Chapter 6* The PPSZ Algorithm

Size: px
Start display at page:

Download "Chapter 6* The PPSZ Algorithm"

Transcription

1 Chapter 6* The PPSZ Algorithm In this chapter we present an improvement of the pp algorithm. As pp is called after its inventors, Paturi, Pudlak, and Zane [PPZ99], the improved version, pps, is called after Paturi, Pudlak, Saks, and Zane [PPSZ5]. The idea behind the improvement is ver beautiful and simple; its analsis is challenging, but ver elegant uses a variet of interesting concepts. In this chapter, we anale the algorithm for the case that the input formula has a unique satisfing assignment. This analsis is from [PPSZ5]. If there are multiple satisfing assignments, the analsis surprisingl becomes much more dicult. In fact, it has been open for thirteen ears whether one generalie the analsis for the unique case to the general case { without getting a worse running time. This was achieved in 211 b Timon Hertli [Her11]. The basic idea of the pp-algorithm is ver simple: Given a CNF formula F, choose a variable 2 vbl(f) uniforml at random. If {} 2 F or {} 2 F, set the obvious wa. Otherwise, set randoml. Then iterate. The analsis of this simple algorithm shows surprising connections to encodings of satisfing assignments and lower bounds on depth-3 boolean circuits. From an algorithmic point of view, here is a simple idea for improvement: Instead of checking whether {} 2 F or {} 2 F, check whether or can be derived from F in some wa. Of course, checking this is again NPcomplete and no big help. However, we can check whether or follows from F in some simple, polnomial-time checkable wa. Indeed, {} being a unit clause in F is probabl the simplest wa how can follow from F. Definition 6*.1 Let F be a CNF formula, let D 2 N, and let u be a literal. We sa that F implies u if an assignment α satisfing F also satises 1

2 2 CHAPTER 6*. THE PPSZ ALGORITHM u. We sa F D-implies u if there is some G F with G D that implies u. In this terminolog, in the pp-algorithm we check whether is 1- implied in F. The pps-algorithm applies an obvious improvement: Check whether is D-implied for some (large) constant D. This can be done in polnomial time. Simple as this sounds, the analsis of this algorithm turns out to be quite sophisticated. To state the pps-algorithm formall, we think of it choosing a random permutation π of vbl(f) and an assignment β 2 {, 1} n in advance and then processing the variables according to π and assigning them values according to β, unless the turn out to be D-implied. F a 3-CNF formula, π = ( 1,..., n ), a permutation on vbl(f), β 2 {, 1} n, D 2 N. Postcondition: returns a satisfing assignment or failure function pps(f, π, β, D) α the empt assignment ; F 1 F; for i 1 to vbl(f) do if F i D-implies i then α() 1; elseif F i D-implies i then α() ; else α() β(); F i+1 F [7 α()] i ; if α satises F then return α; else return failure; When does this algorithm succeed in nding a satisfing assignment? For this need the concept of forced and guessed variables. Definition 6*.2 Let F be a CNF formula over n variables, α 2 {, 1} n a satisfing assignment, and π = ( 1,..., n ) a permutation of vbl(f), and D. A variable i is called forced (with respect to F, α, π, and D) if F [ 1 7 α( 1),..., i 1 7 α( i 1 )] D-implies i or i. Otherwise the variable is called guessed. We denote the set of forced (guessed) variables b Forced(F, α, π, D) (Guessed(F, α, π, D)). When F, α, π and D are understood from the contet, we drop these parameters and just write Forced and Guessed.

3 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 3 Observation 6*.3 Let F be a CNF formula and α be a satisfing assignment. Then pps(f, π, β, D) returns α if and onl if α() = β() for all 2 Guessed(F, α, π, D). 6*.1 Having a Unique Satisfing Assignment In this section we anale the special case that F has a unique satisfing assignment α. This case is easier to anale and at the same time we can introduce all the concepts we will need for the general case. Without loss of generalit, assume α = (1,..., 1) sets all variables to 1. B the above observation, pps returns α if and onl if β agrees with α on all variables from Guessed(F, α, π, D). This set is a random object, since it depends on π, which is a random permutation. Pr β,π [pps returns α] = E π h 2 Guessed(F,α,π,D) This epression is rather dicult to work with. It would be easier to bound E [ Guessed(F, α, π, D) ], for eample. Luckil, we have Jensen's inequalit, which in this case states that for a random variable X, it holds that E h 2 Xi 2 E[X], (6*.1) since the function 7 2 is a conve function. With this, we obtain Pr [pps returns α] β,π 2 Eπ[ Guessed(F,α,π,D) ] (6*.2) The right-hand side here is a much nicer epression, since b linearit of epectation it equals the sum of the probabilities 6*.1.1 Building a Tree Pr[ 2 Guessed(F, α, π, D)]. (6*.3) We will now tr to bound Pr[ 2 Guessed(F, α, π, D)] from above. In this section, we conne ourselves to k-cnf formulas F having a unique satisfing assignment, which we assume to be α = (1,..., 1). Fi some 2 vbl(f). We construct a binar tree T, called the critical clause tree of that in some wa represents the multiple was can become D-implied in pps. i

4 4 CHAPTER 6*. THE PPSZ ALGORITHM Definition 6*.4 Let F be a ( k)-cnf formula. A clause tree T is a tree with the following properties: Ever node has at most k 1 children. Ever node u 2 V(T) is labeled with a variable from vbl(()f), which we denote b var-label(u), and additionall with a clause C 2 F, denoted b clause-label(u). If u is a proper ancestor of v, then var-label(u) 6= var-label(v). We will dene a clause tree T for each 2 vbl(f). See Figures 6*.1{ 6*.5 for an illustration. 1. Start with T consisting of a single root. This root has variable label, and does not have a clause label et. 2. As long as there is a leaf u 2 V(T) that does not et have a clause label, do the following: (a) Dene U := {var-label(v) v 2 V(T) is an ancestor of u in T}, where ancestor includes u itself and the root. (b) Dene the assignment β as β : vbl(f) {, 1}, 7 { if 2 U, 1 otherwise. (c) Let C 2 F be a clause not satised b β. Since β 6= α and α is the unique satisfing assignment, such a clause eists. Set clause-label(u) := C. (d) For each negative literal 2 C, create a new leaf, label it with, and attach it to u as a child. The new leaf does not et have a clause label. Note that ever clause in F has at most k 1 negative literals, and thus in step (d) we append at most k 1 children. Suppose v is an ancestor of u and var-label(v) =. Since β() =, we conclude that 62 C. Therefore, no node has the same label as one of its ancestors. This also implies that the height of the tree cannot eceed n, thus the process terminates. We denote the resulting clause tree b T.

5 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 5 Figure 6*.1: Consider the formula F = {{,, }, {, v, w}, {,, v}, {,, a},... }. We begin the construction of T with a tree consisting of a root. It is labeled with, but does not et have a clause label. We consider the assignment α[ 7 ] and observe that this leaves {,, } unsatised. We attach two new leaves to the root, labeled with and, respectivel. {, ȳ, } Figure 6*.2: We take the leaf labeled with. The assignment α[, 7 ] leaves the clause {,, a} unsatised. Thus, we attach one new child to and label it with a. {, ȳ, } {,, ā} a Figure 6*.3: We take the leaf labeled with. The assignment α[, 7 ] leaves the clause {, v, w} unsatised. Thus, we attach two new children to. {, ȳ, } {, v, w} {,, ā} v w a Figure 6*.4: We pick the leftmost leaf. The assignment α[,, v 7 ] leaves the clause {,, v} unsatised. We do not attach further leaves here. {, ȳ, } v {,, v} {, v, w} w {,, ā} a Figure 6*.5: The tree now has 6 nodes. Two leaves are still do not have a clause label, thus the process is not nished et.

6 6 CHAPTER 6*. THE PPSZ ALGORITHM π() =.5 {, v, w} π(v) =.9 v {,, v} π(w) =.2 w π() =.6 {, ȳ, } π() =.8 {,, ā} π(a) =.4 a Figure 6*.6: Illustration of Lemma 6*.5. Nodes u with π(u) < π() are shown gra. Two nodes are reachable, those labeled with and. Their clause labels ield the subformula {{,, }, {,, a}}. This formula implies the clause {,, a} (which can be seen b resolution, for eample). Therefore, ever assignment satisfing this formula and setting all Gra variables to 1 must set to 1. From now on, we do not think about π as a permutation of vbl(f), but rather as a function vbl(f) [, 1]. If the values π() are chosen independentl and uniforml at random from [, 1] for each 2 vbl(f), then with probabilit 1, π is injective, and b sorting the values π() we obtain a uniforml distributed permutation of vbl(f). Note that π also denes a function V(T) [, 1] via π(u) := π(var-label(u)). Let γ 2 [, 1] and T be a clause tree. We call a node reachable if there eists a path root = v, v 1,..., v m = u in T such that π(v i ) γ for all 1 i m. We let Reachable(T, γ, π) be the set of all reachable nodes. Lemma 6*.5 (Clause Tree Lemma) If Reachable(T, π(), π) D, then 2 Forced(F, α, π, D). Proof. Let α be the restriction of α to the variables with π() < π(). B denition, is forced if there is a formula F F [α ] with F D that implies. Let G := clause-label(reachable(t, π(), π)), i.e., the subformula of F consisting of all clause labels of reachable nodes in T. Clearl G D. We claim that G [α ] implies. Suppose, for the sake of contradiction, that G [α ] does not impl. Then there is some assignment β : vbl(g) {, 1} such that (i) β satises G, (ii)

7 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 7 β() = 1 for all 2 vbl(g) for which π() < π(), (iii) β() =. Choose a maimal path in T starting at the root and containing onl nodes v such that β(var-labelv) =. Since β() =, this path is nonempt. Let u be its endpoint. The node u is reachable. All children of u are labeled with some variable for which β() = 1, and all ancestors with some variable for which β() =. One checks that clause-label(u) is unsatised b β, a contradiction. 6*.1.2 How to Bound Pr[ 2 Forced(F, α, π, D)] For this section, a variable B Lemma 6*.5 we know that Pr[ 2 Forced(F, α, π, D)] Pr[ Reachable(T, π(), π) D]. From now on we can forget the clause labels in our tree and focus onl on its structure and variable labels. For a tree T and γ 2 [, 1] let h(t, γ) be the number of nodes in a longest path in T starting at the node and containing onl reachable nodes. Hence h(t, γ) = if π(root(t)) < γ. Observation 6*.6 Reachable(T, γ, π) (k 1) h(t,γ), and therefore, for d := log k 1 D, Pr[ Reachable(T, γ, π) D] Pr[h(T, γ) d]. Definition 6*.7 For a clause tree T, γ 2 [, 1] and d 2 we dene P γ (T, d) := Pr[h(T, γ) d π(root(t)) γ]. For a tree T, let T be the tree we obtain b replacing each variable label in T b a new distinct variable. Lemma 6*.8 (Distinct Label Lemma) Let T be a clause tree, γ 2 [, 1], and d 2 N, and γ 2 [, 1]. Then P γ (T, d) P γ (T, d). Proof. The proof consists of two crucial facts, plus a straightforward induction. The one fact is that if u is a proper ancestor in T of v, then var-label(u) 6= var-label(v), and thus the event [π(u) < γ] is independent of everthing happening in u's subtree. The second fact is that two monotone boolean functions are positivel correlated:

8 8 CHAPTER 6*. THE PPSZ ALGORITHM 1 u u u 1 2 u 2 Figure 6*.7: Illustration of Lemma 6*.8: The left tree T, with non-unique labels, is at least as good as the right tree T with distinct labels. Theorem 6*.9 (FKG Inequalit [FKG71]) Let f, g : {, 1} n R be two monotonicall increasing boolean functions. Sample 2 {, 1} n b setting each i to 1 with some probabilit p i 2 [, 1], independentl. Then Pr[f() = 1 g() = 1] Pr[f() = 1] Pr[g() = 1]. We are read to prove the lemma b induction on d. Let u be the root of T and u the root of T. If d =, then P(T, ) =, since π(u) γ. The same holds for T. For the induction step, let v 1,..., v l be the children of u in T, and v1,..., v l the children of u in T. Let T 1,..., T l and T1,..., T l be the respective subtrees. Clearl h(t, γ) d if and onl if for each 1 i l, either (i) π(v i ) < γ or (ii) π(v i ) γ and h(t i ) d 1. We calculate " # l^ P(T, d) = Pr h(t i, γ) d 1 i=1 l Pr [h(t i, γ) d 1] (6*.4) = i=1 l (γ + (1 γ) P(T i, d 1)) (6*.5) i=1 l (γ + (1 γ) P(Ti, d 1)) (6*.6) i=1 " # l^ = Pr h(ti, γ) d 1 (6*.7) i=1 = Pr[h(T, γ) d]. (6*.8)

9 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT u 1 2 u 2 T u 1 2 T T T T u 2 Figure 6*.8: Making the tree innite can onl increase Reachable(T, γ, π). Here, (6*.4) follows from the FKG Inequalit, since the events [h(t i, γ) d 1] are monotone boolean functions in the events [π(w) < γ]. Inequalit (6*.6) follows from induction, and (6*.7) holds since the events [h(ti, γ) d 1] are independent, since all variable labels in Ti are distinct. Let us condition the event [ 2 Forced(F, α, π, D)] on π() = γ. For d = log k 1 D it holds that Pr[ 2 Forced(F, α, π, D) π() = γ] Pr[h(T, γ) d π() = γ] = Pr[h(T, γ) d π() γ] = P(T, d) P(T, d). Net, we etend T to an innite tree T : Attach several innite (k 1)-ar tree to ever node in T having fewer than k 1 children. Label each new node with a new variable. This gives an innite (k 1)-ar tree T, whose root is labeled with. Observation 6*.1 Reachable(T, γ, π) Reachable(T, γ, π) and therefore P(T, d) P(T, d). Note that P(T, d) is some number depending on γ, k, and d, but not depending on the input formula F. Since T is innite, there is a possibilit that h(t, γ) is unbounded. Eercise 6*.1 Show that if h(t, γ) d for all d 2 N, i.e., T contains arbitraril long paths of reachable nodes starting at the root, then T contains an innite path of reachable nodes starting at the root.

10 1 CHAPTER 6*. THE PPSZ ALGORITHM We write h(t, γ) = as a shorthand for \there eist arbitraril long paths of reachable nodes starting at the root", and h(t, γ) < if there are no such paths. We dene P γ (T ) := Pr[h(T, γ) < ]. The following lemma is sounds deceptivel obvious, but is not entirel trivial to prove. Lemma 6*.11 For each γ 2 [, 1], it holds that lim d P γ(t, d) = P γ (T ). This means that there are numbers ɛ γ,d such that for ever ed γ 2 [, 1], it holds that P γ (T, d) P γ (T ) ɛ γ,d and lim d ɛ γ,d =. Let us combine everthing we have learned so far: Pr[ 2 Forced(F, α, π, D) π() = γ] P γ (T, d) P γ (T ) ɛ γ,d, and b the law of total probabilit, we conclude that Pr[ 2 Forced(F, α, π, D)] 1 P γ (T )dγ 1 ɛ γ,d dγ. If D = D(n) is some slowl growing function, then d = log 2 D grows, too. One has to check that if ɛ γ,d goes to for ever ed γ, then also 1 ɛ γ,d dγ goes to. We write R k := 1 P γ(t )dγ. This is a number that onl depends on k. We have Pr[ 2 Forced(F, α, π, D)] R k o(1), Pr[pps(F, β, π, D) = α] 2 (1 R k)(n+o(n)). We can nd an equation for P γ (T ), much like in the proof of Lemma 6*.8. Let u be the root of T and v 1,..., v k 1 be its children, and let T 1,..., T k 1 be the corresponding subtrees. The crucial observation is that all T i are

11 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 11 isomorphic to T itself, and therefore P γ (T ) = P γ (T i ). On the other hand, observe that h(t, γ) < if and onl if for ever 1 i k 1 either (i) π(v i ) < γ or (ii) π(v i ) γ and h(t i, γ) <. Therefore P γ (T ) = (γ + (1 γ)p γ (T )) k 1. (6*.9) For k = 3, (6*.9) has the two solutions P γ (T ) = 1 and P γ (T ) = γ 2 /(1 γ) 2. Without knowing which one is the true value, we can at least sa that P γ (T ) min(1, γ 2 /(1 γ) 2 (in fact, we will show later that this holds with equalit) and thus Thus 1 P γ (T ) = 1 min 1,! γ 2 = 2 2 ln 2 (1 γ) Pr[pps(F, β, π, D) = α] n o(n) Ω (1.371 n ). Theorem 6*.12 Let D be a slowl growing function. Then for an 3-CNF formula F over n variables that has a unique satisfing assignment α, pps(f, π, β, D) returns α with probabilit Ω(1.371 n ).

12 12 CHAPTER 6*. THE PPSZ ALGORITHM

13 Bibliograph [FKG71] [Her11] C. M. Fortuin, P. W. Kastelen, and J. Ginibre. Correlation inequalities on some partiall ordered sets. Comm. Math. Phs., 22:89{13, Timon Hertli. 3-sat faster and simpler - unique-sat bounds for pps hold in general. In Rafail Ostrovsk, editor, FOCS, pages 277{284. IEEE, 211. [PPSZ5] Ramamohan Paturi, Pavel Pudlak, Michael E. Saks, and Francis Zane. An improved eponential-time algorithm for k-sat. J. ACM, 52(3):337{364, 25. [PPZ99] Ramamohan Paturi, Pavel Pudlak, and Francis Zane. Satisabilit coding lemma. Chicago J. Theoret. Comput. Sci., pages Article 11, 19 pp. (electronic),

Chapter 6. Self-Adjusting Data Structures

Chapter 6. Self-Adjusting Data Structures Chapter 6 Self-Adjusting Data Structures Chapter 5 describes a data structure that is able to achieve an epected quer time that is proportional to the entrop of the quer distribution. The most interesting

More information

Improving PPSZ for 3-SAT using Critical Variables

Improving PPSZ for 3-SAT using Critical Variables Improving PPSZ for 3-SAT using Critical Variables Timon Hertli 1,2, Robin A. Moser 1,3, and Dominik Scheder 1,4 1 Institute for Theoretical Computer Science Department of Computer Science ETH Zürich, 8092

More information

The Maze Generation Problem is NP-complete

The Maze Generation Problem is NP-complete The Mae Generation Problem is NP-complete Mario Alviano Department of Mathematics, Universit of Calabria, 87030 Rende (CS), Ital alviano@mat.unical.it Abstract. The Mae Generation problem has been presented

More information

The PPSZ Algorithm for Constraint Satisfaction Problems on More Than Two Colors

The PPSZ Algorithm for Constraint Satisfaction Problems on More Than Two Colors The PPSZ Algorithm for Constraint Satisfaction Problems on More Than Two Colors Timon Hertli, Isabelle Hurbain, Sebastian Millius, Robin A. Moser, Dominik Scheder 2, and May Szedlák ETH Zürich 2 Shanghai

More information

Lecture 15 - NP Completeness 1

Lecture 15 - NP Completeness 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 29, 2018 Lecture 15 - NP Completeness 1 In the last lecture we discussed how to provide

More information

Lecture 2: Proof of Switching Lemma

Lecture 2: Proof of Switching Lemma Lecture 2: oof of Switching Lemma Yuan Li June 25, 2014 1 Decision Tree Instead of bounding the probability that f can be written as some s-dnf, we estimate the probability that f can be computed by a

More information

3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ H. PPSZ Hold in General

3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ H. PPSZ Hold in General 3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in General Institute for Theoretical Computer Science Department of Computer Science ETH Zürich, Switzerland October 10, 2011 China Theory Week

More information

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y Paul J. Bruillard MATH 0.970 Problem Set 6 An Introduction to Abstract Mathematics R. Bond and W. Keane Section 3.1: 3b,c,e,i, 4bd, 6, 9, 15, 16, 18c,e, 19a, 0, 1b Section 3.: 1f,i, e, 6, 1e,f,h, 13e,

More information

Toda s Theorem: PH P #P

Toda s Theorem: PH P #P CS254: Computational Compleit Theor Prof. Luca Trevisan Final Project Ananth Raghunathan 1 Introduction Toda s Theorem: PH P #P The class NP captures the difficult of finding certificates. However, in

More information

4 Inverse function theorem

4 Inverse function theorem Tel Aviv Universit, 2013/14 Analsis-III,IV 53 4 Inverse function theorem 4a What is the problem................ 53 4b Simple observations before the theorem..... 54 4c The theorem.....................

More information

arxiv: v2 [math.co] 21 Apr 2012

arxiv: v2 [math.co] 21 Apr 2012 INTERVALS OF BALANCED BINARY TREES IN THE TAMARI LATTICE arxiv:117.3472v2 [math.co] 21 Apr 212 SAMUELE GIRAUDO Abstract. We show that the set of balanced binar trees is closed b interval in the Tamari

More information

Provable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability:

Provable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability: Provable intractabilit -completeness Selected from Computer and Intractabilit b MR Gare and DS Johnson (979) Two causes of intractabilit: The problem is so difficult that an exponential amount of time

More information

Section 1.5 Formal definitions of limits

Section 1.5 Formal definitions of limits Section.5 Formal definitions of limits (3/908) Overview: The definitions of the various tpes of limits in previous sections involve phrases such as arbitraril close, sufficientl close, arbitraril large,

More information

Biostatistics in Research Practice - Regression I

Biostatistics in Research Practice - Regression I Biostatistics in Research Practice - Regression I Simon Crouch 30th Januar 2007 In scientific studies, we often wish to model the relationships between observed variables over a sample of different subjects.

More information

NP-Completeness Review

NP-Completeness Review CS124 NP-Completeness Review Where We Are Headed Up to this point, we have generally assumed that if we were given a problem, we could find a way to solve it. Unfortunately, as most of you know, there

More information

School of Computer and Communication Sciences. Information Theory and Coding Notes on Random Coding December 12, 2003.

School of Computer and Communication Sciences. Information Theory and Coding Notes on Random Coding December 12, 2003. ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE School of Computer and Communication Sciences Handout 8 Information Theor and Coding Notes on Random Coding December 2, 2003 Random Coding In this note we prove

More information

Binary Decision Diagrams

Binary Decision Diagrams Binar Decision Diagrams Ma 3, 2004 1 Overview Boolean functions Possible representations Binar decision trees Binar decision diagrams Ordered binar decision diagrams Reduced ordered binar decision diagrams

More information

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching

More information

Review Topics for MATH 1400 Elements of Calculus Table of Contents

Review Topics for MATH 1400 Elements of Calculus Table of Contents Math 1400 - Mano Table of Contents - Review - page 1 of 2 Review Topics for MATH 1400 Elements of Calculus Table of Contents MATH 1400 Elements of Calculus is one of the Marquette Core Courses for Mathematical

More information

Additional Material On Recursive Sequences

Additional Material On Recursive Sequences Penn State Altoona MATH 141 Additional Material On Recursive Sequences 1. Graphical Analsis Cobweb Diagrams Consider a generic recursive sequence { an+1 = f(a n ), n = 1,, 3,..., = Given initial value.

More information

INTRODUCTION TO DIOPHANTINE EQUATIONS

INTRODUCTION TO DIOPHANTINE EQUATIONS INTRODUCTION TO DIOPHANTINE EQUATIONS In the earl 20th centur, Thue made an important breakthrough in the stud of diophantine equations. His proof is one of the first eamples of the polnomial method. His

More information

Solutions to Two Interesting Problems

Solutions to Two Interesting Problems Solutions to Two Interesting Problems Save the Lemming On each square of an n n chessboard is an arrow pointing to one of its eight neighbors (or off the board, if it s an edge square). However, arrows

More information

Solving SAT for CNF formulas with a one-sided restriction on variable occurrences

Solving SAT for CNF formulas with a one-sided restriction on variable occurrences Solving SAT for CNF formulas with a one-sided restriction on variable occurrences Daniel Johannsen 1, Igor Razgon 2, and Magnus Wahlström 1 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2

More information

6.4 graphs OF logarithmic FUnCTIOnS

6.4 graphs OF logarithmic FUnCTIOnS SECTION 6. graphs of logarithmic functions 9 9 learning ObjeCTIveS In this section, ou will: Identif the domain of a logarithmic function. Graph logarithmic functions. 6. graphs OF logarithmic FUnCTIOnS

More information

Foundations of Databases

Foundations of Databases Foundations of Databases (Slides adapted from Thomas Eiter, Leonid Libkin and Werner Nutt) Foundations of Databases 1 Quer optimization: finding a good wa to evaluate a quer Queries are declarative, and

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms CSE 0, Winter 208 Design and Analsis of Algorithms Lecture 6: NP-Completeness, Part 2 Class URL: http://vlsicad.ucsd.edu/courses/cse0-w8/ The Classes P and NP Classes of Decision Problems P: Problems for

More information

15. Eigenvalues, Eigenvectors

15. Eigenvalues, Eigenvectors 5 Eigenvalues, Eigenvectors Matri of a Linear Transformation Consider a linear ( transformation ) L : a b R 2 R 2 Suppose we know that L and L Then c d because of linearit, we can determine what L does

More information

The Complexity of Unique k-sat: An Isolation Lemma for k-cnfs

The Complexity of Unique k-sat: An Isolation Lemma for k-cnfs The Complexity of Unique k-sat: An Isolation Lemma for k-cnfs Chris Calabro Russell Impagliazzo Valentine Kabanets Ramamohan Paturi June 20, 2006 Abstract We provide some evidence that Unique k-sat is

More information

The Complexity of Satisfiability of Small Depth Circuits

The Complexity of Satisfiability of Small Depth Circuits The Complexity of Satisfiability of Small Depth Circuits Chris Calabro, Russell Impagliazzo, and Ramamohan Paturi Department of Computer Science and Engineering University of California, San Diego La Jolla,

More information

On the Structure and the Number of Prime Implicants of 2-CNFs

On the Structure and the Number of Prime Implicants of 2-CNFs On the Structure and the Number of Prime Implicants of 2-CNFs Navid Talebanfard Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Meguro-ku Ookayama 2-12-1, Japan 152-8552

More information

Lecture 14 - P v.s. NP 1

Lecture 14 - P v.s. NP 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms CSE 101, Winter 2018 Design and Analsis of Algorithms Lecture 15: NP-Completeness Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ From Application to Algorithm Design Find all maimal regularl-spaced,

More information

On the correlation of parity and small-depth circuits

On the correlation of parity and small-depth circuits Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract

More information

EQUIVALENT FORMULATIONS OF HYPERCONTRACTIVITY USING INFORMATION MEASURES

EQUIVALENT FORMULATIONS OF HYPERCONTRACTIVITY USING INFORMATION MEASURES 1 EQUIVALENT FORMULATIONS OF HYPERCONTRACTIVITY USING INFORMATION MEASURES CHANDRA NAIR 1 1 Dept. of Information Engineering, The Chinese Universit of Hong Kong Abstract We derive alternate characterizations

More information

On Quantum Versions of Record-Breaking Algorithms for SAT

On Quantum Versions of Record-Breaking Algorithms for SAT On Quantum Versions of Record-Breaking Algorithms for SAT Evgeny Dantsin 1, Vladik Kreinovich 2, and Alexander Wolpert 1 1 Department of Computer Science, Roosevelt University Chicago, IL 60605, USA, {edantsin,awolpert}@roosevelt.edu

More information

Lines and Planes 1. x(t) = at + b y(t) = ct + d

Lines and Planes 1. x(t) = at + b y(t) = ct + d 1 Lines in the Plane Lines and Planes 1 Ever line of points L in R 2 can be epressed as the solution set for an equation of the form A + B = C. Will we call this the ABC form. Recall that the slope-intercept

More information

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. CS684: Advanced Complexity Theory Mar 29, 22 Lecture 46 : Size lower bounds for AC circuits computing Parity Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. Theme: Circuit Complexity Lecture Plan: Proof

More information

Search Trees. Chapter 10. CSE 2011 Prof. J. Elder Last Updated: :52 AM

Search Trees. Chapter 10. CSE 2011 Prof. J. Elder Last Updated: :52 AM Search Trees Chapter 1 < 6 2 > 1 4 = 8 9-1 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 2 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 3 - Binary Search Trees Ø A binary search

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170 UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability

More information

CSE 546 Midterm Exam, Fall 2014

CSE 546 Midterm Exam, Fall 2014 CSE 546 Midterm Eam, Fall 2014 1. Personal info: Name: UW NetID: Student ID: 2. There should be 14 numbered pages in this eam (including this cover sheet). 3. You can use an material ou brought: an book,

More information

Finite Automata. Mahesh Viswanathan

Finite Automata. Mahesh Viswanathan Finite Automata Mahesh Viswanathan In this lecture, we will consider different models of finite state machines and study their relative power. These notes assume that the reader is familiar with DFAs,

More information

Section 1.2: Relations, from College Algebra: Corrected Edition by Carl Stitz, Ph.D. and Jeff Zeager, Ph.D. is available under a Creative Commons

Section 1.2: Relations, from College Algebra: Corrected Edition by Carl Stitz, Ph.D. and Jeff Zeager, Ph.D. is available under a Creative Commons Section.: Relations, from College Algebra: Corrected Edition b Carl Stitz, Ph.D. and Jeff Zeager, Ph.D. is available under a Creative Commons Attribution-NonCommercial-ShareAlike.0 license. 0, Carl Stitz.

More information

Polynomial and Rational Functions

Polynomial and Rational Functions Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of work b Horia Varlan;

More information

1 Randomized reduction: a first start

1 Randomized reduction: a first start 6.S078 Fine-Grained Algorithms and Complexity MIT Lectures 3 and 4 February 14 and 21, 2018 Today: In the previous two lectures, we mentioned ETH and SETH, about the time complexity of SAT. Today we want

More information

An algorithm for the satisfiability problem of formulas in conjunctive normal form

An algorithm for the satisfiability problem of formulas in conjunctive normal form Journal of Algorithms 54 (2005) 40 44 www.elsevier.com/locate/jalgor An algorithm for the satisfiability problem of formulas in conjunctive normal form Rainer Schuler Abt. Theoretische Informatik, Universität

More information

Clause Shortening Combined with Pruning Yields a New Upper Bound for Deterministic SAT Algorithms

Clause Shortening Combined with Pruning Yields a New Upper Bound for Deterministic SAT Algorithms Clause Shortening Combined with Pruning Yields a New Upper Bound for Deterministic SAT Algorithms Evgeny Dantsin,EdwardA.Hirsch 2,, and Alexander Wolpert Roosevelt University, 430 S. Michigan Av., Chicago,

More information

0.24 adults 2. (c) Prove that, regardless of the possible values of and, the covariance between X and Y is equal to zero. Show all work.

0.24 adults 2. (c) Prove that, regardless of the possible values of and, the covariance between X and Y is equal to zero. Show all work. 1 A socioeconomic stud analzes two discrete random variables in a certain population of households = number of adult residents and = number of child residents It is found that their joint probabilit mass

More information

1.2 Relations. 20 Relations and Functions

1.2 Relations. 20 Relations and Functions 0 Relations and Functions. Relations From one point of view, all of Precalculus can be thought of as studing sets of points in the plane. With the Cartesian Plane now fresh in our memor we can discuss

More information

Engineering Mathematics I

Engineering Mathematics I Engineering Mathematics I_ 017 Engineering Mathematics I 1. Introduction to Differential Equations Dr. Rami Zakaria Terminolog Differential Equation Ordinar Differential Equations Partial Differential

More information

CPS 616 ITERATIVE IMPROVEMENTS 10-1

CPS 616 ITERATIVE IMPROVEMENTS 10-1 CPS 66 ITERATIVE IMPROVEMENTS 0 - APPROACH Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change

More information

NATIONAL UNIVERSITY OF SINGAPORE Department of Mathematics MA4247 Complex Analysis II Lecture Notes Part I

NATIONAL UNIVERSITY OF SINGAPORE Department of Mathematics MA4247 Complex Analysis II Lecture Notes Part I NATIONAL UNIVERSITY OF SINGAPORE Department of Mathematics MA4247 Comple Analsis II Lecture Notes Part I Chapter 1 Preliminar results/review of Comple Analsis I These are more detailed notes for the results

More information

Properties of Limits

Properties of Limits 33460_003qd //04 :3 PM Page 59 SECTION 3 Evaluating Limits Analticall 59 Section 3 Evaluating Limits Analticall Evaluate a it using properties of its Develop and use a strateg for finding its Evaluate

More information

FIRST- AND SECOND-ORDER IVPS The problem given in (1) is also called an nth-order initial-value problem. For example, Solve: Solve:

FIRST- AND SECOND-ORDER IVPS The problem given in (1) is also called an nth-order initial-value problem. For example, Solve: Solve: .2 INITIAL-VALUE PROBLEMS 3.2 INITIAL-VALUE PROBLEMS REVIEW MATERIAL Normal form of a DE Solution of a DE Famil of solutions INTRODUCTION We are often interested in problems in which we seek a solution

More information

An Improved Upper Bound for SAT

An Improved Upper Bound for SAT An Improved Upper Bound for SAT Evgeny Dantsin and Alexander Wolpert Roosevelt University, 430 S. Michigan Av., Chicago, IL 60605, USA {edantsin, awolpert}@roosevelt.edu Abstract. We give a randomized

More information

Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas

Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas Journal of Artificial Intelligence Research 1 (1993) 1-15 Submitted 6/91; published 9/91 Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas Enrico Giunchiglia Massimo

More information

Derivatives of Multivariable Functions

Derivatives of Multivariable Functions Chapter 0 Derivatives of Multivariable Functions 0. Limits Motivating Questions In this section, we strive to understand the ideas generated b the following important questions: What do we mean b the limit

More information

A Duality between Clause Width and Clause Density for SAT

A Duality between Clause Width and Clause Density for SAT A Duality between Clause Width and Clause Density for SAT Chris Calabro, Russell Impagliazzo, Ramamohan Paturi University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093 ccalabro,russell,paturi

More information

UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS )

UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS ) UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS ) CHAPTER : Limits and continuit of functions in R n. -. Sketch the following subsets of R. Sketch their boundar and the interior. Stud

More information

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE KOJI KOBAYASHI Abstract. This paper describes about relation between circuit compleit and accept inputs structure in Hamming space b using almost

More information

We have examined power functions like f (x) = x 2. Interchanging x

We have examined power functions like f (x) = x 2. Interchanging x CHAPTER 5 Eponential and Logarithmic Functions We have eamined power functions like f =. Interchanging and ields a different function f =. This new function is radicall different from a power function

More information

Flows and Connectivity

Flows and Connectivity Chapter 4 Flows and Connectivit 4. Network Flows Capacit Networks A network N is a connected weighted loopless graph (G,w) with two specified vertices and, called the source and the sink, respectivel,

More information

Section 1.2: A Catalog of Functions

Section 1.2: A Catalog of Functions Section 1.: A Catalog of Functions As we discussed in the last section, in the sciences, we often tr to find an equation which models some given phenomenon in the real world - for eample, temperature as

More information

Exponential and Logarithmic Functions

Exponential and Logarithmic Functions Eponential and Logarithmic Functions 6 Figure Electron micrograph of E. Coli bacteria (credit: Mattosaurus, Wikimedia Commons) CHAPTER OUTLINE 6. Eponential Functions 6. Logarithmic Properties 6. Graphs

More information

LESSON #48 - INTEGER EXPONENTS COMMON CORE ALGEBRA II

LESSON #48 - INTEGER EXPONENTS COMMON CORE ALGEBRA II LESSON #8 - INTEGER EXPONENTS COMMON CORE ALGEBRA II We just finished our review of linear functions. Linear functions are those that grow b equal differences for equal intervals. In this unit we will

More information

On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes

On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes Venkata Gandikota Purdue Universit Badih Ghazi MIT Elena Grigorescu Purdue Universit Abstract Guruswami and Vard (IEEE Trans. Inf.

More information

The Entropy Power Inequality and Mrs. Gerber s Lemma for Groups of order 2 n

The Entropy Power Inequality and Mrs. Gerber s Lemma for Groups of order 2 n The Entrop Power Inequalit and Mrs. Gerber s Lemma for Groups of order 2 n Varun Jog EECS, UC Berkele Berkele, CA-94720 Email: varunjog@eecs.berkele.edu Venkat Anantharam EECS, UC Berkele Berkele, CA-94720

More information

Problems and results for the ninth week Mathematics A3 for Civil Engineering students

Problems and results for the ninth week Mathematics A3 for Civil Engineering students Problems and results for the ninth week Mathematics A3 for Civil Engineering students. Production line I of a factor works 0% of time, while production line II works 70% of time, independentl of each other.

More information

Algorithms for Satisfiability Using Independent Sets of Variables

Algorithms for Satisfiability Using Independent Sets of Variables Algorithms for Satisfiability Using Independent Sets of Variables Ravi Gummadi, N.S. Narayanaswamy,, and R. Venkatakrishnan 2 Department of Computer Science and Engineering, Indian Institute of Technology

More information

Representation of Functions by Power Series. Geometric Power Series

Representation of Functions by Power Series. Geometric Power Series 60_0909.qd //0 :09 PM Page 669 SECTION 9.9 Representation of Functions b Power Series 669 The Granger Collection Section 9.9 JOSEPH FOURIER (768 80) Some of the earl work in representing functions b power

More information

Linear regression Class 25, Jeremy Orloff and Jonathan Bloom

Linear regression Class 25, Jeremy Orloff and Jonathan Bloom 1 Learning Goals Linear regression Class 25, 18.05 Jerem Orloff and Jonathan Bloom 1. Be able to use the method of least squares to fit a line to bivariate data. 2. Be able to give a formula for the total

More information

CS 395T Computational Learning Theory. Scribe: Mike Halcrow. x 4. x 2. x 6

CS 395T Computational Learning Theory. Scribe: Mike Halcrow. x 4. x 2. x 6 CS 395T Computational Learning Theory Lecture 3: September 0, 2007 Lecturer: Adam Klivans Scribe: Mike Halcrow 3. Decision List Recap In the last class, we determined that, when learning a t-decision list,

More information

University of Toronto Mississauga

University of Toronto Mississauga Surname: First Name: Student Number: Tutorial: Universit of Toronto Mississauga Mathematical and Computational Sciences MATY5Y Term Test Duration - 0 minutes No Aids Permitted This eam contains pages (including

More information

5. Zeros. We deduce that the graph crosses the x-axis at the points x = 0, 1, 2 and 4, and nowhere else. And that s exactly what we see in the graph.

5. Zeros. We deduce that the graph crosses the x-axis at the points x = 0, 1, 2 and 4, and nowhere else. And that s exactly what we see in the graph. . Zeros Eample 1. At the right we have drawn the graph of the polnomial = ( 1) ( 2) ( 4). Argue that the form of the algebraic formula allows ou to see right awa where the graph is above the -ais, where

More information

CONVEX FUNCTIONS WITH RESPECT TO A MEAN AND A CHARACTERIZATION OF QUASI-ARITHMETIC MEANS

CONVEX FUNCTIONS WITH RESPECT TO A MEAN AND A CHARACTERIZATION OF QUASI-ARITHMETIC MEANS Real Analsis Echange Vol. 29(1), 2003/2004, pp. 229246 Janusz Matkowski, Institute of Mathematics, Universit of Zielona Góra, PL-65-246 Zielona Góra, Poland. email: J.Matkowski@im.uz.zgora.pl CONVEX FUNCTIONS

More information

CS Lecture 28 P, NP, and NP-Completeness. Fall 2008

CS Lecture 28 P, NP, and NP-Completeness. Fall 2008 CS 301 - Lecture 28 P, NP, and NP-Completeness Fall 2008 Review Languages and Grammars Alphabets, strings, languages Regular Languages Deterministic Finite and Nondeterministic Automata Equivalence of

More information

5A Exponential functions

5A Exponential functions Chapter 5 5 Eponential and logarithmic functions bjectives To graph eponential and logarithmic functions and transformations of these functions. To introduce Euler s number e. To revise the inde and logarithm

More information

Noncommuting Rotation and Angular Momentum Operators

Noncommuting Rotation and Angular Momentum Operators Noncommuting Rotation and Angular Momentum Operators Originall appeared at: http://behindtheguesses.blogspot.com/2009/08/noncommuting-rotation-and-angular.html Eli Lanse elanse@gmail.com August 31, 2009

More information

Search Trees. EECS 2011 Prof. J. Elder Last Updated: 24 March 2015

Search Trees. EECS 2011 Prof. J. Elder Last Updated: 24 March 2015 Search Trees < 6 2 > 1 4 = 8 9-1 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 2 - Learning Outcomes Ø From this lecture, you should be able to: q Define the properties of a binary search

More information

Two NP-hard Interchangeable Terminal Problems*

Two NP-hard Interchangeable Terminal Problems* o NP-hard Interchangeable erminal Problems* Sartaj Sahni and San-Yuan Wu Universit of Minnesota ABSRAC o subproblems that arise hen routing channels ith interchangeable terminals are shon to be NP-hard

More information

Lecture 3: September 10

Lecture 3: September 10 CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 3: September 10 Lecturer: Prof. Alistair Sinclair Scribes: Andrew H. Chan, Piyush Srivastava Disclaimer: These notes have not

More information

11.1 Double Riemann Sums and Double Integrals over Rectangles

11.1 Double Riemann Sums and Double Integrals over Rectangles Chapter 11 Multiple Integrals 11.1 ouble Riemann Sums and ouble Integrals over Rectangles Motivating Questions In this section, we strive to understand the ideas generated b the following important questions:

More information

4Cubic. polynomials UNCORRECTED PAGE PROOFS

4Cubic. polynomials UNCORRECTED PAGE PROOFS 4Cubic polnomials 4.1 Kick off with CAS 4. Polnomials 4.3 The remainder and factor theorems 4.4 Graphs of cubic polnomials 4.5 Equations of cubic polnomials 4.6 Cubic models and applications 4.7 Review

More information

LESSON #24 - POWER FUNCTIONS COMMON CORE ALGEBRA II

LESSON #24 - POWER FUNCTIONS COMMON CORE ALGEBRA II 1 LESSON #4 - POWER FUNCTIONS COMMON CORE ALGEBRA II Before we start to analze polnomials of degree higher than two (quadratics), we first will look at ver simple functions known as power functions. The

More information

Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs

Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs Krishnendu Chatterjee Rasmus Ibsen-Jensen Andreas Pavlogiannis IST Austria Abstract. We consider graphs with n nodes together

More information

1 More finite deterministic automata

1 More finite deterministic automata CS 125 Section #6 Finite automata October 18, 2016 1 More finite deterministic automata Exercise. Consider the following game with two players: Repeatedly flip a coin. On heads, player 1 gets a point.

More information

a. plotting points in Cartesian coordinates (Grade 9 and 10), b. using a graphing calculator such as the TI-83 Graphing Calculator,

a. plotting points in Cartesian coordinates (Grade 9 and 10), b. using a graphing calculator such as the TI-83 Graphing Calculator, GRADE PRE-CALCULUS UNIT C: QUADRATIC FUNCTIONS CLASS NOTES FRAME. After linear functions, = m + b, and their graph the Quadratic Functions are the net most important equation or function. The Quadratic

More information

Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST

Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST moonzoo@cs.kaist.ac.kr 1 Overview 2.1 Boolean operators 2.2 Propositional formulas 2.3 Interpretations 2.4 Logical Equivalence and substitution

More information

5.6 RATIOnAl FUnCTIOnS. Using Arrow notation. learning ObjeCTIveS

5.6 RATIOnAl FUnCTIOnS. Using Arrow notation. learning ObjeCTIveS CHAPTER PolNomiAl ANd rational functions learning ObjeCTIveS In this section, ou will: Use arrow notation. Solve applied problems involving rational functions. Find the domains of rational functions. Identif

More information

A. Real numbers greater than 2 B. Real numbers less than or equal to 2. C. Real numbers between 1 and 3 D. Real numbers greater than or equal to 2

A. Real numbers greater than 2 B. Real numbers less than or equal to 2. C. Real numbers between 1 and 3 D. Real numbers greater than or equal to 2 39 CHAPTER 9 DAY 0 DAY 0 Opportunities To Learn You are what ou are when nobod Is looking. - Ann Landers 6. Match the graph with its description. A. Real numbers greater than B. Real numbers less than

More information

CMPUT 675: Approximation Algorithms Fall 2014

CMPUT 675: Approximation Algorithms Fall 2014 CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph

More information

CS 151. Red Black Trees & Structural Induction. Thursday, November 1, 12

CS 151. Red Black Trees & Structural Induction. Thursday, November 1, 12 CS 151 Red Black Trees & Structural Induction 1 Announcements Majors fair tonight 4:30-6:30pm in the Root Room in Carnegie. Come and find out about the CS major, or some other major. Winter Term in CS

More information

Context-Free Languages

Context-Free Languages CS:4330 Theory of Computation Spring 2018 Context-Free Languages Non-Context-Free Languages Haniel Barbosa Readings for this lecture Chapter 2 of [Sipser 1996], 3rd edition. Section 2.3. Proving context-freeness

More information

Resolution Lower Bounds for the Weak Pigeonhole Principle

Resolution Lower Bounds for the Weak Pigeonhole Principle Electronic Colloquium on Computational Complexity, Report No. 21 (2001) Resolution Lower Bounds for the Weak Pigeonhole Principle Ran Raz Weizmann Institute, and The Institute for Advanced Study ranraz@wisdom.weizmann.ac.il

More information

NP-Completeness of Refutability by Literal-Once Resolution

NP-Completeness of Refutability by Literal-Once Resolution NP-Completeness of Refutability by Literal-Once Resolution Stefan Szeider Institute of Discrete Mathematics Austrian Academy of Sciences Sonnenfelsgasse 19, 1010 Vienna, Austria stefan.szeider@oeaw.ac.at

More information

8. BOOLEAN ALGEBRAS x x

8. BOOLEAN ALGEBRAS x x 8. BOOLEAN ALGEBRAS 8.1. Definition of a Boolean Algebra There are man sstems of interest to computing scientists that have a common underling structure. It makes sense to describe such a mathematical

More information

Comp487/587 - Boolean Formulas

Comp487/587 - Boolean Formulas Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested

More information

Hamiltonicity and Fault Tolerance

Hamiltonicity and Fault Tolerance Hamiltonicit and Fault Tolerance in the k-ar n-cube B Clifford R. Haithcock Portland State Universit Department of Mathematics and Statistics 006 In partial fulfillment of the requirements of the degree

More information

Correlation analysis 2: Measures of correlation

Correlation analysis 2: Measures of correlation Correlation analsis 2: Measures of correlation Ran Tibshirani Data Mining: 36-462/36-662 Februar 19 2013 1 Review: correlation Pearson s correlation is a measure of linear association In the population:

More information

Math 107: Calculus II, Spring 2015: Midterm Exam II Monday, April Give your name, TA and section number:

Math 107: Calculus II, Spring 2015: Midterm Exam II Monday, April Give your name, TA and section number: Math 7: Calculus II, Spring 25: Midterm Exam II Monda, April 3 25 Give our name, TA and section number: Name: TA: Section number:. There are 5 questions for a total of points. The value of each part of

More information

Notes on Computer Theory Last updated: November, Circuits

Notes on Computer Theory Last updated: November, Circuits Notes on Computer Theory Last updated: November, 2015 Circuits Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Circuits Boolean circuits offer an alternate model of computation: a non-uniform one

More information