Chapter 6* The PPSZ Algorithm
|
|
- Ambrose Noel Johns
- 5 years ago
- Views:
Transcription
1 Chapter 6* The PPSZ Algorithm In this chapter we present an improvement of the pp algorithm. As pp is called after its inventors, Paturi, Pudlak, and Zane [PPZ99], the improved version, pps, is called after Paturi, Pudlak, Saks, and Zane [PPSZ5]. The idea behind the improvement is ver beautiful and simple; its analsis is challenging, but ver elegant uses a variet of interesting concepts. In this chapter, we anale the algorithm for the case that the input formula has a unique satisfing assignment. This analsis is from [PPSZ5]. If there are multiple satisfing assignments, the analsis surprisingl becomes much more dicult. In fact, it has been open for thirteen ears whether one generalie the analsis for the unique case to the general case { without getting a worse running time. This was achieved in 211 b Timon Hertli [Her11]. The basic idea of the pp-algorithm is ver simple: Given a CNF formula F, choose a variable 2 vbl(f) uniforml at random. If {} 2 F or {} 2 F, set the obvious wa. Otherwise, set randoml. Then iterate. The analsis of this simple algorithm shows surprising connections to encodings of satisfing assignments and lower bounds on depth-3 boolean circuits. From an algorithmic point of view, here is a simple idea for improvement: Instead of checking whether {} 2 F or {} 2 F, check whether or can be derived from F in some wa. Of course, checking this is again NPcomplete and no big help. However, we can check whether or follows from F in some simple, polnomial-time checkable wa. Indeed, {} being a unit clause in F is probabl the simplest wa how can follow from F. Definition 6*.1 Let F be a CNF formula, let D 2 N, and let u be a literal. We sa that F implies u if an assignment α satisfing F also satises 1
2 2 CHAPTER 6*. THE PPSZ ALGORITHM u. We sa F D-implies u if there is some G F with G D that implies u. In this terminolog, in the pp-algorithm we check whether is 1- implied in F. The pps-algorithm applies an obvious improvement: Check whether is D-implied for some (large) constant D. This can be done in polnomial time. Simple as this sounds, the analsis of this algorithm turns out to be quite sophisticated. To state the pps-algorithm formall, we think of it choosing a random permutation π of vbl(f) and an assignment β 2 {, 1} n in advance and then processing the variables according to π and assigning them values according to β, unless the turn out to be D-implied. F a 3-CNF formula, π = ( 1,..., n ), a permutation on vbl(f), β 2 {, 1} n, D 2 N. Postcondition: returns a satisfing assignment or failure function pps(f, π, β, D) α the empt assignment ; F 1 F; for i 1 to vbl(f) do if F i D-implies i then α() 1; elseif F i D-implies i then α() ; else α() β(); F i+1 F [7 α()] i ; if α satises F then return α; else return failure; When does this algorithm succeed in nding a satisfing assignment? For this need the concept of forced and guessed variables. Definition 6*.2 Let F be a CNF formula over n variables, α 2 {, 1} n a satisfing assignment, and π = ( 1,..., n ) a permutation of vbl(f), and D. A variable i is called forced (with respect to F, α, π, and D) if F [ 1 7 α( 1),..., i 1 7 α( i 1 )] D-implies i or i. Otherwise the variable is called guessed. We denote the set of forced (guessed) variables b Forced(F, α, π, D) (Guessed(F, α, π, D)). When F, α, π and D are understood from the contet, we drop these parameters and just write Forced and Guessed.
3 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 3 Observation 6*.3 Let F be a CNF formula and α be a satisfing assignment. Then pps(f, π, β, D) returns α if and onl if α() = β() for all 2 Guessed(F, α, π, D). 6*.1 Having a Unique Satisfing Assignment In this section we anale the special case that F has a unique satisfing assignment α. This case is easier to anale and at the same time we can introduce all the concepts we will need for the general case. Without loss of generalit, assume α = (1,..., 1) sets all variables to 1. B the above observation, pps returns α if and onl if β agrees with α on all variables from Guessed(F, α, π, D). This set is a random object, since it depends on π, which is a random permutation. Pr β,π [pps returns α] = E π h 2 Guessed(F,α,π,D) This epression is rather dicult to work with. It would be easier to bound E [ Guessed(F, α, π, D) ], for eample. Luckil, we have Jensen's inequalit, which in this case states that for a random variable X, it holds that E h 2 Xi 2 E[X], (6*.1) since the function 7 2 is a conve function. With this, we obtain Pr [pps returns α] β,π 2 Eπ[ Guessed(F,α,π,D) ] (6*.2) The right-hand side here is a much nicer epression, since b linearit of epectation it equals the sum of the probabilities 6*.1.1 Building a Tree Pr[ 2 Guessed(F, α, π, D)]. (6*.3) We will now tr to bound Pr[ 2 Guessed(F, α, π, D)] from above. In this section, we conne ourselves to k-cnf formulas F having a unique satisfing assignment, which we assume to be α = (1,..., 1). Fi some 2 vbl(f). We construct a binar tree T, called the critical clause tree of that in some wa represents the multiple was can become D-implied in pps. i
4 4 CHAPTER 6*. THE PPSZ ALGORITHM Definition 6*.4 Let F be a ( k)-cnf formula. A clause tree T is a tree with the following properties: Ever node has at most k 1 children. Ever node u 2 V(T) is labeled with a variable from vbl(()f), which we denote b var-label(u), and additionall with a clause C 2 F, denoted b clause-label(u). If u is a proper ancestor of v, then var-label(u) 6= var-label(v). We will dene a clause tree T for each 2 vbl(f). See Figures 6*.1{ 6*.5 for an illustration. 1. Start with T consisting of a single root. This root has variable label, and does not have a clause label et. 2. As long as there is a leaf u 2 V(T) that does not et have a clause label, do the following: (a) Dene U := {var-label(v) v 2 V(T) is an ancestor of u in T}, where ancestor includes u itself and the root. (b) Dene the assignment β as β : vbl(f) {, 1}, 7 { if 2 U, 1 otherwise. (c) Let C 2 F be a clause not satised b β. Since β 6= α and α is the unique satisfing assignment, such a clause eists. Set clause-label(u) := C. (d) For each negative literal 2 C, create a new leaf, label it with, and attach it to u as a child. The new leaf does not et have a clause label. Note that ever clause in F has at most k 1 negative literals, and thus in step (d) we append at most k 1 children. Suppose v is an ancestor of u and var-label(v) =. Since β() =, we conclude that 62 C. Therefore, no node has the same label as one of its ancestors. This also implies that the height of the tree cannot eceed n, thus the process terminates. We denote the resulting clause tree b T.
5 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 5 Figure 6*.1: Consider the formula F = {{,, }, {, v, w}, {,, v}, {,, a},... }. We begin the construction of T with a tree consisting of a root. It is labeled with, but does not et have a clause label. We consider the assignment α[ 7 ] and observe that this leaves {,, } unsatised. We attach two new leaves to the root, labeled with and, respectivel. {, ȳ, } Figure 6*.2: We take the leaf labeled with. The assignment α[, 7 ] leaves the clause {,, a} unsatised. Thus, we attach one new child to and label it with a. {, ȳ, } {,, ā} a Figure 6*.3: We take the leaf labeled with. The assignment α[, 7 ] leaves the clause {, v, w} unsatised. Thus, we attach two new children to. {, ȳ, } {, v, w} {,, ā} v w a Figure 6*.4: We pick the leftmost leaf. The assignment α[,, v 7 ] leaves the clause {,, v} unsatised. We do not attach further leaves here. {, ȳ, } v {,, v} {, v, w} w {,, ā} a Figure 6*.5: The tree now has 6 nodes. Two leaves are still do not have a clause label, thus the process is not nished et.
6 6 CHAPTER 6*. THE PPSZ ALGORITHM π() =.5 {, v, w} π(v) =.9 v {,, v} π(w) =.2 w π() =.6 {, ȳ, } π() =.8 {,, ā} π(a) =.4 a Figure 6*.6: Illustration of Lemma 6*.5. Nodes u with π(u) < π() are shown gra. Two nodes are reachable, those labeled with and. Their clause labels ield the subformula {{,, }, {,, a}}. This formula implies the clause {,, a} (which can be seen b resolution, for eample). Therefore, ever assignment satisfing this formula and setting all Gra variables to 1 must set to 1. From now on, we do not think about π as a permutation of vbl(f), but rather as a function vbl(f) [, 1]. If the values π() are chosen independentl and uniforml at random from [, 1] for each 2 vbl(f), then with probabilit 1, π is injective, and b sorting the values π() we obtain a uniforml distributed permutation of vbl(f). Note that π also denes a function V(T) [, 1] via π(u) := π(var-label(u)). Let γ 2 [, 1] and T be a clause tree. We call a node reachable if there eists a path root = v, v 1,..., v m = u in T such that π(v i ) γ for all 1 i m. We let Reachable(T, γ, π) be the set of all reachable nodes. Lemma 6*.5 (Clause Tree Lemma) If Reachable(T, π(), π) D, then 2 Forced(F, α, π, D). Proof. Let α be the restriction of α to the variables with π() < π(). B denition, is forced if there is a formula F F [α ] with F D that implies. Let G := clause-label(reachable(t, π(), π)), i.e., the subformula of F consisting of all clause labels of reachable nodes in T. Clearl G D. We claim that G [α ] implies. Suppose, for the sake of contradiction, that G [α ] does not impl. Then there is some assignment β : vbl(g) {, 1} such that (i) β satises G, (ii)
7 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 7 β() = 1 for all 2 vbl(g) for which π() < π(), (iii) β() =. Choose a maimal path in T starting at the root and containing onl nodes v such that β(var-labelv) =. Since β() =, this path is nonempt. Let u be its endpoint. The node u is reachable. All children of u are labeled with some variable for which β() = 1, and all ancestors with some variable for which β() =. One checks that clause-label(u) is unsatised b β, a contradiction. 6*.1.2 How to Bound Pr[ 2 Forced(F, α, π, D)] For this section, a variable B Lemma 6*.5 we know that Pr[ 2 Forced(F, α, π, D)] Pr[ Reachable(T, π(), π) D]. From now on we can forget the clause labels in our tree and focus onl on its structure and variable labels. For a tree T and γ 2 [, 1] let h(t, γ) be the number of nodes in a longest path in T starting at the node and containing onl reachable nodes. Hence h(t, γ) = if π(root(t)) < γ. Observation 6*.6 Reachable(T, γ, π) (k 1) h(t,γ), and therefore, for d := log k 1 D, Pr[ Reachable(T, γ, π) D] Pr[h(T, γ) d]. Definition 6*.7 For a clause tree T, γ 2 [, 1] and d 2 we dene P γ (T, d) := Pr[h(T, γ) d π(root(t)) γ]. For a tree T, let T be the tree we obtain b replacing each variable label in T b a new distinct variable. Lemma 6*.8 (Distinct Label Lemma) Let T be a clause tree, γ 2 [, 1], and d 2 N, and γ 2 [, 1]. Then P γ (T, d) P γ (T, d). Proof. The proof consists of two crucial facts, plus a straightforward induction. The one fact is that if u is a proper ancestor in T of v, then var-label(u) 6= var-label(v), and thus the event [π(u) < γ] is independent of everthing happening in u's subtree. The second fact is that two monotone boolean functions are positivel correlated:
8 8 CHAPTER 6*. THE PPSZ ALGORITHM 1 u u u 1 2 u 2 Figure 6*.7: Illustration of Lemma 6*.8: The left tree T, with non-unique labels, is at least as good as the right tree T with distinct labels. Theorem 6*.9 (FKG Inequalit [FKG71]) Let f, g : {, 1} n R be two monotonicall increasing boolean functions. Sample 2 {, 1} n b setting each i to 1 with some probabilit p i 2 [, 1], independentl. Then Pr[f() = 1 g() = 1] Pr[f() = 1] Pr[g() = 1]. We are read to prove the lemma b induction on d. Let u be the root of T and u the root of T. If d =, then P(T, ) =, since π(u) γ. The same holds for T. For the induction step, let v 1,..., v l be the children of u in T, and v1,..., v l the children of u in T. Let T 1,..., T l and T1,..., T l be the respective subtrees. Clearl h(t, γ) d if and onl if for each 1 i l, either (i) π(v i ) < γ or (ii) π(v i ) γ and h(t i ) d 1. We calculate " # l^ P(T, d) = Pr h(t i, γ) d 1 i=1 l Pr [h(t i, γ) d 1] (6*.4) = i=1 l (γ + (1 γ) P(T i, d 1)) (6*.5) i=1 l (γ + (1 γ) P(Ti, d 1)) (6*.6) i=1 " # l^ = Pr h(ti, γ) d 1 (6*.7) i=1 = Pr[h(T, γ) d]. (6*.8)
9 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT u 1 2 u 2 T u 1 2 T T T T u 2 Figure 6*.8: Making the tree innite can onl increase Reachable(T, γ, π). Here, (6*.4) follows from the FKG Inequalit, since the events [h(t i, γ) d 1] are monotone boolean functions in the events [π(w) < γ]. Inequalit (6*.6) follows from induction, and (6*.7) holds since the events [h(ti, γ) d 1] are independent, since all variable labels in Ti are distinct. Let us condition the event [ 2 Forced(F, α, π, D)] on π() = γ. For d = log k 1 D it holds that Pr[ 2 Forced(F, α, π, D) π() = γ] Pr[h(T, γ) d π() = γ] = Pr[h(T, γ) d π() γ] = P(T, d) P(T, d). Net, we etend T to an innite tree T : Attach several innite (k 1)-ar tree to ever node in T having fewer than k 1 children. Label each new node with a new variable. This gives an innite (k 1)-ar tree T, whose root is labeled with. Observation 6*.1 Reachable(T, γ, π) Reachable(T, γ, π) and therefore P(T, d) P(T, d). Note that P(T, d) is some number depending on γ, k, and d, but not depending on the input formula F. Since T is innite, there is a possibilit that h(t, γ) is unbounded. Eercise 6*.1 Show that if h(t, γ) d for all d 2 N, i.e., T contains arbitraril long paths of reachable nodes starting at the root, then T contains an innite path of reachable nodes starting at the root.
10 1 CHAPTER 6*. THE PPSZ ALGORITHM We write h(t, γ) = as a shorthand for \there eist arbitraril long paths of reachable nodes starting at the root", and h(t, γ) < if there are no such paths. We dene P γ (T ) := Pr[h(T, γ) < ]. The following lemma is sounds deceptivel obvious, but is not entirel trivial to prove. Lemma 6*.11 For each γ 2 [, 1], it holds that lim d P γ(t, d) = P γ (T ). This means that there are numbers ɛ γ,d such that for ever ed γ 2 [, 1], it holds that P γ (T, d) P γ (T ) ɛ γ,d and lim d ɛ γ,d =. Let us combine everthing we have learned so far: Pr[ 2 Forced(F, α, π, D) π() = γ] P γ (T, d) P γ (T ) ɛ γ,d, and b the law of total probabilit, we conclude that Pr[ 2 Forced(F, α, π, D)] 1 P γ (T )dγ 1 ɛ γ,d dγ. If D = D(n) is some slowl growing function, then d = log 2 D grows, too. One has to check that if ɛ γ,d goes to for ever ed γ, then also 1 ɛ γ,d dγ goes to. We write R k := 1 P γ(t )dγ. This is a number that onl depends on k. We have Pr[ 2 Forced(F, α, π, D)] R k o(1), Pr[pps(F, β, π, D) = α] 2 (1 R k)(n+o(n)). We can nd an equation for P γ (T ), much like in the proof of Lemma 6*.8. Let u be the root of T and v 1,..., v k 1 be its children, and let T 1,..., T k 1 be the corresponding subtrees. The crucial observation is that all T i are
11 6*.1. HAVING A UNIQUE SATISFYING ASSIGNMENT 11 isomorphic to T itself, and therefore P γ (T ) = P γ (T i ). On the other hand, observe that h(t, γ) < if and onl if for ever 1 i k 1 either (i) π(v i ) < γ or (ii) π(v i ) γ and h(t i, γ) <. Therefore P γ (T ) = (γ + (1 γ)p γ (T )) k 1. (6*.9) For k = 3, (6*.9) has the two solutions P γ (T ) = 1 and P γ (T ) = γ 2 /(1 γ) 2. Without knowing which one is the true value, we can at least sa that P γ (T ) min(1, γ 2 /(1 γ) 2 (in fact, we will show later that this holds with equalit) and thus Thus 1 P γ (T ) = 1 min 1,! γ 2 = 2 2 ln 2 (1 γ) Pr[pps(F, β, π, D) = α] n o(n) Ω (1.371 n ). Theorem 6*.12 Let D be a slowl growing function. Then for an 3-CNF formula F over n variables that has a unique satisfing assignment α, pps(f, π, β, D) returns α with probabilit Ω(1.371 n ).
12 12 CHAPTER 6*. THE PPSZ ALGORITHM
13 Bibliograph [FKG71] [Her11] C. M. Fortuin, P. W. Kastelen, and J. Ginibre. Correlation inequalities on some partiall ordered sets. Comm. Math. Phs., 22:89{13, Timon Hertli. 3-sat faster and simpler - unique-sat bounds for pps hold in general. In Rafail Ostrovsk, editor, FOCS, pages 277{284. IEEE, 211. [PPSZ5] Ramamohan Paturi, Pavel Pudlak, Michael E. Saks, and Francis Zane. An improved eponential-time algorithm for k-sat. J. ACM, 52(3):337{364, 25. [PPZ99] Ramamohan Paturi, Pavel Pudlak, and Francis Zane. Satisabilit coding lemma. Chicago J. Theoret. Comput. Sci., pages Article 11, 19 pp. (electronic),
Chapter 6. Self-Adjusting Data Structures
Chapter 6 Self-Adjusting Data Structures Chapter 5 describes a data structure that is able to achieve an epected quer time that is proportional to the entrop of the quer distribution. The most interesting
More informationImproving PPSZ for 3-SAT using Critical Variables
Improving PPSZ for 3-SAT using Critical Variables Timon Hertli 1,2, Robin A. Moser 1,3, and Dominik Scheder 1,4 1 Institute for Theoretical Computer Science Department of Computer Science ETH Zürich, 8092
More informationThe Maze Generation Problem is NP-complete
The Mae Generation Problem is NP-complete Mario Alviano Department of Mathematics, Universit of Calabria, 87030 Rende (CS), Ital alviano@mat.unical.it Abstract. The Mae Generation problem has been presented
More informationThe PPSZ Algorithm for Constraint Satisfaction Problems on More Than Two Colors
The PPSZ Algorithm for Constraint Satisfaction Problems on More Than Two Colors Timon Hertli, Isabelle Hurbain, Sebastian Millius, Robin A. Moser, Dominik Scheder 2, and May Szedlák ETH Zürich 2 Shanghai
More informationLecture 15 - NP Completeness 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 29, 2018 Lecture 15 - NP Completeness 1 In the last lecture we discussed how to provide
More informationLecture 2: Proof of Switching Lemma
Lecture 2: oof of Switching Lemma Yuan Li June 25, 2014 1 Decision Tree Instead of bounding the probability that f can be written as some s-dnf, we estimate the probability that f can be computed by a
More information3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ H. PPSZ Hold in General
3-SAT Faster and Simpler - Unique-SAT Bounds for PPSZ Hold in General Institute for Theoretical Computer Science Department of Computer Science ETH Zürich, Switzerland October 10, 2011 China Theory Week
More informationSection 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y
Paul J. Bruillard MATH 0.970 Problem Set 6 An Introduction to Abstract Mathematics R. Bond and W. Keane Section 3.1: 3b,c,e,i, 4bd, 6, 9, 15, 16, 18c,e, 19a, 0, 1b Section 3.: 1f,i, e, 6, 1e,f,h, 13e,
More informationToda s Theorem: PH P #P
CS254: Computational Compleit Theor Prof. Luca Trevisan Final Project Ananth Raghunathan 1 Introduction Toda s Theorem: PH P #P The class NP captures the difficult of finding certificates. However, in
More information4 Inverse function theorem
Tel Aviv Universit, 2013/14 Analsis-III,IV 53 4 Inverse function theorem 4a What is the problem................ 53 4b Simple observations before the theorem..... 54 4c The theorem.....................
More informationarxiv: v2 [math.co] 21 Apr 2012
INTERVALS OF BALANCED BINARY TREES IN THE TAMARI LATTICE arxiv:117.3472v2 [math.co] 21 Apr 212 SAMUELE GIRAUDO Abstract. We show that the set of balanced binar trees is closed b interval in the Tamari
More informationProvable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability:
Provable intractabilit -completeness Selected from Computer and Intractabilit b MR Gare and DS Johnson (979) Two causes of intractabilit: The problem is so difficult that an exponential amount of time
More informationSection 1.5 Formal definitions of limits
Section.5 Formal definitions of limits (3/908) Overview: The definitions of the various tpes of limits in previous sections involve phrases such as arbitraril close, sufficientl close, arbitraril large,
More informationBiostatistics in Research Practice - Regression I
Biostatistics in Research Practice - Regression I Simon Crouch 30th Januar 2007 In scientific studies, we often wish to model the relationships between observed variables over a sample of different subjects.
More informationNP-Completeness Review
CS124 NP-Completeness Review Where We Are Headed Up to this point, we have generally assumed that if we were given a problem, we could find a way to solve it. Unfortunately, as most of you know, there
More informationSchool of Computer and Communication Sciences. Information Theory and Coding Notes on Random Coding December 12, 2003.
ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE School of Computer and Communication Sciences Handout 8 Information Theor and Coding Notes on Random Coding December 2, 2003 Random Coding In this note we prove
More informationBinary Decision Diagrams
Binar Decision Diagrams Ma 3, 2004 1 Overview Boolean functions Possible representations Binar decision trees Binar decision diagrams Ordered binar decision diagrams Reduced ordered binar decision diagrams
More informationCSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds
CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching
More informationReview Topics for MATH 1400 Elements of Calculus Table of Contents
Math 1400 - Mano Table of Contents - Review - page 1 of 2 Review Topics for MATH 1400 Elements of Calculus Table of Contents MATH 1400 Elements of Calculus is one of the Marquette Core Courses for Mathematical
More informationAdditional Material On Recursive Sequences
Penn State Altoona MATH 141 Additional Material On Recursive Sequences 1. Graphical Analsis Cobweb Diagrams Consider a generic recursive sequence { an+1 = f(a n ), n = 1,, 3,..., = Given initial value.
More informationINTRODUCTION TO DIOPHANTINE EQUATIONS
INTRODUCTION TO DIOPHANTINE EQUATIONS In the earl 20th centur, Thue made an important breakthrough in the stud of diophantine equations. His proof is one of the first eamples of the polnomial method. His
More informationSolutions to Two Interesting Problems
Solutions to Two Interesting Problems Save the Lemming On each square of an n n chessboard is an arrow pointing to one of its eight neighbors (or off the board, if it s an edge square). However, arrows
More informationSolving SAT for CNF formulas with a one-sided restriction on variable occurrences
Solving SAT for CNF formulas with a one-sided restriction on variable occurrences Daniel Johannsen 1, Igor Razgon 2, and Magnus Wahlström 1 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2
More information6.4 graphs OF logarithmic FUnCTIOnS
SECTION 6. graphs of logarithmic functions 9 9 learning ObjeCTIveS In this section, ou will: Identif the domain of a logarithmic function. Graph logarithmic functions. 6. graphs OF logarithmic FUnCTIOnS
More informationFoundations of Databases
Foundations of Databases (Slides adapted from Thomas Eiter, Leonid Libkin and Werner Nutt) Foundations of Databases 1 Quer optimization: finding a good wa to evaluate a quer Queries are declarative, and
More informationDesign and Analysis of Algorithms
CSE 0, Winter 208 Design and Analsis of Algorithms Lecture 6: NP-Completeness, Part 2 Class URL: http://vlsicad.ucsd.edu/courses/cse0-w8/ The Classes P and NP Classes of Decision Problems P: Problems for
More information15. Eigenvalues, Eigenvectors
5 Eigenvalues, Eigenvectors Matri of a Linear Transformation Consider a linear ( transformation ) L : a b R 2 R 2 Suppose we know that L and L Then c d because of linearit, we can determine what L does
More informationThe Complexity of Unique k-sat: An Isolation Lemma for k-cnfs
The Complexity of Unique k-sat: An Isolation Lemma for k-cnfs Chris Calabro Russell Impagliazzo Valentine Kabanets Ramamohan Paturi June 20, 2006 Abstract We provide some evidence that Unique k-sat is
More informationThe Complexity of Satisfiability of Small Depth Circuits
The Complexity of Satisfiability of Small Depth Circuits Chris Calabro, Russell Impagliazzo, and Ramamohan Paturi Department of Computer Science and Engineering University of California, San Diego La Jolla,
More informationOn the Structure and the Number of Prime Implicants of 2-CNFs
On the Structure and the Number of Prime Implicants of 2-CNFs Navid Talebanfard Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Meguro-ku Ookayama 2-12-1, Japan 152-8552
More informationLecture 14 - P v.s. NP 1
CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) February 27, 2018 Lecture 14 - P v.s. NP 1 In this lecture we start Unit 3 on NP-hardness and approximation
More informationDesign and Analysis of Algorithms
CSE 101, Winter 2018 Design and Analsis of Algorithms Lecture 15: NP-Completeness Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ From Application to Algorithm Design Find all maimal regularl-spaced,
More informationOn the correlation of parity and small-depth circuits
Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract
More informationEQUIVALENT FORMULATIONS OF HYPERCONTRACTIVITY USING INFORMATION MEASURES
1 EQUIVALENT FORMULATIONS OF HYPERCONTRACTIVITY USING INFORMATION MEASURES CHANDRA NAIR 1 1 Dept. of Information Engineering, The Chinese Universit of Hong Kong Abstract We derive alternate characterizations
More informationOn Quantum Versions of Record-Breaking Algorithms for SAT
On Quantum Versions of Record-Breaking Algorithms for SAT Evgeny Dantsin 1, Vladik Kreinovich 2, and Alexander Wolpert 1 1 Department of Computer Science, Roosevelt University Chicago, IL 60605, USA, {edantsin,awolpert}@roosevelt.edu
More informationLines and Planes 1. x(t) = at + b y(t) = ct + d
1 Lines in the Plane Lines and Planes 1 Ever line of points L in R 2 can be epressed as the solution set for an equation of the form A + B = C. Will we call this the ABC form. Recall that the slope-intercept
More informationCS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.
CS684: Advanced Complexity Theory Mar 29, 22 Lecture 46 : Size lower bounds for AC circuits computing Parity Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. Theme: Circuit Complexity Lecture Plan: Proof
More informationSearch Trees. Chapter 10. CSE 2011 Prof. J. Elder Last Updated: :52 AM
Search Trees Chapter 1 < 6 2 > 1 4 = 8 9-1 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 2 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 3 - Binary Search Trees Ø A binary search
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170
UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability
More informationCSE 546 Midterm Exam, Fall 2014
CSE 546 Midterm Eam, Fall 2014 1. Personal info: Name: UW NetID: Student ID: 2. There should be 14 numbered pages in this eam (including this cover sheet). 3. You can use an material ou brought: an book,
More informationFinite Automata. Mahesh Viswanathan
Finite Automata Mahesh Viswanathan In this lecture, we will consider different models of finite state machines and study their relative power. These notes assume that the reader is familiar with DFAs,
More informationSection 1.2: Relations, from College Algebra: Corrected Edition by Carl Stitz, Ph.D. and Jeff Zeager, Ph.D. is available under a Creative Commons
Section.: Relations, from College Algebra: Corrected Edition b Carl Stitz, Ph.D. and Jeff Zeager, Ph.D. is available under a Creative Commons Attribution-NonCommercial-ShareAlike.0 license. 0, Carl Stitz.
More informationPolynomial and Rational Functions
Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of work b Horia Varlan;
More information1 Randomized reduction: a first start
6.S078 Fine-Grained Algorithms and Complexity MIT Lectures 3 and 4 February 14 and 21, 2018 Today: In the previous two lectures, we mentioned ETH and SETH, about the time complexity of SAT. Today we want
More informationAn algorithm for the satisfiability problem of formulas in conjunctive normal form
Journal of Algorithms 54 (2005) 40 44 www.elsevier.com/locate/jalgor An algorithm for the satisfiability problem of formulas in conjunctive normal form Rainer Schuler Abt. Theoretische Informatik, Universität
More informationClause Shortening Combined with Pruning Yields a New Upper Bound for Deterministic SAT Algorithms
Clause Shortening Combined with Pruning Yields a New Upper Bound for Deterministic SAT Algorithms Evgeny Dantsin,EdwardA.Hirsch 2,, and Alexander Wolpert Roosevelt University, 430 S. Michigan Av., Chicago,
More information0.24 adults 2. (c) Prove that, regardless of the possible values of and, the covariance between X and Y is equal to zero. Show all work.
1 A socioeconomic stud analzes two discrete random variables in a certain population of households = number of adult residents and = number of child residents It is found that their joint probabilit mass
More information1.2 Relations. 20 Relations and Functions
0 Relations and Functions. Relations From one point of view, all of Precalculus can be thought of as studing sets of points in the plane. With the Cartesian Plane now fresh in our memor we can discuss
More informationEngineering Mathematics I
Engineering Mathematics I_ 017 Engineering Mathematics I 1. Introduction to Differential Equations Dr. Rami Zakaria Terminolog Differential Equation Ordinar Differential Equations Partial Differential
More informationCPS 616 ITERATIVE IMPROVEMENTS 10-1
CPS 66 ITERATIVE IMPROVEMENTS 0 - APPROACH Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change
More informationNATIONAL UNIVERSITY OF SINGAPORE Department of Mathematics MA4247 Complex Analysis II Lecture Notes Part I
NATIONAL UNIVERSITY OF SINGAPORE Department of Mathematics MA4247 Comple Analsis II Lecture Notes Part I Chapter 1 Preliminar results/review of Comple Analsis I These are more detailed notes for the results
More informationProperties of Limits
33460_003qd //04 :3 PM Page 59 SECTION 3 Evaluating Limits Analticall 59 Section 3 Evaluating Limits Analticall Evaluate a it using properties of its Develop and use a strateg for finding its Evaluate
More informationFIRST- AND SECOND-ORDER IVPS The problem given in (1) is also called an nth-order initial-value problem. For example, Solve: Solve:
.2 INITIAL-VALUE PROBLEMS 3.2 INITIAL-VALUE PROBLEMS REVIEW MATERIAL Normal form of a DE Solution of a DE Famil of solutions INTRODUCTION We are often interested in problems in which we seek a solution
More informationAn Improved Upper Bound for SAT
An Improved Upper Bound for SAT Evgeny Dantsin and Alexander Wolpert Roosevelt University, 430 S. Michigan Av., Chicago, IL 60605, USA {edantsin, awolpert}@roosevelt.edu Abstract. We give a randomized
More informationClause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas
Journal of Artificial Intelligence Research 1 (1993) 1-15 Submitted 6/91; published 9/91 Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas Enrico Giunchiglia Massimo
More informationDerivatives of Multivariable Functions
Chapter 0 Derivatives of Multivariable Functions 0. Limits Motivating Questions In this section, we strive to understand the ideas generated b the following important questions: What do we mean b the limit
More informationA Duality between Clause Width and Clause Density for SAT
A Duality between Clause Width and Clause Density for SAT Chris Calabro, Russell Impagliazzo, Ramamohan Paturi University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093 ccalabro,russell,paturi
More informationUNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS )
UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS ) CHAPTER : Limits and continuit of functions in R n. -. Sketch the following subsets of R. Sketch their boundar and the interior. Stud
More informationCIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE
CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE KOJI KOBAYASHI Abstract. This paper describes about relation between circuit compleit and accept inputs structure in Hamming space b using almost
More informationWe have examined power functions like f (x) = x 2. Interchanging x
CHAPTER 5 Eponential and Logarithmic Functions We have eamined power functions like f =. Interchanging and ields a different function f =. This new function is radicall different from a power function
More informationFlows and Connectivity
Chapter 4 Flows and Connectivit 4. Network Flows Capacit Networks A network N is a connected weighted loopless graph (G,w) with two specified vertices and, called the source and the sink, respectivel,
More informationSection 1.2: A Catalog of Functions
Section 1.: A Catalog of Functions As we discussed in the last section, in the sciences, we often tr to find an equation which models some given phenomenon in the real world - for eample, temperature as
More informationExponential and Logarithmic Functions
Eponential and Logarithmic Functions 6 Figure Electron micrograph of E. Coli bacteria (credit: Mattosaurus, Wikimedia Commons) CHAPTER OUTLINE 6. Eponential Functions 6. Logarithmic Properties 6. Graphs
More informationLESSON #48 - INTEGER EXPONENTS COMMON CORE ALGEBRA II
LESSON #8 - INTEGER EXPONENTS COMMON CORE ALGEBRA II We just finished our review of linear functions. Linear functions are those that grow b equal differences for equal intervals. In this unit we will
More informationOn the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes
On the NP-Hardness of Bounded Distance Decoding of Reed-Solomon Codes Venkata Gandikota Purdue Universit Badih Ghazi MIT Elena Grigorescu Purdue Universit Abstract Guruswami and Vard (IEEE Trans. Inf.
More informationThe Entropy Power Inequality and Mrs. Gerber s Lemma for Groups of order 2 n
The Entrop Power Inequalit and Mrs. Gerber s Lemma for Groups of order 2 n Varun Jog EECS, UC Berkele Berkele, CA-94720 Email: varunjog@eecs.berkele.edu Venkat Anantharam EECS, UC Berkele Berkele, CA-94720
More informationProblems and results for the ninth week Mathematics A3 for Civil Engineering students
Problems and results for the ninth week Mathematics A3 for Civil Engineering students. Production line I of a factor works 0% of time, while production line II works 70% of time, independentl of each other.
More informationAlgorithms for Satisfiability Using Independent Sets of Variables
Algorithms for Satisfiability Using Independent Sets of Variables Ravi Gummadi, N.S. Narayanaswamy,, and R. Venkatakrishnan 2 Department of Computer Science and Engineering, Indian Institute of Technology
More informationRepresentation of Functions by Power Series. Geometric Power Series
60_0909.qd //0 :09 PM Page 669 SECTION 9.9 Representation of Functions b Power Series 669 The Granger Collection Section 9.9 JOSEPH FOURIER (768 80) Some of the earl work in representing functions b power
More informationLinear regression Class 25, Jeremy Orloff and Jonathan Bloom
1 Learning Goals Linear regression Class 25, 18.05 Jerem Orloff and Jonathan Bloom 1. Be able to use the method of least squares to fit a line to bivariate data. 2. Be able to give a formula for the total
More informationCS 395T Computational Learning Theory. Scribe: Mike Halcrow. x 4. x 2. x 6
CS 395T Computational Learning Theory Lecture 3: September 0, 2007 Lecturer: Adam Klivans Scribe: Mike Halcrow 3. Decision List Recap In the last class, we determined that, when learning a t-decision list,
More informationUniversity of Toronto Mississauga
Surname: First Name: Student Number: Tutorial: Universit of Toronto Mississauga Mathematical and Computational Sciences MATY5Y Term Test Duration - 0 minutes No Aids Permitted This eam contains pages (including
More information5. Zeros. We deduce that the graph crosses the x-axis at the points x = 0, 1, 2 and 4, and nowhere else. And that s exactly what we see in the graph.
. Zeros Eample 1. At the right we have drawn the graph of the polnomial = ( 1) ( 2) ( 4). Argue that the form of the algebraic formula allows ou to see right awa where the graph is above the -ais, where
More informationCONVEX FUNCTIONS WITH RESPECT TO A MEAN AND A CHARACTERIZATION OF QUASI-ARITHMETIC MEANS
Real Analsis Echange Vol. 29(1), 2003/2004, pp. 229246 Janusz Matkowski, Institute of Mathematics, Universit of Zielona Góra, PL-65-246 Zielona Góra, Poland. email: J.Matkowski@im.uz.zgora.pl CONVEX FUNCTIONS
More informationCS Lecture 28 P, NP, and NP-Completeness. Fall 2008
CS 301 - Lecture 28 P, NP, and NP-Completeness Fall 2008 Review Languages and Grammars Alphabets, strings, languages Regular Languages Deterministic Finite and Nondeterministic Automata Equivalence of
More information5A Exponential functions
Chapter 5 5 Eponential and logarithmic functions bjectives To graph eponential and logarithmic functions and transformations of these functions. To introduce Euler s number e. To revise the inde and logarithm
More informationNoncommuting Rotation and Angular Momentum Operators
Noncommuting Rotation and Angular Momentum Operators Originall appeared at: http://behindtheguesses.blogspot.com/2009/08/noncommuting-rotation-and-angular.html Eli Lanse elanse@gmail.com August 31, 2009
More informationSearch Trees. EECS 2011 Prof. J. Elder Last Updated: 24 March 2015
Search Trees < 6 2 > 1 4 = 8 9-1 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 2 - Learning Outcomes Ø From this lecture, you should be able to: q Define the properties of a binary search
More informationTwo NP-hard Interchangeable Terminal Problems*
o NP-hard Interchangeable erminal Problems* Sartaj Sahni and San-Yuan Wu Universit of Minnesota ABSRAC o subproblems that arise hen routing channels ith interchangeable terminals are shon to be NP-hard
More informationLecture 3: September 10
CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 3: September 10 Lecturer: Prof. Alistair Sinclair Scribes: Andrew H. Chan, Piyush Srivastava Disclaimer: These notes have not
More information11.1 Double Riemann Sums and Double Integrals over Rectangles
Chapter 11 Multiple Integrals 11.1 ouble Riemann Sums and ouble Integrals over Rectangles Motivating Questions In this section, we strive to understand the ideas generated b the following important questions:
More information4Cubic. polynomials UNCORRECTED PAGE PROOFS
4Cubic polnomials 4.1 Kick off with CAS 4. Polnomials 4.3 The remainder and factor theorems 4.4 Graphs of cubic polnomials 4.5 Equations of cubic polnomials 4.6 Cubic models and applications 4.7 Review
More informationLESSON #24 - POWER FUNCTIONS COMMON CORE ALGEBRA II
1 LESSON #4 - POWER FUNCTIONS COMMON CORE ALGEBRA II Before we start to analze polnomials of degree higher than two (quadratics), we first will look at ver simple functions known as power functions. The
More informationOptimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs
Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs Krishnendu Chatterjee Rasmus Ibsen-Jensen Andreas Pavlogiannis IST Austria Abstract. We consider graphs with n nodes together
More information1 More finite deterministic automata
CS 125 Section #6 Finite automata October 18, 2016 1 More finite deterministic automata Exercise. Consider the following game with two players: Repeatedly flip a coin. On heads, player 1 gets a point.
More informationa. plotting points in Cartesian coordinates (Grade 9 and 10), b. using a graphing calculator such as the TI-83 Graphing Calculator,
GRADE PRE-CALCULUS UNIT C: QUADRATIC FUNCTIONS CLASS NOTES FRAME. After linear functions, = m + b, and their graph the Quadratic Functions are the net most important equation or function. The Quadratic
More informationPropositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST
Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST moonzoo@cs.kaist.ac.kr 1 Overview 2.1 Boolean operators 2.2 Propositional formulas 2.3 Interpretations 2.4 Logical Equivalence and substitution
More information5.6 RATIOnAl FUnCTIOnS. Using Arrow notation. learning ObjeCTIveS
CHAPTER PolNomiAl ANd rational functions learning ObjeCTIveS In this section, ou will: Use arrow notation. Solve applied problems involving rational functions. Find the domains of rational functions. Identif
More informationA. Real numbers greater than 2 B. Real numbers less than or equal to 2. C. Real numbers between 1 and 3 D. Real numbers greater than or equal to 2
39 CHAPTER 9 DAY 0 DAY 0 Opportunities To Learn You are what ou are when nobod Is looking. - Ann Landers 6. Match the graph with its description. A. Real numbers greater than B. Real numbers less than
More informationCMPUT 675: Approximation Algorithms Fall 2014
CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph
More informationCS 151. Red Black Trees & Structural Induction. Thursday, November 1, 12
CS 151 Red Black Trees & Structural Induction 1 Announcements Majors fair tonight 4:30-6:30pm in the Root Room in Carnegie. Come and find out about the CS major, or some other major. Winter Term in CS
More informationContext-Free Languages
CS:4330 Theory of Computation Spring 2018 Context-Free Languages Non-Context-Free Languages Haniel Barbosa Readings for this lecture Chapter 2 of [Sipser 1996], 3rd edition. Section 2.3. Proving context-freeness
More informationResolution Lower Bounds for the Weak Pigeonhole Principle
Electronic Colloquium on Computational Complexity, Report No. 21 (2001) Resolution Lower Bounds for the Weak Pigeonhole Principle Ran Raz Weizmann Institute, and The Institute for Advanced Study ranraz@wisdom.weizmann.ac.il
More informationNP-Completeness of Refutability by Literal-Once Resolution
NP-Completeness of Refutability by Literal-Once Resolution Stefan Szeider Institute of Discrete Mathematics Austrian Academy of Sciences Sonnenfelsgasse 19, 1010 Vienna, Austria stefan.szeider@oeaw.ac.at
More information8. BOOLEAN ALGEBRAS x x
8. BOOLEAN ALGEBRAS 8.1. Definition of a Boolean Algebra There are man sstems of interest to computing scientists that have a common underling structure. It makes sense to describe such a mathematical
More informationComp487/587 - Boolean Formulas
Comp487/587 - Boolean Formulas 1 Logic and SAT 1.1 What is a Boolean Formula Logic is a way through which we can analyze and reason about simple or complicated events. In particular, we are interested
More informationHamiltonicity and Fault Tolerance
Hamiltonicit and Fault Tolerance in the k-ar n-cube B Clifford R. Haithcock Portland State Universit Department of Mathematics and Statistics 006 In partial fulfillment of the requirements of the degree
More informationCorrelation analysis 2: Measures of correlation
Correlation analsis 2: Measures of correlation Ran Tibshirani Data Mining: 36-462/36-662 Februar 19 2013 1 Review: correlation Pearson s correlation is a measure of linear association In the population:
More informationMath 107: Calculus II, Spring 2015: Midterm Exam II Monday, April Give your name, TA and section number:
Math 7: Calculus II, Spring 25: Midterm Exam II Monda, April 3 25 Give our name, TA and section number: Name: TA: Section number:. There are 5 questions for a total of points. The value of each part of
More informationNotes on Computer Theory Last updated: November, Circuits
Notes on Computer Theory Last updated: November, 2015 Circuits Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Circuits Boolean circuits offer an alternate model of computation: a non-uniform one
More information