Hardness of Function Composition for Semantic Read once Branching. Programs. June 23, 2018
|
|
- Phillip Ramsey
- 5 years ago
- Views:
Transcription
1 once for once June 23, 2018
2 P and L once P: Polynomial time computable functions. * * * * L : s computable in logarithmic space. L? P
3 f (x 1, x 2,.., x n ) {0, 1} Definition Deterministic program DAG with a source node and two sinks, 1-sink (for accept) and 0-sink (for reject). x i {0, 1}, i [n] Each non-sink node is labeled by some x i, outdegree 2 with an edge each for x i = 0 and x i = 1. once start, x x 2 0 x 3 0 x 4 0 x x 2 0 x 3 0 x 4 0 x 5 0 1
4 Non-det Definition Non-deterministic program (NBP) Start allow unlabelled guessing nodes and arbitrary out-degree. x 11 x 12 x 13 x 21 x 22 x 23 x 31 x 32 x 33 x 41 x 42 x 43 1 once x 14 x 24 x 34 x 44 The size of a NBP= number of labelled nodes.
5 NBP computing f : {0, 1} n {0, 1} once x 11 x 21 x 31 x 41 Start x 12 x 13 x 14 x 22 x 23 x 24 x 32 x 33 x 34 x 42 x 43 x 44 f (u) = 1 a path from source to accept node that is consistent with input u. 1
6 Program Size and Space Complexity of computing f once BP(f n ) = S(f n ) = min B BP computing f n size (B) min space complexity (T ) T non-uniform TMs computing f n log(bp(f n )) S(f n ) [Cobham 66]
7 Big Picture once It is easy to show functions with high BP(f n ) exist.
8 Big Picture once It is easy to show functions with high BP(f n ) exist. Can we show that some function in P requires exponential size BP? amounts to showing L P.
9 BPs and other Computation Models Formulas Circuits L(f ) BP(f ) 1 3 C(f ) once
10 BPs and other Computation Models Formulas Circuits L(f ) BP(f ) 1 3 C(f ) Ω ( n 3) ( ) Ω n 2 log 2 n Ω (n) Random Restrictions Nechiporuk Gate Elimination once
11 Restricted once Bounded Width: same as NC 1, Barrington s characterization.
12 Restricted once Bounded Width: same as NC 1, Barrington s characterization. Length give Time-Space tradeoffs.
13 Time-Space tradeoffs t cn = s = 2 Ω(n) Jukna 09 once
14 Time-Space tradeoffs t cn = s = 2 Ω(n) Jukna 09 culmination results by Ajtai 99 and Beame,Jayram, Saks 01 once
15 Time-Space tradeoffs t cn = s = 2 Ω(n) Jukna 09 culmination results by Ajtai 99 and Beame,Jayram, Saks 01 We look at: time-space tradeoffs for iterated function composition. once
16 Read Once Syntactic read once: Along any path from source to sink any variable appears atmost once. x 11 x 21 x 31 once Start 1 x 12 x 22 x 32 x 13 x x 33 23
17 Read Once Syntactic read once: Along any path from source to sink any variable appears atmost once. x 11 x 21 x 31 once Start 1 x 12 x 22 x 32 x 13 x 11 x 23 x 21 x 33 x Start 1 x 12 x 22 x x 13 x 23 x Semantic read once: Along any consistent path from source to sink no variable is read more than once.
18 syntactic weaker than semantic The Exact Perfect matching function(epm n ): accept a matrix iff it is a permutation matrix. Jukna and Razborov 98 showed Theorem Every syntactic read once NBP computing EPM n must have size 2 Ω(n). once
19 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ) once
20 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x once Start x 12 x 22 x 32 x 13 x 23 x 33
21 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 x
22 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 Sees only 1s x
23 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 Sees only 1s x Sees only 0s
24 EPM n semantic read once Theorem (Jukna) EPM n can be solved by a semantic read once NBP of size O(n 3 ). x 11 x 21 x Start 1 x 12 x 22 x once x 13 x 23 Sees only 1s x Sees only 0s
25 Embedded C red {w} C blue [D] n C red D A w D [n] A B w C blue D B A [n] B [n] { } once
26 Embedded C red {w} C blue [D] n C red D A w D [n] A B w C blue D B A [n] B [n] {102101} once
27 KRW Conjecture once an approach to separating NC 1 from NC 2. KRW conjecture that for every random f and g, D(fog) ɛd(f ) + D(g). KRW conjecture on formula size of a composed function fog. L(fog) L(f )L(g)?
28 Understanding once How does space compose?
29 TEP h d Cook et.al 2012 once f : [k] 2 [k] [k] Figure: TEP2 4 that is height 4, degree 2.
30 TEP h d Cook et.al 2012 once Figure: TEP 4 2 f : [k] 2 [k] [k] that is height 4, degree 2. Is BP(TEP h 2 ) = Ω(kh )??
31 TEP h d Cook et.al 2012 once Figure: TEP 4 2 f : [k] 2 [k] [k] that is height 4, degree 2. Is BP(TEP h 2 ) = Ω(kh )?? = L P
32 Boolean TEP once K ɛ density K 1 ɛ Tree F,ɛ ( )
33 Lower Bound for composition Theorem For any h, and k sufficiently large, there exists ɛ and F such that any k-ary nondeterministic semantic read-once branching program for ternary Tree F,ɛ requires size at least ( ) k h. log k once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
34 Black White pebbling Upperbound once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
35 1 2 (d 1)h + 1 pebbles at this moment once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
36 Guess the remaining siblings once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
37 Infer the root once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
38 Unpebble blacks once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
39 Verify Guesses once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
40 lower bound uses Invertible functions once Definition A Latin Cube is a function f : [k] 3 [k] such that f is invertible in each of its coordinates. Equivalently, every element of [k] appears exactly once along every row,column and leg in the cube [k] 3. Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
41 4-invertible function, f : [k] 3 [k] once Definition Any element in [k] appears at most 4 times along any row,column or leg in the cube [k] 3. Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
42 Proof Overview A small BP for a = Tree F,ɛ accepts a large Tree F,ɛ rectangle of inputs over its leaves once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
43 Proof Overview A small BP for a = Tree F,ɛ accepts a large Tree F,ɛ rectangle of inputs over its leaves A large rectangle = a special node v* in the tree over leaves whose F v can be described in few bits. once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
44 Proof Overview A small BP for a = Tree F,ɛ accepts a large Tree F,ɛ rectangle of inputs over its leaves A large rectangle = a special node v* in the tree over leaves whose F v can be described in few bits. Show that the distribution on F is rich or sufficiently random looking that one cannot save these bits. once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
45 for every accepting input a special query state: once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) h 2 A white subtree has at least a fraction of leaf node which are white Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) h 2 A red subtree has at least a fraction of leaf node which are red Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)
46 few special states = a large embedded rectangle over leaves v start q v 1 v Most popular Choose a popular labelled path down the tree. Choose a popular red variable for the first red-subtree. Prune the input set. Continue to choose h red variables one for each red-subtree. Similarly for each blue-subtree. Fix the remaining variables in [n]-red-blue to the most popular projection w. once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
47 a large embedded rectangle over the leaves. once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)
48 a node v at which leaves in both red and blue trees take a lot of values. once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)
49 a node v at which both red and blue child take a lot of values. once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)
50 a node v with low entropy on a Two-way product set once Ah(x) Bh(x, y) = Fh(Ah(x), Bh 1(x, y)ch(y)) Ch(y) Ch 1(y) Ah 1(x) Ah 2(x) Ai(x) A3(x) i 1 vi Ch 2(y) Bi(x, y) = Fi(Ai(x), Bi 1(x, y)ci(y)) Ci(y) i 1 C3(y) Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion A2(x)? A1(x) C1(y) C2(y)
51 Two-way Product Set at v, in F v () once A C A, C [k] A = C = r << k Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
52 Two-way Product Set at v, in F v () once A C A, C [k] A = C = r << k S r = {(x, Q(x, y), y) x A, y C} S = r 2 Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
53 Enropy of spread on Two-way Product Set can t be low A C A, C [k] A = C = r << k S r = {(x, B(x, y), y) x A, y C} S = r 2 Two-way Product Sets S r and target set T ɛ Pr [f (S r ) T ɛ ] 1 f U(All 4-invertible cubes) k ɛr 2 once Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
54 Label once α h βh h 2 A red subtree has at least one red leaf node α h 1 α h 2 α i α 2 vi β h 1 β h 2 β i β 2 h 2 A white subtree has at least one white leaf node Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion α 1? β1 Figure: This figure depicts a label L F associated with a problem instance Tree F
55 many F that remain unaccounted without such a special label. once F < v, S A, S B.. > Proof OverView A special query state for each input Special low entropy node in the Tree Two-way Product Sets Conclusion
56 More general time space tradeoffs for composition. Exponential lower bound for boolean semantic NBPs for some problem in P. super-quadratic lower bound for BPs via understanding composition fog where g is element distinctness. once
57 once Thank You!
Hardness of Function Composition for Semantic Read once Branching Programs
Hardness of Function Composition for Semantic Read once Branching Programs Jeff Edmonds York University, 4700 Keele Street, Toronto, CANADA jeff@cse.yorku.ca http://www.cs.yorku.ca/ jeff/ Venkatesh Medabalimi
More informationChallenge to L is not P Hypothesis by Analysing BP Lower Bounds
Challenge to L is not P Hypothesis by Analysing BP Lower Bounds Atsuki Nagao (The University of Electro-Communications) Joint work with Kazuo Iwama (Kyoto University) Self Introduction -2010 : Under graduate
More informationLower Bounds for Nondeterministic Semantic Read-Once Branching Programs
Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs Stephen Cook Jeff Edmonds Venkatesh Medabalimi Toniann Pitassi August 10, 2015 Abstract We prove exponential lower bounds on the
More informationRead-Once Branching Programs for Tree Evaluation Problems
Read-Once Branching Programs for Tree Evaluation Problems Kazuo Iwama 1 and Atsuki Nagao 2 1 Graduate School of Informatics, Kyoto University, Kyoto, Japan iwama@kuis.kyoto-u.ac.jp 2 Graduate School of
More informationThe Tree Evaluation Problem: Towards Separating P from NL. Lecture #6: 26 February 2014
The Tree Evaluation Problem: Towards Separating P from NL Lecture #6: 26 February 2014 Lecturer: Stephen A. Cook Scribe Notes by: Venkatesh Medabalimi 1. Introduction Consider the sequence of complexity
More informationBranching Programs for Tree Evaluation
Branching Programs for Tree Evaluation Mark Braverman 1, Stephen Cook 2, Pierre McKenzie 3, Rahul Santhanam 4, and Dustin Wehr 2 1 Microsoft Research 2 University of Toronto 3 Université de Montréal 4
More informationLecture 16: Communication Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity
More informationYet Harder Knapsack Problems
Yet Harder Knapsack Problems Stasys Jukna,1 Georg Schnitger University of Frankfurt, Institut of Computer Science, D-60054 Frankfurt, Germany. Abstract Already 30 years ago, Chvátal has shown that some
More informationLower Bounds for Nondeterministic Semantic Read-Once Branching Programs
Lower Bounds for Nondeterministic Semantic Read-Once Branching Programs Stephen Cook 1, Jeff Edmonds 2, Venkatesh Medabalimi 1, and Toniann Pitassi 1 1 University of Toronto, Computer Science Department,
More informationDRAFT. Algebraic computation models. Chapter 14
Chapter 14 Algebraic computation models Somewhat rough We think of numerical algorithms root-finding, gaussian elimination etc. as operating over R or C, even though the underlying representation of the
More informationNotes on Logarithmic Lower Bounds in the Cell Probe Model
Notes on Logarithmic Lower Bounds in the Cell Probe Model Kevin Zatloukal November 10, 2010 1 Overview Paper is by Mihai Pâtraşcu and Erik Demaine. Both were at MIT at the time. (Mihai is now at AT&T Labs.)
More informationIntroduction to Quantum Branching Programs
Introduction to Quantum Branching Programs Chris Pollett (based on joint work with Farid Ablayev, Aida Gainutdinova, Marek Karpinski, and Cristopher Moore) Apr. 4, 2006. Outline Classical Branching Programs
More informationMath 262A Lecture Notes - Nechiporuk s Theorem
Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower
More informationPebbles and Branching Programs
Pebbles and Branching Programs Stephen Cook On the occasion of Les Valiant s 60th Birthday Celebration May 30, 2009 Joint work with Mark Braverman Pierre McKenzie Rahul Santhanam Dustin Wehr 1 Perhaps
More informationLecture 21: Algebraic Computation Models
princeton university cos 522: computational complexity Lecture 21: Algebraic Computation Models Lecturer: Sanjeev Arora Scribe:Loukas Georgiadis We think of numerical algorithms root-finding, gaussian
More informationA note on monotone real circuits
A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using
More informationCS Communication Complexity: Applications and New Directions
CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the
More informationAlgorithms as Lower Bounds
Algorithms as Lower Bounds Lecture 3 Part 1: Solving QBF and NC1 Lower Bounds (Joint work with Rahul Santhanam, U. Edinburgh) Part 2: Time-Space Tradeoffs for SAT Ryan Williams Stanford University Quantified
More informationarxiv: v1 [cs.cc] 22 Aug 2018
New Bounds for Energy Complexity of Boolean Functions Krishnamoorthy Dinesh Samir Otiv Jayalal Sarma arxiv:1808.07199v1 [cs.cc] 22 Aug 2018 Abstract For a Boolean function f : {0, 1} n {0, 1} computed
More informationBook Introduction by the Authors
Book Introduction by the Authors Invited by Kazuo Iwama iwama@kuis.kyoto-u.ac.jp Bulletin Editor Kyoto University, Japan 215 BEATCS no 113 Boolean Function Complexity Advances and Frontiers Stasys Jukna
More information1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions
CS 6743 Lecture 15 1 Fall 2007 1 Circuit Complexity 1.1 Definitions A Boolean circuit C on n inputs x 1,..., x n is a directed acyclic graph (DAG) with n nodes of in-degree 0 (the inputs x 1,..., x n ),
More informationCS151 Complexity Theory
Introduction CS151 Complexity Theory Lecture 5 April 13, 2004 Power from an unexpected source? we know PEXP, which implies no polytime algorithm for Succinct CVAL poly-size Boolean circuits for Succinct
More informationCS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015
CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many
More informationUnit 1A: Computational Complexity
Unit 1A: Computational Complexity Course contents: Computational complexity NP-completeness Algorithmic Paradigms Readings Chapters 3, 4, and 5 Unit 1A 1 O: Upper Bounding Function Def: f(n)= O(g(n)) if
More information: On the P vs. BPP problem. 18/12/16 Lecture 10
03684155: On the P vs. BPP problem. 18/12/16 Lecture 10 Natural proofs Amnon Ta-Shma and Dean Doron 1 Natural proofs The ultimate goal we have is separating classes (or proving they are equal if they are).
More informationA Lower Bound Technique for Restricted Branching Programs and Applications
A Lower Bound Technique for Restricted Branching Programs and Applications (Extended Abstract) Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany woelfel@ls2.cs.uni-dortmund.de
More informationSums of Products. Pasi Rastas November 15, 2005
Sums of Products Pasi Rastas November 15, 2005 1 Introduction This presentation is mainly based on 1. Bacchus, Dalmao and Pitassi : Algorithms and Complexity results for #SAT and Bayesian inference 2.
More information1 Locally computable randomized encodings
CSG399: Gems of Theoretical Computer Science Lectures 3-4 Feb 20-24, 2009 Instructor: Emanuele Viola Scribe: Eric Miles Cryptography in constant depth: II & III Locally computable randomized encodings
More informationThe quantum query complexity of read-many formulas
The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears
More informationPolynomial Hierarchy
Polynomial Hierarchy A polynomial-bounded version of Kleene s Arithmetic Hierarchy becomes trivial if P = NP. Karp, 1972 Computational Complexity, by Fu Yuxi Polynomial Hierarchy 1 / 44 Larry Stockmeyer
More informationLower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine)
Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Mihai Pǎtraşcu, MIT, web.mit.edu/ mip/www/ Index terms: partial-sums problem, prefix sums, dynamic lower bounds Synonyms: dynamic trees 1
More informationTheory of Computation
Theory of Computation Dr. Sarmad Abbasi Dr. Sarmad Abbasi () Theory of Computation 1 / 38 Lecture 21: Overview Big-Oh notation. Little-o notation. Time Complexity Classes Non-deterministic TMs The Class
More informationLecture 7: Polynomial time hierarchy
Computational Complexity Theory, Fall 2010 September 15 Lecture 7: Polynomial time hierarchy Lecturer: Kristoffer Arnsfelt Hansen Scribe: Mads Chr. Olesen Recall that adding the power of alternation gives
More informationImproved bounds for the randomized decision tree complexity of recursive majority
Improved bounds for the randomized decision tree complexity of recursive majority Frédéric Magniez Ashwin Nayak Miklos Santha David Xiao Abstract We consider the randomized decision tree complexity of
More informationBinary Decision Diagrams
Binary Decision Diagrams Beate Bollig, Martin Sauerhoff, Detlef Sieling, and Ingo Wegener FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany lastname@ls2.cs.uni-dortmund.de Abstract Decision diagrams
More informationSensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis)
Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sourav Chakraborty Thesis Advisor: László Babai February, 2005 Abstract We discuss several complexity measures
More informationModels of Computation
Models of Computation Analysis of Algorithms Week 1, Lecture 2 Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Models of Computation (RAM) a) Random Access Machines
More informationΤαουσάκος Θανάσης Αλγόριθμοι και Πολυπλοκότητα II 7 Φεβρουαρίου 2013
Ταουσάκος Θανάσης Αλγόριθμοι και Πολυπλοκότητα II 7 Φεβρουαρίου 2013 Alternation: important generalization of non-determinism Redefining Non-Determinism in terms of configurations: a configuration lead
More information1 From previous lectures
CS 810: Introduction to Complexity Theory 9/18/2003 Lecture 11: P/poly, Sparse Sets, and Mahaney s Theorem Instructor: Jin-Yi Cai Scribe: Aparna Das, Scott Diehl, Giordano Fusco 1 From previous lectures
More informationCSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds
CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching
More informationAlgorithms for Boolean Formula Evaluation and for Tree Contraction
Algorithms for Boolean Formula Evaluation and for Tree Contraction Samuel R. Buss Department of Mathematics University of California, San Diego October 15, 1991 Abstract This paper presents a new, simpler
More informationLecture 8: Complete Problems for Other Complexity Classes
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 8: Complete Problems for Other Complexity Classes David Mix Barrington and Alexis Maciel
More informationCS151 Complexity Theory. Lecture 6 April 19, 2017
CS151 Complexity Theory Lecture 6 Shannon s counting argument frustrating fact: almost all functions require huge circuits Theorem (Shannon): With probability at least 1 o(1), a random function f:{0,1}
More informationCS 151 Complexity Theory Spring Solution Set 5
CS 151 Complexity Theory Spring 2017 Solution Set 5 Posted: May 17 Chris Umans 1. We are given a Boolean circuit C on n variables x 1, x 2,..., x n with m, and gates. Our 3-CNF formula will have m auxiliary
More informationMore on Noncommutative Polynomial Identity Testing
More on Noncommutative Polynomial Identity Testing Andrej Bogdanov Hoeteck Wee Abstract We continue the study of noncommutative polynomial identity testing initiated by Raz and Shpilka and present efficient
More informationLecture 3: Nondeterminism, NP, and NP-completeness
CSE 531: Computational Complexity I Winter 2016 Lecture 3: Nondeterminism, NP, and NP-completeness January 13, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Nondeterminism and NP Recall the definition
More informationCS20a: NP completeness. NP-complete definition. Related properties. Cook's Theorem
CS20a: NP completeness Cook s theorem SAT is an NP-complete problem http://www.cs.caltech.edu/courses/cs20/a/ December 2, 2002 1 NP-complete definition A problem is in NP if it can be solved by a nondeterministic
More informationComplexity (Pre Lecture)
Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What
More information: On the P vs. BPP problem. 30/12/2016 Lecture 12
03684155: On the P vs. BPP problem. 30/12/2016 Lecture 12 Time Hierarchy Theorems Amnon Ta-Shma and Dean Doron 1 Diagonalization arguments Throughout this lecture, for a TM M, we denote M t to be the machine
More informationRamanujan Graphs of Every Size
Spectral Graph Theory Lecture 24 Ramanujan Graphs of Every Size Daniel A. Spielman December 2, 2015 Disclaimer These notes are not necessarily an accurate representation of what happened in class. The
More informationRandomness and non-uniformity
Randomness and non-uniformity JASS 2006 Course 1: Proofs and Computers Felix Weninger TU München April 2006 Outline Randomized computation 1 Randomized computation 2 Computation with advice Non-uniform
More informationThe Strength of Multilinear Proofs
The Strength of Multilinear Proofs Ran Raz Iddo Tzameret December 19, 2006 Abstract We introduce an algebraic proof system that manipulates multilinear arithmetic formulas. We show that this proof system
More informationThe Polynomial Hierarchy
The Polynomial Hierarchy Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Motivation..synthesizing circuits is exceedingly difficulty. It is even
More informationCircuits. Lecture 11 Uniform Circuit Complexity
Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall
More informationPropositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST
Propositional Calculus - Semantics (3/3) Moonzoo Kim CS Dept. KAIST moonzoo@cs.kaist.ac.kr 1 Overview 2.1 Boolean operators 2.2 Propositional formulas 2.3 Interpretations 2.4 Logical Equivalence and substitution
More informationLimitations of Algorithm Power
Limitations of Algorithm Power Objectives We now move into the third and final major theme for this course. 1. Tools for analyzing algorithms. 2. Design strategies for designing algorithms. 3. Identifying
More information1 Quantum Circuits. CS Quantum Complexity theory 1/31/07 Spring 2007 Lecture Class P - Polynomial Time
CS 94- Quantum Complexity theory 1/31/07 Spring 007 Lecture 5 1 Quantum Circuits A quantum circuit implements a unitary operator in a ilbert space, given as primitive a (usually finite) collection of gates
More informationLecture 2: From Classical to Quantum Model of Computation
CS 880: Quantum Information Processing 9/7/10 Lecture : From Classical to Quantum Model of Computation Instructor: Dieter van Melkebeek Scribe: Tyson Williams Last class we introduced two models for deterministic
More informationEntropy of Operators or Nechiporuk for Depth-2 Circuits
Entropy of Operators or Nechiporuk for Depth-2 Circuits Stasys Jukna Institute of Mathematics, Vilnius, Lithuania University of Frankfurt, Germany Dagstuhl 2008 () 1 / 12 Model = Circuits with Arbitrary
More informationLecture 10: Boolean Circuits (cont.)
CSE 200 Computability and Complexity Wednesday, May, 203 Lecture 0: Boolean Circuits (cont.) Instructor: Professor Shachar Lovett Scribe: Dongcai Shen Recap Definition (Boolean circuit) A Boolean circuit
More informationBreaking the Rectangle Bound Barrier against Formula Size Lower Bounds
Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.
More informationLecture 8: Alternatation. 1 Alternate Characterizations of the Polynomial Hierarchy
CS 710: Complexity Theory 10/4/2011 Lecture 8: Alternatation Instructor: Dieter van Melkebeek Scribe: Sachin Ravi In this lecture, we continue with our discussion of the polynomial hierarchy complexity
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More information6.854 Advanced Algorithms
6.854 Advanced Algorithms Homework Solutions Hashing Bashing. Solution:. O(log U ) for the first level and for each of the O(n) second level functions, giving a total of O(n log U ) 2. Suppose we are using
More informationCS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5
UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look
More informationPolynomial Time Computation. Topics in Logic and Complexity Handout 2. Nondeterministic Polynomial Time. Succinct Certificates.
1 2 Topics in Logic and Complexity Handout 2 Anuj Dawar MPhil Advanced Computer Science, Lent 2010 Polynomial Time Computation P = TIME(n k ) k=1 The class of languages decidable in polynomial time. The
More informationOn the Relative Efficiency of DPLL and OBDDs with Axiom and Join
On the Relative Efficiency of DPLL and OBDDs with Axiom and Join Matti Järvisalo University of Helsinki, Finland September 16, 2011 @ CP M. Järvisalo (U. Helsinki) DPLL and OBDDs September 16, 2011 @ CP
More informationAgenda. What is a complexity class? What are the important complexity classes? How do you prove an algorithm is in a certain class
Complexity Agenda What is a complexity class? What are the important complexity classes? How do you prove an algorithm is in a certain class Complexity class A complexity class is a set All problems within
More informationIntroduction to Machine Learning CMU-10701
Introduction to Machine Learning CMU-10701 23. Decision Trees Barnabás Póczos Contents Decision Trees: Definition + Motivation Algorithm for Learning Decision Trees Entropy, Mutual Information, Information
More informationDag-like Communication and Its Applications
Electronic Colloquium on Computational Complexity, Report No. 202 (2016) Dag-like Communication and Its Applications Dmitry Sokolov December 19, 2016 Abstract In 1990 Karchmer and Widgerson considered
More informationLecture 11: Proofs, Games, and Alternation
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 11: Proofs, Games, and Alternation David Mix Barrington and Alexis Maciel July 31, 2000
More informationThe Class NP. NP is the problems that can be solved in polynomial time by a nondeterministic machine.
The Class NP NP is the problems that can be solved in polynomial time by a nondeterministic machine. NP The time taken by nondeterministic TM is the length of the longest branch. The collection of all
More informationCS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.
CS684: Advanced Complexity Theory Mar 29, 22 Lecture 46 : Size lower bounds for AC circuits computing Parity Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K. Theme: Circuit Complexity Lecture Plan: Proof
More informationOn Multi-Partition Communication Complexity
On Multi-Partition Communication Complexity Pavol Ďuriš Juraj Hromkovič Stasys Jukna Martin Sauerhoff Georg Schnitger Abstract. We study k-partition communication protocols, an extension of the standard
More informationCSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010
CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes
More informationROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL
arxiv:quant-ph/0109016v2 2 Jul 2002 ROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL B. C. Travaglione, M. A. Nielsen Centre for Quantum Computer Technology, University of Queensland St Lucia, Queensland,
More informationNew Bounds for the Garden-Hose Model
New Bounds for the Garden-Hose Model Hartmut Klauck 1 and Supartha Podder 2 1 CQT and Nanyang Technological University, Singapore hklauck@gmail.com 2 CQT Singapore supartha@gmail.com Abstract We show new
More informationLecture 5: February 21, 2017
COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication
More information6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch
6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random
More informationA An Overview of Complexity Theory for the Algorithm Designer
A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula
More informationCS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT
CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On
More informationAVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS. Robert Robere
AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS by Robert Robere A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Computer Science
More informationAddition is exponentially harder than counting for shallow monotone circuits
Addition is exponentially harder than counting for shallow monotone circuits Igor Carboni Oliveira Columbia University / Charles University in Prague Joint work with Xi Chen (Columbia) and Rocco Servedio
More informationNotes for Lecture Notes 2
Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationLimiting Negations in Non-Deterministic Circuits
Limiting Negations in Non-Deterministic Circuits Hiroki Morizumi Graduate School of Information Sciences, Tohoku University, Sendai 980-8579, Japan morizumi@ecei.tohoku.ac.jp Abstract The minimum number
More information1 Randomized Computation
CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at
More informationComplexity Theory Part I
Complexity Theory Part I Outline for Today Recap from Last Time Reviewing Verifiers Nondeterministic Turing Machines What does nondeterminism mean in the context of TMs? And just how powerful are NTMs?
More informationGame Characterizations and the PSPACE-Completeness of Tree Resolution Space
Game Characterizations and the PSPACE-Completeness of Tree Resolution Space Alexander Hertel & Alasdair Urquhart June 18, 2007 Abstract The Prover/Delayer game is a combinatorial game that can be used
More informationToward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation
Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation Dmitry Gavinsky Or Meir Omri Weinstein Avi Wigderson August 20, 2016 Abstract One of the major open problems in
More informationA Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications
A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications Beate Bollig and Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany
More information: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007
80240233: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall 2007 16 October 2007 Instructor: Andrej Bogdanov Notes by: Jialin Zhang and Pinyan Lu In this lecture, we introduce the complexity
More information-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH.
CMPSCI 601: Recall From Last Time Lecture 26 Theorem: All CFL s are in sac. Facts: ITADD, MULT, ITMULT and DIVISION on -bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE
More informationLength-Increasing Reductions for PSPACE-Completeness
Length-Increasing Reductions for PSPACE-Completeness John M. Hitchcock 1 and A. Pavan 2 1 Department of Computer Science, University of Wyoming. jhitchco@cs.uwyo.edu 2 Department of Computer Science, Iowa
More informationNP-Completeness Part II
NP-Completeness Part II Please evaluate this course on Axess. Your comments really do make a difference. Announcements Problem Set 8 due tomorrow at 12:50PM sharp with one late day. Problem Set 9 out,
More information1 Preliminaries We recall basic denitions. A deterministic branching program P for computing a Boolean function h n : f0; 1g n! f0; 1g is a directed a
Some Separation Problems on Randomized OBDDs Marek Karpinski Rustam Mubarakzjanov y Abstract We investigate the relationships between complexity classes of Boolean functions that are computable by polynomial
More informationPolynomial Identity Testing and Circuit Lower Bounds
Polynomial Identity Testing and Circuit Lower Bounds Robert Špalek, CWI based on papers by Nisan & Wigderson, 1994 Kabanets & Impagliazzo, 2003 1 Randomised algorithms For some problems (polynomial identity
More informationComplexity Theory Part II
Complexity Theory Part II Time Complexity The time complexity of a TM M is a function denoting the worst-case number of steps M takes on any input of length n. By convention, n denotes the length of the
More informationExercises - Solutions
Chapter 1 Exercises - Solutions Exercise 1.1. The first two definitions are equivalent, since we follow in both cases the unique path leading from v to a sink and using only a i -edges leaving x i -nodes.
More informationCSE 105 Theory of Computation
CSE 105 Theory of Computation http://www.jflap.org/jflaptmp/ Professor Jeanne Ferrante 1 Today s Agenda P and NP (7.2, 7.3) Next class: Review Reminders and announcements: CAPE & TA evals are open: Please
More information