 1... B k. Question: Is there a biclique of size K k,k in H that contains one vertex from each A i and each B i? Multicolored Biclique is NP-hard even if each A i and B i has the same size. We provide a weak cross composition of dimension 2 from this version into Vertex Cover. Assumptions: all the input instances have the same k, each color class has size n in every input instance, t = s 2. Micha l Pilipczuk Kernelization lower bounds, part 2 29/33

121 Composition Create s copies of the left side and s copies of the right side. N = s 2kn  1 1  1  1 2  2 1  2  2 2  3 1  3  3 2 ˆB 1 1 ˆB 2 ˆB 1 1 ˆB2 1 ˆB 2 ˆB 2 2 ˆB3 1 ˆB 2 ˆB 3 3 Micha l Pilipczuk Kernelization lower bounds, part 2 30/33

122 Composition Embed s 2 instances into s 2 pairs of the sides. Â 1 1 Â 1 Â 1 2 Â 2 1 Â 2 Â 2 2 Â 3 1 Â 3 Â 3 2 complement of one of the instances ˆB 1 1 ˆB 1 2 ˆB 1 ˆB 2 1 ˆB 2 2 ˆB 2 ˆB 3 1 ˆB 3 ˆB 3 2 Micha l Pilipczuk Kernelization lower bounds, part 2 30/33

123 Composition Ask for an independent set of size 2k; equivalently, a vertex cover of size N 2k. Â 1 1 Â 1 Â 1 2 Â 2 1 Â 2 Â 2 2 Â 3 1 Â 3 Â 3 2 complement of one of the instances ˆB 1 1 ˆB 1 2 ˆB 1 ˆB 2 1 ˆB 2 2 ˆB 2 ˆB 3 1 ˆB 3 ˆB 3 2 Micha l Pilipczuk Kernelization lower bounds, part 2 30/33

124 Composition Edges on the sides ensure choosing one instance and respecting colors. Edges originating in this instance ensure that the instance is solved. Â 1 1 Â 1 Â 1 2 Â 2 1 Â 2 Â 2 2 Â 3 1 Â 3 Â 3 2 complement of one of the instances ˆB 1 1 ˆB 1 2 ˆB 1 ˆB 2 1 ˆB 2 2 ˆB 2 ˆB 3 1 ˆB 3 ˆB 3 2 Micha l Pilipczuk Kernelization lower bounds, part 2 30/33

125 Wrapping up Parameter in the output instance is N 2k = t 1/2 2kn 2k, which means that the weak composition has dimension 2. Micha l Pilipczuk Kernelization lower bounds, part 2 31/33

126 Wrapping up Parameter in the output instance is N 2k = t 1/2 2kn 2k, which means that the weak composition has dimension 2. Hence, there is no kernel with O(k 2 ɛ ) bits for VC. Micha l Pilipczuk Kernelization lower bounds, part 2 31/33

127 Wrapping up Parameter in the output instance is N 2k = t 1/2 2kn 2k, which means that the weak composition has dimension 2. Hence, there is no kernel with O(k 2 ɛ ) bits for VC. Reduction from VC to FVS: add a degree-2 vertex to every edge, thus creating a triangle. Micha l Pilipczuk Kernelization lower bounds, part 2 31/33

128 Wrapping up Parameter in the output instance is N 2k = t 1/2 2kn 2k, which means that the weak composition has dimension 2. Hence, there is no kernel with O(k 2 ɛ ) bits for VC. Reduction from VC to FVS: add a degree-2 vertex to every edge, thus creating a triangle. Hence also FVS does not admit a O(k 2 ɛ ) kernel. Micha l Pilipczuk Kernelization lower bounds, part 2 31/33

129 Wrapping up Parameter in the output instance is N 2k = t 1/2 2kn 2k, which means that the weak composition has dimension 2. Hence, there is no kernel with O(k 2 ɛ ) bits for VC. Reduction from VC to FVS: add a degree-2 vertex to every edge, thus creating a triangle. Hence also FVS does not admit a O(k 2 ɛ ) kernel. For more O(k d ɛ ) lower bounds, see the book. Micha l Pilipczuk Kernelization lower bounds, part 2 31/33

130 Further perspectives Compression vs. Kernelization Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

131 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

132 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Is compositionality the only reason why polynomial kernelization is infeasible? Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

133 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Is compositionality the only reason why polynomial kernelization is infeasible? Can we find a sensible problem where kernelization and compression are provable different? Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

134 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Is compositionality the only reason why polynomial kernelization is infeasible? Can we find a sensible problem where kernelization and compression are provable different? Completeness theory for kernelization. Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

135 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Is compositionality the only reason why polynomial kernelization is infeasible? Can we find a sensible problem where kernelization and compression are provable different? Completeness theory for kernelization. Hermelin, Kratsch, So ltys, Wahlström, Wu; IPEC Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

136 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Is compositionality the only reason why polynomial kernelization is infeasible? Can we find a sensible problem where kernelization and compression are provable different? Completeness theory for kernelization. Hermelin, Kratsch, So ltys, Wahlström, Wu; IPEC Turing kernelization Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

137 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Is compositionality the only reason why polynomial kernelization is infeasible? Can we find a sensible problem where kernelization and compression are provable different? Completeness theory for kernelization. Hermelin, Kratsch, So ltys, Wahlström, Wu; IPEC Turing kernelization Turing kernel is a polynomial-time algorithm with an access to an oracle that resolves kernels. Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

138 Further perspectives Compression vs. Kernelization VC has kernel with O(k) vertices and O(k 2 ) edges. What about FVS? Is compositionality the only reason why polynomial kernelization is infeasible? Can we find a sensible problem where kernelization and compression are provable different? Completeness theory for kernelization. Hermelin, Kratsch, So ltys, Wahlström, Wu; IPEC Turing kernelization Turing kernel is a polynomial-time algorithm with an access to an oracle that resolves kernels. How to show infeasibility of Turing kernelization? Micha l Pilipczuk Kernelization lower bounds, part 2 32/33

139 Exercises Exercise 15.4, all the remaining points. Exercises 15.1 and Tikz faces based on a code by Raoul Kessels, under Creative Commons Attribution 2.5 license (CC BY 2.5) Micha l Pilipczuk Kernelization lower bounds, part 2 33/33

Kernelization Lower Bounds: A Brief History

Kernelization Lower Bounds: A Brief History Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi

More information

On the hardness of losing width

On the hardness of losing width On the hardness of losing width Marek Cygan 1, Daniel Lokshtanov 2, Marcin Pilipczuk 1, Micha l Pilipczuk 1, and Saket Saurabh 3 1 Institute of Informatics, University of Warsaw, Poland {cygan@,malcin@,mp248287@students}mimuwedupl

More information

On the hardness of losing width

On the hardness of losing width On the hardness of losing width Marek Cygan 1, Daniel Lokshtanov 2, Marcin Pilipczuk 1, Micha l Pilipczuk 1, and Saket Saurabh 3 1 Institute of Informatics, University of Warsaw, Poland {cygan@,malcin@,mp248287@students}mimuwedupl

More information

FPT is Characterized by Useful Obstruction Sets

FPT is Characterized by Useful Obstruction Sets FPT is Characterized by Useful Obstruction Sets Bart M. P. Jansen Joint work with Michael R. Fellows, Charles Darwin Univ. June 21st 2013, WG 2013, Lübeck A NEW CHARACTERIZATION OF FPT 2 Well-Quasi-Orders

More information

Two Edge Modification Problems Without Polynomial Kernels

Two Edge Modification Problems Without Polynomial Kernels Two Edge Modification Problems Without Polynomial Kernels Stefan Kratsch and Magnus Wahlström Max-Planck-Institut für Informatik, 66123 Saarbrücken, Germany Abstract. Given a graph G and an integer k,

More information

Parameterized Algorithms for Max Colorable Induced Subgraph problem on Perfect Graphs

Parameterized Algorithms for Max Colorable Induced Subgraph problem on Perfect Graphs Parameterized Algorithms for Max Colorable Induced Subgraph problem on Perfect Graphs Neeldhara Misra 1, Fahad Panolan 2, Ashutosh Rai 2, Venkatesh Raman 2, and Saket Saurabh 2 1 Indian Institute of Science,

More information

Preprocessing of Min Ones Problems: A Dichotomy

Preprocessing of Min Ones Problems: A Dichotomy Preprocessing of Min Ones Problems: A Dichotomy Stefan Kratsch and Magnus Wahlström Max-Planck-Institut für Informatik, Saarbrücken, Germany {skratsch,wahl}@mpi-inf.mpg.de Abstract. Min Ones Constraint

More information

Kernelization by matroids: Odd Cycle Transversal

Kernelization by matroids: Odd Cycle Transversal Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the

More information

Polynomial kernels for constant-factor approximable problems

Polynomial kernels for constant-factor approximable problems 1 Polynomial kernels for constant-factor approximable problems Stefan Kratsch November 11, 2010 2 What do these problems have in common? Cluster Edge Deletion, Cluster Edge Editing, Edge Dominating Set,

More information

Theory of Computation Chapter 9

Theory of Computation Chapter 9 0-0 Theory of Computation Chapter 9 Guan-Shieng Huang May 12, 2003 NP-completeness Problems NP: the class of languages decided by nondeterministic Turing machine in polynomial time NP-completeness: Cook

More information

Lecture 59 : Instance Compression and Succinct PCP s for NP

Lecture 59 : Instance Compression and Succinct PCP s for NP IITM-CS6840: Advanced Complexity Theory March 31, 2012 Lecture 59 : Instance Compression and Succinct PCP s for NP Lecturer: Sivaramakrishnan N.R. Scribe: Prashant Vasudevan 1 Introduction Classical Complexity

More information

Efficient Approximation for Restricted Biclique Cover Problems

Efficient Approximation for Restricted Biclique Cover Problems algorithms Article Efficient Approximation for Restricted Biclique Cover Problems Alessandro Epasto 1, *, and Eli Upfal 2 ID 1 Google Research, New York, NY 10011, USA 2 Department of Computer Science,

More information

1a. Introduction COMP6741: Parameterized and Exact Computation

1a. Introduction COMP6741: Parameterized and Exact Computation 1a. Introduction COMP6741: Parameterized and Exact Computation Serge Gaspers 12 1 School of Computer Science and Engineering, UNSW Sydney, Asutralia 2 Decision Sciences Group, Data61, CSIRO, Australia

More information

Instance Compression for the Polynomial Hierarchy and Beyond

Instance Compression for the Polynomial Hierarchy and Beyond Instance Compression for the Polynomial Hierarchy and Beyond Chiranjit Chakraborty Rahul Santhanam School of Informatics, University of Edinburgh, UK Abstract. We define instance compressibility ([1],

More information

Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses

Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses Holger Dell Humboldt University of Berlin, Germany dell@informatik.hu-berlin.de Dieter van Melkebeek University

More information

CS 583: Algorithms. NP Completeness Ch 34. Intractability

CS 583: Algorithms. NP Completeness Ch 34. Intractability CS 583: Algorithms NP Completeness Ch 34 Intractability Some problems are intractable: as they grow large, we are unable to solve them in reasonable time What constitutes reasonable time? Standard working

More information

Parameterized Algorithms and Kernels for 3-Hitting Set with Parity Constraints

Parameterized Algorithms and Kernels for 3-Hitting Set with Parity Constraints Parameterized Algorithms and Kernels for 3-Hitting Set with Parity Constraints Vikram Kamat 1 and Neeldhara Misra 2 1 University of Warsaw vkamat@mimuw.edu.pl 2 Indian Institute of Science, Bangalore neeldhara@csa.iisc.ernet.in

More information

More NP-Complete Problems

More NP-Complete Problems CS 473: Algorithms, Spring 2018 More NP-Complete Problems Lecture 23 April 17, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 57 Recap NP: languages/problems that have

More information

Parameterized Domination in Circle Graphs

Parameterized Domination in Circle Graphs Parameterized Domination in Circle Graphs Nicolas Bousquet 1, Daniel Gonçalves 1, George B. Mertzios 2, Christophe Paul 1, Ignasi Sau 1, and Stéphan Thomassé 3 1 AlGCo project-team, CNRS, LIRMM, Montpellier,

More information

Some hard families of parameterised counting problems

Some hard families of parameterised counting problems Some hard families of parameterised counting problems Mark Jerrum and Kitty Meeks School of Mathematical Sciences, Queen Mary University of London {m.jerrum,k.meeks}@qmul.ac.uk September 2014 Abstract

More information

AND-compression of NP-complete problems: Streamlined proof and minor observations

AND-compression of NP-complete problems: Streamlined proof and minor observations AND-compression of NP-complete problems: Streamlined proof and minor observations Holger Dell Saarland University, Cluster of Excellence MMCI), Simons Institute for the Theory of Computing, and UC Berkeley

More information

More Completeness, conp, FNP,etc. CS254 Chris Pollett Oct 30, 2006.

More Completeness, conp, FNP,etc. CS254 Chris Pollett Oct 30, 2006. More Completeness, conp, FNP,etc. CS254 Chris Pollett Oct 30, 2006. Outline A last complete problem for NP conp, conp NP Function problems MAX-CUT A cut in a graph G=(V,E) is a set of nodes S used to partition

More information

Lecture 20: conp and Friends, Oracles in Complexity Theory

Lecture 20: conp and Friends, Oracles in Complexity Theory 6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 26 Computational Intractability Polynomial Time Reductions Sofya Raskhodnikova S. Raskhodnikova; based on slides by A. Smith and K. Wayne L26.1 What algorithms are

More information

Limitations of Efficient Reducibility to the Kolmogorov Random Strings

Limitations of Efficient Reducibility to the Kolmogorov Random Strings Limitations of Efficient Reducibility to the Kolmogorov Random Strings John M. HITCHCOCK 1 Department of Computer Science, University of Wyoming Abstract. We show the following results for polynomial-time

More information

Tree-width and algorithms

Tree-width and algorithms Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding

More information

NP-Hardness reductions

NP-Hardness reductions NP-Hardness reductions Definition: P is the class of problems that can be solved in polynomial time, that is n c for a constant c Roughly, if a problem is in P then it's easy, and if it's not in P then

More information

Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses

Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses Electronic Colloquium on Computational Complexity, Report No. 38 (2010) Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses Holger Dell Humboldt University

More information

Approximation Algorithms for the k-set Packing Problem

Approximation Algorithms for the k-set Packing Problem Approximation Algorithms for the k-set Packing Problem Marek Cygan Institute of Informatics University of Warsaw 20th October 2016, Warszawa Marek Cygan Approximation Algorithms for the k-set Packing Problem

More information

arxiv: v1 [cs.ds] 2 Oct 2018

arxiv: v1 [cs.ds] 2 Oct 2018 Contracting to a Longest Path in H-Free Graphs Walter Kern 1 and Daniël Paulusma 2 1 Department of Applied Mathematics, University of Twente, The Netherlands w.kern@twente.nl 2 Department of Computer Science,

More information

arxiv: v2 [cs.dm] 12 Jul 2014

arxiv: v2 [cs.dm] 12 Jul 2014 Interval Scheduling and Colorful Independent Sets arxiv:1402.0851v2 [cs.dm] 12 Jul 2014 René van Bevern 1, Matthias Mnich 2, Rolf Niedermeier 1, and Mathias Weller 3 1 Institut für Softwaretechnik und

More information

Journal of Computer and System Sciences

Journal of Computer and System Sciences Journal of Computer and System Sciences 77 (2011) 91 106 Contents lists available at ScienceDirect Journal of Computer and System Sciences www.elsevier.com/locate/jcss Infeasibility of instance compression

More information

Lecture 4: NP and computational intractability

Lecture 4: NP and computational intractability Chapter 4 Lecture 4: NP and computational intractability Listen to: Find the longest path, Daniel Barret What do we do today: polynomial time reduction NP, co-np and NP complete problems some examples

More information

Practical FPT and Foundations of Kernelization. Rod Downey Victoria University Wellington

Practical FPT and Foundations of Kernelization. Rod Downey Victoria University Wellington Practical FPT and Foundations of Kernelization Rod Downey Victoria University Wellington Joint work with Hans Bodlaender, Mike Fellows, and Danny Hermelin THIS LECTURE: Basic Definitions Classical Motivations

More information

Cleaning Interval Graphs

Cleaning Interval Graphs Cleaning Interval Graphs Dániel Marx and Ildikó Schlotter Department of Computer Science and Information Theory, Budapest University of Technology and Economics, H-1521 Budapest, Hungary. {dmarx,ildi}@cs.bme.hu

More information

CSC 373: Algorithm Design and Analysis Lecture 15

CSC 373: Algorithm Design and Analysis Lecture 15 CSC 373: Algorithm Design and Analysis Lecture 15 Allan Borodin February 13, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 21 Announcements and Outline Announcements

More information

ITCS:CCT09 : Computational Complexity Theory Apr 8, Lecture 7

ITCS:CCT09 : Computational Complexity Theory Apr 8, Lecture 7 ITCS:CCT09 : Computational Complexity Theory Apr 8, 2009 Lecturer: Jayalal Sarma M.N. Lecture 7 Scribe: Shiteng Chen In this lecture, we will discuss one of the basic concepts in complexity theory; namely

More information

Algorithms and Theory of Computation. Lecture 22: NP-Completeness (2)

Algorithms and Theory of Computation. Lecture 22: NP-Completeness (2) Algorithms and Theory of Computation Lecture 22: NP-Completeness (2) Xiaohui Bei MAS 714 November 8, 2018 Nanyang Technological University MAS 714 November 8, 2018 1 / 20 Set Cover Set Cover Input: a set

More information

On the Space Complexity of Parameterized Problems

On the Space Complexity of Parameterized Problems On the Space Complexity of Parameterized Problems Michael Elberfeld Christoph Stockhusen Till Tantau Institute for Theoretical Computer Science Universität zu Lübeck D-23538 Lübeck, Germany {elberfeld,stockhus,tantau}@tcs.uni-luebeck.de

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Design and Analysis of Algorithms CSE 5311 Lecture 25 NP Completeness Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms 1 NP-Completeness Some

More information

Geometric Steiner Trees

Geometric Steiner Trees Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015

More information

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single

More information

BBM402-Lecture 11: The Class NP

BBM402-Lecture 11: The Class NP BBM402-Lecture 11: The Class NP Lecturer: Lale Özkahya Resources for the presentation: http://ocw.mit.edu/courses/electrical-engineering-andcomputer-science/6-045j-automata-computability-andcomplexity-spring-2011/syllabus/

More information

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V. Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains

More information

Intro to Theory of Computation

Intro to Theory of Computation Intro to Theory of Computation LECTURE 25 Last time Class NP Today Polynomial-time reductions Adam Smith; Sofya Raskhodnikova 4/18/2016 L25.1 The classes P and NP P is the class of languages decidable

More information

Classes of Problems. CS 461, Lecture 23. NP-Hard. Today s Outline. We can characterize many problems into three classes:

Classes of Problems. CS 461, Lecture 23. NP-Hard. Today s Outline. We can characterize many problems into three classes: Classes of Problems We can characterize many problems into three classes: CS 461, Lecture 23 Jared Saia University of New Mexico P is the set of yes/no problems that can be solved in polynomial time. Intuitively

More information

arxiv: v1 [cs.ds] 18 Sep 2015

arxiv: v1 [cs.ds] 18 Sep 2015 Finding Two Edge-Disjoint Paths with Length Constraints Leizhen CAI and Junjie YE arxiv:1509.05559v1 [cs.ds] 18 Sep 2015 Department of Computer Science and Engineering, The Chinese University of Hong Kong,

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

CS154, Lecture 17: conp, Oracles again, Space Complexity

CS154, Lecture 17: conp, Oracles again, Space Complexity CS154, Lecture 17: conp, Oracles again, Space Complexity Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode: Guess string

More information

Parameterized Complexity

Parameterized Complexity Parameterized Complexity Stefan Szeider Vienna University of Technology, Austria SAT-SMT Summer School 2013 Espoo, Finland 1 / 97 Outline Foundations Backdoors Kernelization Decompositions Local Search

More information

An Improved Algorithm for Parameterized Edge Dominating Set Problem

An Improved Algorithm for Parameterized Edge Dominating Set Problem An Improved Algorithm for Parameterized Edge Dominating Set Problem Ken Iwaide and Hiroshi Nagamochi Department of Applied Mathematics and Physics, Graduate School of Informatics, Kyoto University, Japan,

More information

Non-Approximability Results (2 nd part) 1/19

Non-Approximability Results (2 nd part) 1/19 Non-Approximability Results (2 nd part) 1/19 Summary - The PCP theorem - Application: Non-approximability of MAXIMUM 3-SAT 2/19 Non deterministic TM - A TM where it is possible to associate more than one

More information

Parameterised Subgraph Counting Problems

Parameterised Subgraph Counting Problems Parameterised Subgraph Counting Problems Kitty Meeks University of Glasgow University of Strathclyde, 27th May 2015 Joint work with Mark Jerrum (QMUL) What is a counting problem? Decision problems Given

More information

Lecture 19: Finish NP-Completeness, conp and Friends

Lecture 19: Finish NP-Completeness, conp and Friends 6.045 Lecture 19: Finish NP-Completeness, conp and Friends 1 Polynomial Time Reducibility f : Σ* Σ* is a polynomial time computable function if there is a poly-time Turing machine M that on every input

More information

Hardness of Approximation

Hardness of Approximation Hardness of Approximation We have seen several methods to find approximation algorithms for NP-hard problems We have also seen a couple of examples where we could show lower bounds on the achievable approxmation

More information

Theory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death

Theory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death Theory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death Nathan Brunelle Department of Computer Science University of Virginia www.cs.virginia.edu/~njb2b/theory

More information

SAT, NP, NP-Completeness

SAT, NP, NP-Completeness CS 473: Algorithms, Spring 2018 SAT, NP, NP-Completeness Lecture 22 April 13, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 57 Part I Reductions Continued Ruta (UIUC)

More information

CS21 Decidability and Tractability

CS21 Decidability and Tractability CS21 Decidability and Tractability Lecture 20 February 23, 2018 February 23, 2018 CS21 Lecture 20 1 Outline the complexity class NP NP-complete probelems: Subset Sum NP-complete problems: NAE-3-SAT, max

More information

Parameterized Two-Player Nash Equilibrium

Parameterized Two-Player Nash Equilibrium Parameterized Two-Player Nash Equilibrium Danny Hermelin, Chien-Chung Huang, Stefan Kratsch, and Magnus Wahlström Max-Planck-Institute for Informatics, Saarbrücken, Germany {hermelin,villars,skratsch,wahl}@mpi-inf.mpg.de

More information

Interval Scheduling and Colorful Independent Sets

Interval Scheduling and Colorful Independent Sets Interval Scheduling and Colorful Independent Sets René van Bevern 1,, Matthias Mnich 2, Rolf Niedermeier 1, and Mathias Weller 1, 1 Institut für Softwaretechnik und Theoretische Informatik, TU Berlin,

More information

Kernel-Size Lower Bounds. The Evidence from Complexity Theory

Kernel-Size Lower Bounds. The Evidence from Complexity Theory : The Evidence from Complexity Theory IAS Worker 2013, Warsaw Part 2/3 Note These slides are a slightly revised version of a 3-part tutorial given at the 2013 Workshop on Kernelization ( Worker ) at the

More information

CS21 Decidability and Tractability

CS21 Decidability and Tractability CS21 Decidability and Tractability Lecture 18 February 16, 2018 February 16, 2018 CS21 Lecture 18 1 Outline the complexity class NP 3-SAT is NP-complete NP-complete problems: independent set, vertex cover,

More information

More on NP and Reductions

More on NP and Reductions Indian Institute of Information Technology Design and Manufacturing, Kancheepuram Chennai 600 127, India An Autonomous Institute under MHRD, Govt of India http://www.iiitdm.ac.in COM 501 Advanced Data

More information

Finding Two Edge-Disjoint Paths with Length Constraints

Finding Two Edge-Disjoint Paths with Length Constraints Finding Two Edge-Disjoint Paths with Length Constraints Leizhen Cai and Junjie Ye (B) Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong SAR, China {lcai,jjye}@cse.cuhk.edu.hk

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

Finding Connected Secluded Subgraphs *

Finding Connected Secluded Subgraphs * Finding Connected Secluded Subgraphs * Petr A. Golovach 1, Pinar Heggernes 1, Paloma T. Lima 1, and Pedro Montealegre 2 1 Department of Informatics, University of Bergen, Norway, {petr.golovach,pinar.heggernes,paloma.lima}@ii.uib.no

More information

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph

More information

Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth

Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Finding Paths with Minimum Shared Edges in Graphs with Bounded Treewidth Z.-Q. Ye 1, Y.-M. Li 2, H.-Q. Lu 3 and X. Zhou 4 1 Zhejiang University, Hanzhou, Zhejiang, China 2 Wenzhou University, Wenzhou,

More information

Theory of Computation Time Complexity

Theory of Computation Time Complexity Theory of Computation Time Complexity Bow-Yaw Wang Academia Sinica Spring 2012 Bow-Yaw Wang (Academia Sinica) Time Complexity Spring 2012 1 / 59 Time for Deciding a Language Let us consider A = {0 n 1

More information

6.045 Final Exam Solutions

6.045 Final Exam Solutions 6.045J/18.400J: Automata, Computability and Complexity Prof. Nancy Lynch, Nati Srebro 6.045 Final Exam Solutions May 18, 2004 Susan Hohenberger Name: Please write your name on each page. This exam is open

More information

JASS 06 Report Summary. Circuit Complexity. Konstantin S. Ushakov. May 14, 2006

JASS 06 Report Summary. Circuit Complexity. Konstantin S. Ushakov. May 14, 2006 JASS 06 Report Summary Circuit Complexity Konstantin S. Ushakov May 14, 2006 Abstract Computer science deals with many computational models. In real life we have normal computers that are constructed using,

More information

8. INTRACTABILITY I. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley. Last updated on 2/6/18 2:16 AM

8. INTRACTABILITY I. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley. Last updated on 2/6/18 2:16 AM 8. INTRACTABILITY I poly-time reductions packing and covering problems constraint satisfaction problems sequencing problems partitioning problems graph coloring numerical problems Lecture slides by Kevin

More information

List H-Coloring a Graph by Removing Few Vertices

List H-Coloring a Graph by Removing Few Vertices List H-Coloring a Graph by Removing Few Vertices Rajesh Chitnis 1, László Egri 2, and Dániel Marx 2 1 Department of Computer Science, University of Maryland at College Park, USA, rchitnis@cs.umd.edu 2

More information

Parameterized Complexity of the Sparsest k-subgraph Problem in Chordal Graphs

Parameterized Complexity of the Sparsest k-subgraph Problem in Chordal Graphs Parameterized Complexity of the Sparsest k-subgraph Problem in Chordal Graphs Marin Bougeret, Nicolas Bousquet, Rodolphe Giroudeau, and Rémi Watrigant LIRMM, Université Montpellier, France Abstract. In

More information

COMP Analysis of Algorithms & Data Structures

COMP Analysis of Algorithms & Data Structures COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial

More information

Kernelization and Sparseness: the case of Dominating Set

Kernelization and Sparseness: the case of Dominating Set Kernelization and Sparseness: the case of Dominating Set Pål Grønås Drange Markus S. Dregi Fedor V. Fomin Stephan Kreutzer Daniel Lokshtanov Marcin Pilipczuk Micha l Pilipczuk Felix Reidl Fernando Sánchez

More information

New Limits to Classical and Quantum Instance Compression

New Limits to Classical and Quantum Instance Compression New Limits to Classical and Quantum Instance Compression (Preliminary version) Andrew Drucker April 13, 2012 Last updated: August 21, 2012 Abstract Given an instance of a hard decision problem, a limited

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170 UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability

More information

CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1

CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1 CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY E. Amaldi Foundations of Operations Research Politecnico di Milano 1 Goal: Evaluate the computational requirements (this course s focus: time) to solve

More information

Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems

Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems Proc. 4th TAMC, 27 Approximability and Parameterized Complexity of Consecutive Ones Submatrix Problems Michael Dom, Jiong Guo, and Rolf Niedermeier Institut für Informatik, Friedrich-Schiller-Universität

More information

arxiv: v2 [cs.cc] 28 Feb 2018

arxiv: v2 [cs.cc] 28 Feb 2018 On the Maximum Colorful Arborescence Problem and Color Hierarchy Graph Structure arxiv:1710.07584v2 [cs.cc] 28 Feb 2018 Guillaume Fertin LS2N UMR CNRS 6004, Université de Nantes, Nantes, France guillaume.fertin@univ-nantes.fr

More information

Subquadratic Kernels for Implicit 3-Hitting Set and 3-Set Packing Problems

Subquadratic Kernels for Implicit 3-Hitting Set and 3-Set Packing Problems Subquadratic Kernels for Implicit 3-Hitting Set and 3-Set Packing Problems Tien-Nam Le Daniel Lokshtanov Saket Saurabh Stéphan Thomassé Meirav Zehavi Abstract We consider four well-studied NP-complete

More information

NP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof

NP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof T-79.5103 / Autumn 2006 NP-complete problems 1 NP-COMPLETE PROBLEMS Characterizing NP Variants of satisfiability Graph-theoretic problems Coloring problems Sets and numbers Pseudopolynomial algorithms

More information

CMPT307: Complexity Classes: P and N P Week 13-1

CMPT307: Complexity Classes: P and N P Week 13-1 CMPT307: Complexity Classes: P and N P Week 13-1 Xian Qiu Simon Fraser University xianq@sfu.ca Strings and Languages an alphabet Σ is a finite set of symbols {0, 1}, {T, F}, {a, b,..., z}, N a string x

More information

Polynomial-Time Reductions

Polynomial-Time Reductions Reductions 1 Polynomial-Time Reductions Classify Problems According to Computational Requirements Q. Which problems will we be able to solve in practice? A working definition. [von Neumann 1953, Godel

More information

ACO Comprehensive Exam October 18 and 19, Analysis of Algorithms

ACO Comprehensive Exam October 18 and 19, Analysis of Algorithms Consider the following two graph problems: 1. Analysis of Algorithms Graph coloring: Given a graph G = (V,E) and an integer c 0, a c-coloring is a function f : V {1,,...,c} such that f(u) f(v) for all

More information

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University

More information

NP-Complete Reductions 2

NP-Complete Reductions 2 x 1 x 1 x 2 x 2 x 3 x 3 x 4 x 4 12 22 32 CS 447 11 13 21 23 31 33 Algorithms NP-Complete Reductions 2 Prof. Gregory Provan Department of Computer Science University College Cork 1 Lecture Outline NP-Complete

More information

arxiv: v1 [cs.ds] 25 Sep 2016

arxiv: v1 [cs.ds] 25 Sep 2016 Linear kernels for edge deletion problems to immersion-closed graph classes Archontia C. Giannopoulou a,b Micha l Pilipczuk c,d Jean-Florent Raymond c,e,f Dimitrios M. Thilikos e,g Marcin Wrochna c,d arxiv:1609.07780v1

More information

Single parameter FPT-algorithms for non-trivial games

Single parameter FPT-algorithms for non-trivial games Single parameter FPT-algorithms for non-trivial games Author Estivill-Castro, Vladimir, Parsa, Mahdi Published 2011 Journal Title Lecture Notes in Computer science DOI https://doi.org/10.1007/978-3-642-19222-7_13

More information

On the optimal compression of sets in P, NP, P/poly, PSPACE/poly

On the optimal compression of sets in P, NP, P/poly, PSPACE/poly On the optimal compression of sets in P, NP, P/poly, PSPACE/poly Marius Zimand Towson University CCR 2012- Cambridge Marius Zimand (Towson U.) Compression P, NP, P/poly sets 2011 1 / 19 The language compression

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

Chapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013

Chapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013 Chapter 2 Reductions and NP CS 573: Algorithms, Fall 2013 August 29, 2013 2.1 Reductions Continued 2.1.1 The Satisfiability Problem SAT 2.1.1.1 Propositional Formulas Definition 2.1.1. Consider a set of

More information

Advanced topic: Space complexity

Advanced topic: Space complexity Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to

More information

Chain Minors are FPT. B Marcin Kamiński. 1 Introduction. Jarosław Błasiok 1 Marcin Kamiński 1

Chain Minors are FPT. B Marcin Kamiński. 1 Introduction. Jarosław Błasiok 1 Marcin Kamiński 1 Algorithmica (2017) 79:698 707 DOI 10.1007/s00453-016-0220-1 Chain Minors are FPT Jarosław Błasiok 1 Marcin Kamiński 1 Received: 21 March 2014 / Accepted: 21 September 2016 / Published online: 20 October

More information

A Cubic-Vertex Kernel for Flip Consensus Tree

A Cubic-Vertex Kernel for Flip Consensus Tree To appear in Algorithmica A Cubic-Vertex Kernel for Flip Consensus Tree Christian Komusiewicz Johannes Uhlmann Received: date / Accepted: date Abstract Given a bipartite graph G = (V c, V t, E) and a nonnegative

More information

Lecture Notes 4. Issued 8 March 2018

Lecture Notes 4. Issued 8 March 2018 CM30073 Advanced Algorithms and Complexity 1. Structure of the class NP Lecture Notes 4 Issued 8 March 2018 Recall that it is not known whether or not P = NP, the widely accepted hypothesis being that

More information

15-855: Intensive Intro to Complexity Theory Spring Lecture 7: The Permanent, Toda s Theorem, XXX

15-855: Intensive Intro to Complexity Theory Spring Lecture 7: The Permanent, Toda s Theorem, XXX 15-855: Intensive Intro to Complexity Theory Spring 2009 Lecture 7: The Permanent, Toda s Theorem, XXX 1 #P and Permanent Recall the class of counting problems, #P, introduced last lecture. It was introduced

More information