Hardness of Function Composition for Semantic Read once Branching. Programs. June 23, 2018

Size: px
Start display at page:

Download "Hardness of Function Composition for Semantic Read once Branching. Programs. June 23, 2018"

Transcription

1 once for once June 23, 2018

2 P and L once P: Polynomial time computable functions. * * * * L : s computable in logarithmic space. L? P

3 f (x 1, x 2,.., x n ) {0, 1} Definition Deterministic program DAG with a source node and two sinks, 1-sink (for accept) and 0-sink (for reject). x i {0, 1}, i [n] Each non-sink node is labeled by some x i, outdegree 2 with an edge each for x i = 0 and x i = 1. once start, x x 2 0 x 3 0 x 4 0 x x 2 0 x 3 0 x 4 0 x 5 0 1

4 Non-det Definition Non-deterministic program (NBP) Start allow unlabelled guessing nodes and arbitrary out-degree. x 11 x 12 x 13 x 21 x 22 x 23 x 31 x 32 x 33 x 41 x 42 x 43 1 once x 14 x 24 x 34 x 44 The size of a NBP= number of labelled nodes.

5 NBP computing f : {0, 1} n {0, 1} once x 11 x 21 x 31 x 41 Start x 12 x 13 x 14 x 22 x 23 x 24 x 32 x 33 x 34 x 42 x 43 x 44 f (u) = 1 a path from source to accept node that is consistent with input u. 1

6 Program Size and Space Complexity of computing f once BP(f n ) = S(f n ) = min B BP computing f n size (B) min space complexity (T ) T non-uniform TMs computing f n log(bp(f n )) S(f n ) [Cobham 66]

7 Big Picture once It is easy to show functions with high BP(f n ) exist.

8 Big Picture once It is easy to show functions with high BP(f n ) exist. Can we show that some function in P requires exponential size BP? amounts to showing L P.

9 BPs and other Computation Models Formulas Circuits L(f ) BP(f ) 1 3 C(f ) once

10 BPs and other Computation Models Formulas Circuits L(f ) BP(f ) 1 3 C(f ) Ω ( n 3) ( ) Ω n 2 log 2 n Ω (n) Random Restrictions Nechiporuk Gate Elimination once

11 Restricted once Bounded Width: same as NC 1, Barrington s characterization.

12 Restricted once Bounded Width: same as NC 1, Barrington s characterization. Length give Time-Space tradeoffs.

13 Time-Space tradeoffs t cn = s = 2 Ω(n) Jukna 09 once

14 Time-Space tradeoffs t cn = s = 2 Ω(n) Jukna 09 culmination results by Ajtai 99 and Beame,Jayram, Saks 01 once

15 Time-Space tradeoffs t cn = s = 2 Ω(n) Jukna 09 culmination results by Ajtai 99 and Beame,Jayram, Saks 01 We look at: time-space tradeoffs for iterated function composition. once

16 Read Once Syntactic read once: Along any path from source to sink any variable appears atmost once. x 11 x 21 x 31 once Start 1 x 12 x 22 x 32 x 13 x x 33 23

17 Read Once Syntactic read once: Along any path from source to sink any variable appears atmost once. x 11 x 21 x 31 once Start 1 x 12 x 22 x 32 x 13 x 11 x 23 x 21 x 33 x Start 1 x 12 x 22 x x 13 x 23 x Semantic read once: Along any consistent path from source to sink no variable is read more than once.

18 syntactic weaker than semantic The Exact Perfect matching function(epm n ): accept a matrix iff it is a permutation matrix. Jukna and Razborov 98 showed Theorem Every syntactic read once NBP computing EPM n must have size 2 Ω(n). once

19 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ) once

20 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x once Start x 12 x 22 x 32 x 13 x 23 x 33

21 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 x

22 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 Sees only 1s x

23 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 Sees only 1s x Sees only 0s

24 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 Sees only 1s x Sees only 0s

25 Embedded C red {w} C blue [D] n C red D A w D [n] A B w C blue D B A [n] B [n] { } once

26 Embedded C red {w} C blue [D] n C red D A w D [n] A B w C blue D B A [n] B [n] {102101} once

27 KRW Conjecture once an approach to separating NC 1 from NC 2. KRW conjecture that for every random f and g, D(fog) ɛd(f ) + D(g). KRW conjecture on formula size of a composed function fog. L(fog) L(f )L(g)?

28 Understanding once How does space compose?

29 TEP h d Cook et.al 2012 once f : [k] 2 [k] [k] Figure: TEP2 4 that is height 4, degree 2.

30 TEP h d Cook et.al 2012 once Figure: TEP 4 2 f : [k] 2 [k] [k] that is height 4, degree 2. Is BP(TEP h 2 ) = Ω(kh )??

31 TEP h d Cook et.al 2012 once Figure: TEP 4 2 f : [k] 2 [k] [k] that is height 4, degree 2. Is BP(TEP h 2 ) = Ω(kh )?? = L P

32 Boolean TEP once K ɛ density K 1 ɛ Tree F,ɛ ( )

33 Lower Bound for composition Theorem For any h, and k sufficiently large, there exists ɛ and F such that any k-ary nondeterministic semantic read-once branching program for ternary Tree F,ɛ requires size at least ( ) k h. log k once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

34 Black White pebbling Upperbound once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

35 1 2 (d 1)h + 1 pebbles at this moment once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

36 Guess the remaining siblings once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

37 Infer the root once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

38 Unpebble blacks once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

39 Verify Guesses once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

40 lower bound uses Invertible functions once Definition A Latin Cube is a function f : [k] 3 [k] such that f is invertible in each of its coordinates. Equivalently, every element of [k] appears exactly once along every row,column and leg in the cube [k] 3. Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

41 4-invertible function, f : [k] 3 [k] once Definition Any element in [k] appears at most 4 times along any row,column or leg in the cube [k] 3. Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

42 Proof Overview A small BP for a = Tree F,ɛ accepts a large Tree F,ɛ rectangle of inputs over its leaves once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

43 Proof Overview A small BP for a = Tree F,ɛ accepts a large Tree F,ɛ rectangle of inputs over its leaves A large rectangle = a special node v* in the tree over leaves whose F v can be described in few bits. once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

44 Proof Overview A small BP for a = Tree F,ɛ accepts a large Tree F,ɛ rectangle of inputs over its leaves A large rectangle = a special node v* in the tree over leaves whose F v can be described in few bits. Show that the distribution on F is rich or sufficiently random looking that one cannot save these bits. once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

45 for every accepting input a special query state: once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) h 2 A white subtree has at least a fraction of leaf node which are white Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) h 2 A red subtree has at least a fraction of leaf node which are red Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)

46 few special states = a large embedded rectangle over leaves v start q v 1 v Most popular Choose a popular labelled path down the tree. Choose a popular red variable for the first red-subtree. Prune the input set. Continue to choose h red variables one for each red-subtree. Similarly for each blue-subtree. Fix the remaining variables in [n]-red-blue to the most popular projection w. once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

47 a large embedded rectangle over the leaves. once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)

48 a node v at which leaves in both red and blue trees take a lot of values. once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)

49 a node v at which both red and blue child take a lot of values. once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)

50 a node v with low entropy on a Two-way product set once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)

51 Two-way Product Set at v, in F v () once A C A, C [k] A = C = r << k Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

52 Two-way Product Set at v, in F v () once A C A, C [k] A = C = r << k S r = {(x, Q(x, y), y) x A, y C} S = r 2 Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

53 Enropy of spread on Two-way Product Set can t be low A C A, C [k] A = C = r << k S r = {(x, B(x, y), y) x A, y C} S = r 2 Two-way Product Sets S r and target set T ɛ Pr [f (S r ) T ɛ ] 1 f U(All 4-invertible cubes) k ɛr 2 once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

54 Label once α h βh h 2 A red subtree has at least one red leaf node α h 1 α h 2 α i α 2 vi β h 1 β h 2 β i β 2 h 2 A white subtree has at least one white leaf node Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion α 1? β1 Figure: This figure depicts a label L F associated with a problem instance Tree F

55 many F that remain unaccounted without such a special label. once F < v, S A, S B.. > Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion

56 More general time space tradeoffs for composition. Exponential lower bound for boolean semantic NBPs for some problem in P. super-quadratic lower bound for BPs via understanding composition fog where g is element distinctness. once

57 once Thank You!

Hardness of Function Composition for Semantic Read once Branching Programs

Hardness of Function Composition for Semantic Read once Branching Programs Hardness of Function Composition for Semantic Read once Branching Programs Jeff Edmonds York University, 4700 Keele Street, Toronto, CANADA jeff@cse.yorku.ca http://www.cs.yorku.ca/ jeff/ Venkatesh Medabalimi

More information

Challenge to L is not P Hypothesis by Analysing BP Lower Bounds

Challenge to L is not P Hypothesis by Analysing BP Lower Bounds Challenge to L is not P Hypothesis by Analysing BP Lower Bounds Atsuki Nagao (The University of Electro-Communications) Joint work with Kazuo Iwama (Kyoto University) Self Introduction -2010 : Under graduate

More information

Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs

Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs Stephen Cook Jeff Edmonds Venkatesh Medabalimi Toniann Pitassi August 10, 2015 Abstract We prove exponential lower bounds on the

More information

Read-Once Branching Programs for Tree Evaluation Problems

Read-Once Branching Programs for Tree Evaluation Problems Read-Once Branching Programs for Tree Evaluation Problems Kazuo Iwama 1 and Atsuki Nagao 2 1 Graduate School of Informatics, Kyoto University, Kyoto, Japan iwama@kuis.kyoto-u.ac.jp 2 Graduate School of

More information

The Tree Evaluation Problem: Towards Separating P from NL. Lecture #6: 26 February 2014

The Tree Evaluation Problem: Towards Separating P from NL. Lecture #6: 26 February 2014 The Tree Evaluation Problem: Towards Separating P from NL Lecture #6: 26 February 2014 Lecturer: Stephen A. Cook Scribe Notes by: Venkatesh Medabalimi 1. Introduction Consider the sequence of complexity

More information

Branching Programs for Tree Evaluation

Branching Programs for Tree Evaluation Branching Programs for Tree Evaluation Mark Braverman 1, Stephen Cook 2, Pierre McKenzie 3, Rahul Santhanam 4, and Dustin Wehr 2 1 Microsoft Research 2 University of Toronto 3 Université de Montréal 4

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Yet Harder Knapsack Problems

Yet Harder Knapsack Problems Yet Harder Knapsack Problems Stasys Jukna,1 Georg Schnitger University of Frankfurt, Institut of Computer Science, D-60054 Frankfurt, Germany. Abstract Already 30 years ago, Chvátal has shown that some

More information

Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs

Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs Stephen Cook 1, Jeff Edmonds 2, Venkatesh Medabalimi 1, and Toniann Pitassi 1 1 University of Toronto, Computer Science Department,

More information

DRAFT. Algebraic computation models. Chapter 14

DRAFT. Algebraic computation models. Chapter 14 Chapter 14 Algebraic computation models Somewhat rough We think of numerical algorithms root-finding, gaussian elimination etc. as operating over R or C, even though the underlying representation of the

More information

Notes on Logarithmic Lower Bounds in the Cell Probe Model

Notes on Logarithmic Lower Bounds in the Cell Probe Model Notes on Logarithmic Lower Bounds in the Cell Probe Model Kevin Zatloukal November 10, 2010 1 Overview Paper is by Mihai Pâtraşcu and Erik Demaine. Both were at MIT at the time. (Mihai is now at AT&T Labs.)

More information

Introduction to Quantum Branching Programs

Introduction to Quantum Branching Programs Introduction to Quantum Branching Programs Chris Pollett (based on joint work with Farid Ablayev, Aida Gainutdinova, Marek Karpinski, and Cristopher Moore) Apr. 4, 2006. Outline Classical Branching Programs

More information

Math 262A Lecture Notes - Nechiporuk s Theorem

Math 262A Lecture Notes - Nechiporuk s Theorem Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower

More information

Pebbles and Branching Programs

Pebbles and Branching Programs Pebbles and Branching Programs Stephen Cook On the occasion of Les Valiant s 60th Birthday Celebration May 30, 2009 Joint work with Mark Braverman Pierre McKenzie Rahul Santhanam Dustin Wehr 1 Perhaps

More information

Lecture 21: Algebraic Computation Models

Lecture 21: Algebraic Computation Models princeton university cos 522: computational complexity Lecture 21: Algebraic Computation Models Lecturer: Sanjeev Arora Scribe:Loukas Georgiadis We think of numerical algorithms root-finding, gaussian

More information

A note on monotone real circuits

A note on monotone real circuits A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Algorithms as Lower Bounds

Algorithms as Lower Bounds Algorithms as Lower Bounds Lecture 3 Part 1: Solving QBF and NC1 Lower Bounds (Joint work with Rahul Santhanam, U. Edinburgh) Part 2: Time-Space Tradeoffs for SAT Ryan Williams Stanford University Quantified

More information

arxiv: v1 [cs.cc] 22 Aug 2018

arxiv: v1 [cs.cc] 22 Aug 2018 New Bounds for Energy Complexity of Boolean Functions Krishnamoorthy Dinesh Samir Otiv Jayalal Sarma arxiv:1808.07199v1 [cs.cc] 22 Aug 2018 Abstract For a Boolean function f : {0, 1} n {0, 1} computed

More information

Book Introduction by the Authors

Book Introduction by the Authors Book Introduction by the Authors Invited by Kazuo Iwama iwama@kuis.kyoto-u.ac.jp Bulletin Editor Kyoto University, Japan 215 BEATCS no 113 Boolean Function Complexity Advances and Frontiers Stasys Jukna

More information

1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions

1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions CS 6743 Lecture 15 1 Fall 2007 1 Circuit Complexity 1.1 Definitions A Boolean circuit C on n inputs x 1,..., x n is a directed acyclic graph (DAG) with n nodes of in-degree 0 (the inputs x 1,..., x n ),

More information

CS151 Complexity Theory

CS151 Complexity Theory Introduction CS151 Complexity Theory Lecture 5 April 13, 2004 Power from an unexpected source? we know PEXP, which implies no polytime algorithm for Succinct CVAL poly-size Boolean circuits for Succinct

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

Unit 1A: Computational Complexity

Unit 1A: Computational Complexity Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if

More information

: On the P vs. BPP problem. 18/12/16 Lecture 10

: On the P vs. BPP problem. 18/12/16 Lecture 10 03684155: On the P vs. BPP problem. 18/12/16 Lecture 10 Natural proofs Amnon Ta-Shma and Dean Doron 1 Natural proofs The ultimate goal we have is separating classes (or proving they are equal if they are).

More information

A Lower Bound Technique for Restricted Branching Programs and Applications

A Lower Bound Technique for Restricted Branching Programs and Applications A Lower Bound Technique for Restricted Branching Programs and Applications (Extended Abstract) Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany woelfel@ls2.cs.uni-dortmund.de

More information

Sums of Products. Pasi Rastas November 15, 2005

Sums of Products. Pasi Rastas November 15, 2005 Sums of Products Pasi Rastas November 15, 2005 1 Introduction This presentation is mainly based on 1. Bacchus, Dalmao and Pitassi : Algorithms and Complexity results for #SAT and Bayesian inference 2.

More information

1 Locally computable randomized encodings

1 Locally computable randomized encodings CSG399: Gems of Theoretical Computer Science Lectures 3-4 Feb 20-24, 2009 Instructor: Emanuele Viola Scribe: Eric Miles Cryptography in constant depth: II & III Locally computable randomized encodings

More information

The quantum query complexity of read-many formulas

The quantum query complexity of read-many formulas The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears

More information

Polynomial Hierarchy

Polynomial Hierarchy Polynomial Hierarchy A polynomial-bounded version of Kleene s Arithmetic Hierarchy becomes trivial if P = NP. Karp, 1972 Computational Complexity, by Fu Yuxi Polynomial Hierarchy 1 / 44 Larry Stockmeyer

More information

Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine)

Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Mihai Pǎtraşcu, MIT, web.mit.edu/ mip/www/ Index terms: partial-sums problem, prefix sums, dynamic lower bounds Synonyms: dynamic trees 1

More information

Theory of Computation

Theory of Computation Theory of Computation Dr. Sarmad Abbasi Dr. Sarmad Abbasi () Theory of Computation 1 / 38 Lecture 21: Overview Big-Oh notation. Little-o notation. Time Complexity Classes Non-deterministic TMs The Class

More information

Lecture 7: Polynomial time hierarchy

Lecture 7: Polynomial time hierarchy Computational Complexity Theory, Fall 2010 September 15 Lecture 7: Polynomial time hierarchy Lecturer: Kristoffer Arnsfelt Hansen Scribe: Mads Chr. Olesen Recall that adding the power of alternation gives

More information

Improved bounds for the randomized decision tree complexity of recursive majority

Improved bounds for the randomized decision tree complexity of recursive majority Improved bounds for the randomized decision tree complexity of recursive majority Frédéric Magniez Ashwin Nayak Miklos Santha David Xiao Abstract We consider the randomized decision tree complexity of

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Beate Bollig, Martin Sauerhoff, Detlef Sieling, and Ingo Wegener FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany lastname@ls2.cs.uni-dortmund.de Abstract Decision diagrams

More information

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis)

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sourav Chakraborty Thesis Advisor: László Babai February, 2005 Abstract We discuss several complexity measures

More information

Models of Computation

Models of Computation Models of Computation Analysis of Algorithms Week 1, Lecture 2 Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Models of Computation (RAM) a) Random Access Machines

More information

Ταουσάκος Θανάσης Αλγόριθμοι και Πολυπλοκότητα II 7 Φεβρουαρίου 2013

Ταουσάκος Θανάσης Αλγόριθμοι και Πολυπλοκότητα II 7 Φεβρουαρίου 2013 Ταουσάκος Θανάσης Αλγόριθμοι και Πολυπλοκότητα II 7 Φεβρουαρίου 2013 Alternation: important generalization of non-determinism Redefining Non-Determinism in terms of configurations: a configuration lead

More information

1 From previous lectures

1 From previous lectures CS 810: Introduction to Complexity Theory 9/18/2003 Lecture 11: P/poly, Sparse Sets, and Mahaney s Theorem Instructor: Jin-Yi Cai Scribe: Aparna Das, Scott Diehl, Giordano Fusco 1 From previous lectures

More information

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching

More information

Algorithms for Boolean Formula Evaluation and for Tree Contraction

Algorithms for Boolean Formula Evaluation and for Tree Contraction Algorithms for Boolean Formula Evaluation and for Tree Contraction Samuel R. Buss Department of Mathematics University of California, San Diego October 15, 1991 Abstract This paper presents a new, simpler

More information

Lecture 8: Complete Problems for Other Complexity Classes

Lecture 8: Complete Problems for Other Complexity Classes IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 8: Complete Problems for Other Complexity Classes David Mix Barrington and Alexis Maciel

More information

CS151 Complexity Theory. Lecture 6 April 19, 2017

CS151 Complexity Theory. Lecture 6 April 19, 2017 CS151 Complexity Theory Lecture 6 Shannon s counting argument frustrating fact: almost all functions require huge circuits Theorem (Shannon): With probability at least 1 o(1), a random function f:{0,1}

More information

CS 151 Complexity Theory Spring Solution Set 5

CS 151 Complexity Theory Spring Solution Set 5 CS 151 Complexity Theory Spring 2017 Solution Set 5 Posted: May 17 Chris Umans 1. We are given a Boolean circuit C on n variables x 1, x 2,..., x n with m, and gates. Our 3-CNF formula will have m auxiliary

More information

More on Noncommutative Polynomial Identity Testing

More on Noncommutative Polynomial Identity Testing More on Noncommutative Polynomial Identity Testing Andrej Bogdanov Hoeteck Wee Abstract We continue the study of noncommutative polynomial identity testing initiated by Raz and Shpilka and present efficient

More information

Lecture 3: Nondeterminism, NP, and NP-completeness

Lecture 3: Nondeterminism, NP, and NP-completeness CSE 531: Computational Complexity I Winter 2016 Lecture 3: Nondeterminism, NP, and NP-completeness January 13, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Nondeterminism and NP Recall the definition

More information

CS20a: NP completeness. NP-complete definition. Related properties. Cook's Theorem

CS20a: NP completeness. NP-complete definition. Related properties. Cook's Theorem CS20a: NP completeness Cook s theorem SAT is an NP-complete problem http://www.cs.caltech.edu/courses/cs20/a/ December 2, 2002 1 NP-complete definition A problem is in NP if it can be solved by a nondeterministic

More information

Complexity (Pre Lecture)

Complexity (Pre Lecture) Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What

More information

: On the P vs. BPP problem. 30/12/2016 Lecture 12

: On the P vs. BPP problem. 30/12/2016 Lecture 12 03684155: On the P vs. BPP problem. 30/12/2016 Lecture 12 Time Hierarchy Theorems Amnon Ta-Shma and Dean Doron 1 Diagonalization arguments Throughout this lecture, for a TM M, we denote M t to be the machine

More information

Ramanujan Graphs of Every Size

Ramanujan Graphs of Every Size Spectral Graph Theory Lecture 24 Ramanujan Graphs of Every Size Daniel A. Spielman December 2, 2015 Disclaimer These notes are not necessarily an accurate representation of what happened in class. The

More information

Randomness and non-uniformity

Randomness and non-uniformity Randomness and non-uniformity JASS 2006 Course 1: Proofs and Computers Felix Weninger TU München April 2006 Outline Randomized computation 1 Randomized computation 2 Computation with advice Non-uniform

More information

The Strength of Multilinear Proofs

The Strength of Multilinear Proofs The Strength of Multilinear Proofs Ran Raz Iddo Tzameret December 19, 2006 Abstract We introduce an algebraic proof system that manipulates multilinear arithmetic formulas. We show that this proof system

More information

The Polynomial Hierarchy

The Polynomial Hierarchy The Polynomial Hierarchy Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Motivation..synthesizing circuits is exceedingly difficulty. It is even

More information

Circuits. Lecture 11 Uniform Circuit Complexity

Circuits. Lecture 11 Uniform Circuit Complexity Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall

More information

Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST

Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST moonzoo@cs.kaist.ac.kr 1 Overview 2.1 Boolean operators 2.2 Propositional formulas 2.3 Interpretations 2.4 Logical Equivalence and substitution

More information

Limitations of Algorithm Power

Limitations of Algorithm Power Limitations of Algorithm Power Objectives We now move into the third and final major theme for this course. 1. Tools for analyzing algorithms. 2. Design strategies for designing algorithms. 3. Identifying

More information

1 Quantum Circuits. CS Quantum Complexity theory 1/31/07 Spring 2007 Lecture Class P - Polynomial Time

1 Quantum Circuits. CS Quantum Complexity theory 1/31/07 Spring 2007 Lecture Class P - Polynomial Time CS 94- Quantum Complexity theory 1/31/07 Spring 007 Lecture 5 1 Quantum Circuits A quantum circuit implements a unitary operator in a ilbert space, given as primitive a (usually finite) collection of gates

More information

Lecture 2: From Classical to Quantum Model of Computation

Lecture 2: From Classical to Quantum Model of Computation CS 880: Quantum Information Processing 9/7/10 Lecture : From Classical to Quantum Model of Computation Instructor: Dieter van Melkebeek Scribe: Tyson Williams Last class we introduced two models for deterministic

More information

Entropy of Operators or Nechiporuk for Depth-2 Circuits

Entropy of Operators or Nechiporuk for Depth-2 Circuits Entropy of Operators or Nechiporuk for Depth-2 Circuits Stasys Jukna Institute of Mathematics, Vilnius, Lithuania University of Frankfurt, Germany Dagstuhl 2008 () 1 / 12 Model = Circuits with Arbitrary

More information

Lecture 10: Boolean Circuits (cont.)

Lecture 10: Boolean Circuits (cont.) CSE 200 Computability and Complexity Wednesday, May, 203 Lecture 0: Boolean Circuits (cont.) Instructor: Professor Shachar Lovett Scribe: Dongcai Shen Recap Definition (Boolean circuit) A Boolean circuit

More information

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.

More information

Lecture 8: Alternatation. 1 Alternate Characterizations of the Polynomial Hierarchy

Lecture 8: Alternatation. 1 Alternate Characterizations of the Polynomial Hierarchy CS 710: Complexity Theory 10/4/2011 Lecture 8: Alternatation Instructor: Dieter van Melkebeek Scribe: Sachin Ravi In this lecture, we continue with our discussion of the polynomial hierarchy complexity

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

6.854 Advanced Algorithms

6.854 Advanced Algorithms 6.854 Advanced Algorithms Homework Solutions Hashing Bashing. Solution:. O(log U ) for the first level and for each of the O(n) second level functions, giving a total of O(n log U ) 2. Suppose we are using

More information

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5 UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look

More information

Polynomial Time Computation. Topics in Logic and Complexity Handout 2. Nondeterministic Polynomial Time. Succinct Certificates.

Polynomial Time Computation. Topics in Logic and Complexity Handout 2. Nondeterministic Polynomial Time. Succinct Certificates. 1 2 Topics in Logic and Complexity Handout 2 Anuj Dawar MPhil Advanced Computer Science, Lent 2010 Polynomial Time Computation P = TIME(n k ) k=1 The class of languages decidable in polynomial time. The

More information

On the Relative Efficiency of DPLL and OBDDs with Axiom and Join

On the Relative Efficiency of DPLL and OBDDs with Axiom and Join On the Relative Efficiency of DPLL and OBDDs with Axiom and Join Matti Järvisalo University of Helsinki, Finland September 16, 2011 @ CP M. Järvisalo (U. Helsinki) DPLL and OBDDs September 16, 2011 @ CP

More information

Agenda. What is a complexity class? What are the important complexity classes? How do you prove an algorithm is in a certain class

Agenda. What is a complexity class? What are the important complexity classes? How do you prove an algorithm is in a certain class Complexity Agenda What is a complexity class? What are the important complexity classes? How do you prove an algorithm is in a certain class Complexity class A complexity class is a set All problems within

More information

Introduction to Machine Learning CMU-10701

Introduction to Machine Learning CMU-10701 Introduction to Machine Learning CMU-10701 23. Decision Trees Barnabás Póczos Contents Decision Trees: Definition + Motivation Algorithm for Learning Decision Trees Entropy, Mutual Information, Information

More information

Dag-like Communication and Its Applications

Dag-like Communication and Its Applications Electronic Colloquium on Computational Complexity, Report No. 202 (2016) Dag-like Communication and Its Applications Dmitry Sokolov December 19, 2016 Abstract In 1990 Karchmer and Widgerson considered

More information

Lecture 11: Proofs, Games, and Alternation

Lecture 11: Proofs, Games, and Alternation IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 11: Proofs, Games, and Alternation David Mix Barrington and Alexis Maciel July 31, 2000

More information

The Class NP. NP is the problems that can be solved in polynomial time by a nondeterministic machine.

The Class NP. NP is the problems that can be solved in polynomial time by a nondeterministic machine. The Class NP NP is the problems that can be solved in polynomial time by a nondeterministic machine. NP The time taken by nondeterministic TM is the length of the longest branch. The collection of all

More information

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. CS684: Advanced Complexity Theory Mar 29, 22 Lecture 46 : Size lower bounds for AC circuits computing Parity Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. Theme: Circuit Complexity Lecture Plan: Proof

More information

On Multi-Partition Communication Complexity

On Multi-Partition Communication Complexity On Multi-Partition Communication Complexity Pavol Ďuriš Juraj Hromkovič Stasys Jukna Martin Sauerhoff Georg Schnitger Abstract. We study k-partition communication protocols, an extension of the standard

More information

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes

More information

ROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL

ROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL arxiv:quant-ph/0109016v2 2 Jul 2002 ROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL B. C. Travaglione, M. A. Nielsen Centre for Quantum Computer Technology, University of Queensland St Lucia, Queensland,

More information

New Bounds for the Garden-Hose Model

New Bounds for the Garden-Hose Model New Bounds for the Garden-Hose Model Hartmut Klauck 1 and Supartha Podder 2 1 CQT and Nanyang Technological University, Singapore hklauck@gmail.com 2 CQT Singapore supartha@gmail.com Abstract We show new

More information

Lecture 5: February 21, 2017

Lecture 5: February 21, 2017 COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication

More information

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch 6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random

More information

A An Overview of Complexity Theory for the Algorithm Designer

A An Overview of Complexity Theory for the Algorithm Designer A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula

More information

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On

More information

AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS. Robert Robere

AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS. Robert Robere AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS by Robert Robere A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Computer Science

More information

Addition is exponentially harder than counting for shallow monotone circuits

Addition is exponentially harder than counting for shallow monotone circuits Addition is exponentially harder than counting for shallow monotone circuits Igor Carboni Oliveira Columbia University / Charles University in Prague Joint work with Xi Chen (Columbia) and Rocco Servedio

More information

Notes for Lecture Notes 2

Notes for Lecture Notes 2 Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

Limiting Negations in Non-Deterministic Circuits

Limiting Negations in Non-Deterministic Circuits Limiting Negations in Non-Deterministic Circuits Hiroki Morizumi Graduate School of Information Sciences, Tohoku University, Sendai 980-8579, Japan morizumi@ecei.tohoku.ac.jp Abstract The minimum number

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

Complexity Theory Part I

Complexity Theory Part I Complexity Theory Part I Outline for Today Recap from Last Time Reviewing Verifiers Nondeterministic Turing Machines What does nondeterminism mean in the context of TMs? And just how powerful are NTMs?

More information

Game Characterizations and the PSPACE-Completeness of Tree Resolution Space

Game Characterizations and the PSPACE-Completeness of Tree Resolution Space Game Characterizations and the PSPACE-Completeness of Tree Resolution Space Alexander Hertel & Alasdair Urquhart June 18, 2007 Abstract The Prover/Delayer game is a combinatorial game that can be used

More information

Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation

Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation Dmitry Gavinsky Or Meir Omri Weinstein Avi Wigderson August 20, 2016 Abstract One of the major open problems in

More information

A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications

A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications Beate Bollig and Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany

More information

: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007

: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007 80240233: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall 2007 16 October 2007 Instructor: Andrej Bogdanov Notes by: Jialin Zhang and Pinyan Lu In this lecture, we introduce the complexity

More information

-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH.

-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH. CMPSCI 601: Recall From Last Time Lecture 26 Theorem: All CFL s are in sac. Facts: ITADD, MULT, ITMULT and DIVISION on -bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE

More information

Length-Increasing Reductions for PSPACE-Completeness

Length-Increasing Reductions for PSPACE-Completeness Length-Increasing Reductions for PSPACE-Completeness John M. Hitchcock 1 and A. Pavan 2 1 Department of Computer Science, University of Wyoming. jhitchco@cs.uwyo.edu 2 Department of Computer Science, Iowa

More information

NP-Completeness Part II

NP-Completeness Part II NP-Completeness Part II Please evaluate this course on Axess. Your comments really do make a difference. Announcements Problem Set 8 due tomorrow at 12:50PM sharp with one late day. Problem Set 9 out,

More information

1 Preliminaries We recall basic denitions. A deterministic branching program P for computing a Boolean function h n : f0; 1g n! f0; 1g is a directed a

1 Preliminaries We recall basic denitions. A deterministic branching program P for computing a Boolean function h n : f0; 1g n! f0; 1g is a directed a Some Separation Problems on Randomized OBDDs Marek Karpinski Rustam Mubarakzjanov y Abstract We investigate the relationships between complexity classes of Boolean functions that are computable by polynomial

More information

Polynomial Identity Testing and Circuit Lower Bounds

Polynomial Identity Testing and Circuit Lower Bounds Polynomial Identity Testing and Circuit Lower Bounds Robert Špalek, CWI based on papers by Nisan & Wigderson, 1994 Kabanets & Impagliazzo, 2003 1 Randomised algorithms For some problems (polynomial identity

More information

Complexity Theory Part II

Complexity Theory Part II Complexity Theory Part II Time Complexity The time complexity of a TM M is a function denoting the worst-case number of steps M takes on any input of length n. By convention, n denotes the length of the

More information

Exercises - Solutions

Exercises - Solutions Chapter 1 Exercises - Solutions Exercise 1.1. The first two definitions are equivalent, since we follow in both cases the unique path leading from v to a sink and using only a i -edges leaving x i -nodes.

More information

CSE 105 Theory of Computation

CSE 105 Theory of Computation CSE 105 Theory of Computation http://www.jflap.org/jflaptmp/ Professor Jeanne Ferrante 1 Today s Agenda P and NP (7.2, 7.3) Next class: Review Reminders and announcements: CAPE & TA evals are open: Please

More information