Clique vs. Independent Set
|
|
- Maximillian Walters
- 6 years ago
- Views:
Transcription
1 Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
2 On page 6... Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
3 CIS problem [Yannakakis, STOC 88] G = ([n], E) Alice Bob Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
4 CIS problem [Yannakakis, STOC 88] G = ([n], E) Alice Clique x [n] of G Bob Independent set y [n] of G Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
5 CIS problem [Yannakakis, STOC 88] G = ([n], E) Alice Clique x [n] of G Bob Independent set y [n] of G Compute: CIS G (x, y) = x y Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
6 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
7 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Known bounds: G : NP cc (CIS G ) = log n (guess x y) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
8 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Known bounds: G : G : NP cc (CIS G ) = log n (guess x y) conp cc (CIS G ) O(log n) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
9 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Known bounds: G : G : NP cc (CIS G ) = log n (guess x y) conp cc (CIS G ) O(log n) Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
10 Background Alon Saks Seymour conjecture: G : χ(g) bp(g) +? Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
11 Background Alon Saks Seymour conjecture: G : χ(g) bp(g) +? [Huang Sudakov, ]: G : χ(g) bp(g) 6/5 Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
12 Background Polynomial Alon Saks Seymour conjecture: G : χ(g) poly( bp(g))? Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
13 Background Polynomial Alon Saks Seymour conjecture: G : χ(g) poly( bp(g))? [Alon Haviv] = = [Bousquet et al.] Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
14 Background Polynomial Alon Saks Seymour conjecture: G : χ(g) poly( bp(g))? [Alon Haviv] = = [Bousquet et al.] Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
15 Our result Main theorem G : conp cc (CIS G ) Ω(log.8 n) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4
16 Our result Main theorem G : conp cc (CIS G ) Ω(log.8 n) Prior bounds Measure Lower bound Reference P cc log n Kushilevitz, Linial, and Ostrovsky (999) conp cc 6/5 log n Huang and Sudakov () conp cc / log n Amano (4) conp cc log n Shigeta and Amano (4) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4
17 Our result Main theorem G : conp cc (CIS G ) Ω(log.8 n) Proof strategy: Query complexity Communication complexity Cf. lower bounds for log-rank [Nisan Wigderson, 995] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4
18 Models of communication F : X Y {, } Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4
19 Models of communication NP cc Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4
20 Models of communication UP cc Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4
21 Models of communication CIS G is complete for UP cc : F CIS G UP cc (F) = UP cc (CIS G ) = log n Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4
22 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4
23 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4
24 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Decision tree complexity measures: NP dt = DNF width = -certificate complexity conp dt = CNF width = -certificate complexity UP dt = Unambiguous DNF width Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4
25 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Agenda: Step : Query separation Step : Simulation theorem [GLMWZ, 5] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4
26 Step : Query separation Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 7 / 4
27 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4
28 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Recursive composition: f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) x x x Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4
29 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Recursive composition: f f f f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) x x x x 4 x 5 x 6 x 7 x 8 x 9 Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4
30 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Recursive composition: f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) f x x x f x 4 x 5 x 6 f x 7 x 8 x 9 Hope: conp dt ( f i ) UP dt ( f i ) ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4
31 Warm-up Example: Problem! Let f (x, x, x ) = iff x + x + x {, } In order UP dt ( tof ) certify = because f i ( ) = f, x x x (should x x x be easy) might need conp dt to certify f ( f ) = because i ( ) = (should be hard) -input is fully sensitive Recursive composition: f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) f x x x f x 4 x 5 x 6 f x 7 x 8 x 9 Hope: conp dt ( f i ) UP dt ( f i ) ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4
32 Warm-up Example: Problem! Let f (x, x, x ) = iff x + x + x {, } In order UP dt ( tof ) certify = because f i ( ) = f, x x x (should x x x be easy) might need conp dt to certify f ( f ) = because i ( ) = (should be hard) -input is fully sensitive Solution: Enlarge input/output alphabets Recursive composition: f x x x f f x 4 x 5 x 6 f : ({} Σ) n {} Σ f x 7 x 8 x 9 f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) Hope: conp dt ( f i ) UP dt ( f i ) ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4
33 Warm-up Example: Problem! Let f (x, x, x ) = iff x + x + x {, } In order UP dt ( tof ) certify = because f i ( ) = f, x x x (should x x x be easy) might need conp dt to certify f ( f ) = because i ( ) = (should be hard) -input is fully sensitive Solution: Enlarge input/output alphabets Recursive composition: f f : ({} Σ) n {} Σ f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) f f f Now: In order to certify f i ( ) = σ for σ Σ, only need to certify f i ( conp Hope: ) = σ for σ dt Σ( f i ) UP dt ( f x x x x 4 x 5 x 6 x 7 x 8 x i ) 9 ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4
34 Defining f Any two certificates in an UP dt decision tree intersect in variables = Finite projective planes! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
35 Defining f Incidence ordering: Each node orders its incident edges using numbers from [] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
36 Defining f Inputs to nodes: Pointer values from {} [] }{{} ( is a null pointer) =Σ Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
37 Defining f Defining f : ({} []) 7 {, } Say edge e is satisfied on input x iff all nodes v e point to e under x f (x) = iff x satisfies an edge Clearly UP dt ( f ) = Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
38 Defining f Problem! Certifying f ( ) = too easy! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
39 Defining f Add input weights: f g 7 Gadget g is such that deciding if g( ) = i for i [] costs i queries Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
40 Defining f Add input weights: f g 7 Gadget g is such that deciding if g( ) = i for i [] costs i queries Else Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
41 Defining f Key properties: UP dt ( f g 7 ) = + + = 6 Certifying ( f g 7 )( ) = requires (# edges) = 7 queries Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
42 Defining f Key properties: UP dt ( f g 7 ) = + + = 6 Certifying ( f g 7 )( ) = requires (# edges) = 7 queries (Magic numerology: ) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
43 Defining f Key properties: UP dt ( f g 7 ) = + + = 6 Recursive composition Certifying ( f g 7 )( ) = Key trick: requires (# edges) = 7 queries ) From ({} Σ) (Magic n {, } numerology: Construct ({} Σ) n {} {pointers} Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4
44 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Step : Simulation theorem from Rectangles Are Nonnegative Juntas Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman (STOC 5) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
45 Composed functions f g n f Compose with gn f z z z z 4 z 5 g g g g g x y x y x y x 4 y 4 x 5 y 5 Examples: Set-disjointness: OR AND n Inner-product: XOR AND n Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
46 Composed functions f g n f Compose with gn f z z z z 4 z 5 g g g g g x y x y x y x 4 y 4 x 5 y 5 Examples: In general: We choose: Set-disjointness: OR AND n Inner-product: XOR AND n g : {, } b {, } b {, } is a small gadget Alice holds x {, } bn Bob holds y {, } bn g = inner-product with b = Θ(log n) bits per party Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
47 Approximation by juntas Conical d-junta: Nonnegative combination of d-conjunctions (Example:.4 z z +.66 z z +.5 z z ) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
48 Approximation by juntas Conical d-junta: Nonnegative combination of d-conjunctions (Example:.4 z z +.66 z z +.5 z z ) Main Structure Theorem: Suppose Π is cost-d randomised protocol for f g n Then there exists a conical d-junta h s.t. z dom f : Pr [ Π(x, y) accepts ] h(z) (x,y) (g n ) (z) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
49 Approximation by juntas Conical d-junta: Nonnegative combination of d-conjunctions (Example:.4 z z +.66 z z +.5 z z ) Main Structure Theorem: Suppose Π is cost-d randomised protocol for f g n Then there exists a conical d-junta h s.t. z dom f : Pr [ Π(x, y) accepts ] h(z) (x,y) (g n ) (z) Cf. Polynomial approximation [Razborov, Sherstov, Shi Zhu,... ]: Approximate poly-degree of AND = Θ( n) Approximate junta-degree of AND = Θ(n) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
50 Corollaries Simulation for NP: NP cc ( f g n ) = Θ(NP dt ( f ) b)... recall b = Θ(log n) Conical d-junta:.4 z z +.66 z z +.5 z z d-dnf: z z z z z z Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
51 Corollaries Simulation for NP: NP cc ( f g n ) = Θ(NP dt ( f ) b)... recall b = Θ(log n) Trivially: UP cc ( f g n ) O(UP dt ( f ) b) Main theorem follows! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
52 Corollaries Simulation for NP: NP cc ( f g n ) = Θ(NP dt ( f ) b)... recall b = Θ(log n) NP MA Also covered! P BPP WAPP SBP PostBPP PP smooth rectangle corruption ext. discrepancy discrepancy Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4
53 Summary Main result G : conp cc (CIS G ) Ω(log.8 n) Open problems Better separation for conp dt vs. UP dt? Simulation theorems for new models (e.g., BPP) Improve gadget size down to b = O() (Would give new proof of Ω(n) bound for set-disjointness) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4
54 Summary Main result G : conp cc (CIS G ) Ω(log.8 n) Open problems Better separation for conp dt vs. UP dt? Simulation theorems for new models (e.g., BPP) Improve gadget size down to b = O() (Would give new proof of Ω(n) bound for set-disjointness) Cheers! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4
THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY
THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY RYAN ALWEISS, YANG LIU Abstract. In this survey, we will show that there are instances of the CIS problem on n vertices which cannot be solved deterministically
More informationMonotone Circuit Lower Bounds from Resolution
Monotone Circuit Lower Bounds from Resolution Ankit Garg Mika Göös Pritish Kamath Dmitry Sokolov MSR Harvard MIT KTH Mika Göös Monotone Circuits & Resolution 25th October 2017 1 / 22 Background: Query-to-communication
More informationCommunication Lower Bounds via Query Complexity
Communication Lower Bounds via Query Complexity by Mika Göös A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy, Graduate Department of Computer Science, University
More informationA Composition Theorem for Conical Juntas
A Composition Theorem for Conical Juntas Mika Göös T.S. Jayram University of Toronto IBM Almaden Göös and Jayram A composition theorem for conical juntas 29th May 2016 1 / 12 Motivation Randomised communication
More informationNonnegative Rank vs. Binary Rank
CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 06, Article, pages 3 http://cjtcs.cs.uchicago.edu/ Nonnegative Rank vs. Binary Rank Thomas Watson Received February 3, 04; Revised August 5, 05, and on February
More informationCommunication Lower Bounds via Critical Block Sensitivity
Communication Lower Bounds via Critical Block Sensitivity Mika Göös & Toniann Pitassi University of Toronto Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January 2014 1 / 18 Communication
More informationNondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic
More informationPartitions and Covers
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw
More informationThe Alon-Saks-Seymour and Rank-Coloring Conjectures
The Alon-Saks-Seymour and Rank-Coloring Conjectures Michael Tait Department of Mathematical Sciences University of Delaware Newark, DE 19716 tait@math.udel.edu April 20, 2011 Preliminaries A graph is a
More informationQuery-to-Communication Lifting for BPP
58th Annual IEEE Symposium on Foundations of Computer Science Query-to-Communication Lifting for BPP Mika Göös Computer Science Department Harvard University Cambridge, MA, USA Email: mika@seas.harvard.edu
More informationarxiv: v3 [cs.cc] 28 Jun 2015
Parity Decision Tree Complexity and 4-Party Communication Complexity of XOR-functions Are Polynomially Equivalent arxiv:156.2936v3 [cs.cc] 28 Jun 215 Penghui Yao CWI, Amsterdam phyao1985@gmail.com September
More informationOn the tightness of the Buhrman-Cleve-Wigderson simulation
On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,
More informationCS Foundations of Communication Complexity
CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower
More informationLecture 16: Communication Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity
More informationApproximation norms and duality for communication complexity lower bounds
Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased
More informationBreaking the Rectangle Bound Barrier against Formula Size Lower Bounds
Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.
More informationTHE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES. by Michael Tait
THE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES by Michael Tait A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of
More informationCommunication Complexity
Communication Complexity Jie Ren Adaptive Signal Processing and Information Theory Group Nov 3 rd, 2014 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, 2014 1 / 77 1 E. Kushilevitz and N. Nisan, Communication Complexity,
More informationChebyshev Polynomials, Approximate Degree, and Their Applications
Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)
More informationCommunication is bounded by root of rank
Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r
More informationPost-selected classical query complexity
Post-selected classical query complexity Chris Cade School of Mathematics, University of Bristol, UK May 5, 08 arxiv:804.000v [cs.cc] 4 May 08 Abstract We study classical query algorithms with post-selection,
More informationComplete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in
Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single
More informationThe Computational Complexity Column
The Computational Complexity Column by Vikraman Arvind Institute of Mathematical Sciences, CIT Campus, Taramani Chennai 600113, India arvind@imsc.res.in http://www.imsc.res.in/~arvind Communication complexity
More informationApproximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta
Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we
More informationStructure of protocols for XOR functions
Electronic Colloquium on Computational Complexity, Report No. 44 (016) Structure of protocols for XOR functions Kaave Hosseini Computer Science and Engineering University of California, San Diego skhossei@ucsd.edu
More informationPolynomial-time Reductions
Polynomial-time Reductions Disclaimer: Many denitions in these slides should be taken as the intuitive meaning, as the precise meaning of some of the terms are hard to pin down without introducing the
More informationKernelization Lower Bounds: A Brief History
Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi
More informationStructure of protocols for XOR functions
Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 44 (2016) Structure of protocols for XOR functions Hamed Hatami School of Computer Science McGill University, Montreal hatami@cs.mcgill.ca
More informationCS Communication Complexity: Applications and New Directions
CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the
More informationLower bounds on the size of semidefinite relaxations. David Steurer Cornell
Lower bounds on the size of semidefinite relaxations David Steurer Cornell James R. Lee Washington Prasad Raghavendra Berkeley Institute for Advanced Study, November 2015 overview of results unconditional
More informationPolynomial Identity Testing and Circuit Lower Bounds
Polynomial Identity Testing and Circuit Lower Bounds Robert Špalek, CWI based on papers by Nisan & Wigderson, 1994 Kabanets & Impagliazzo, 2003 1 Randomised algorithms For some problems (polynomial identity
More informationInformation Complexity vs. Communication Complexity: Hidden Layers Game
Information Complexity vs. Communication Complexity: Hidden Layers Game Jiahui Liu Final Project Presentation for Information Theory in TCS Introduction Review of IC vs CC Hidden Layers Game Upper Bound
More informationCS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015
CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many
More informationOn the P versus NP intersected with co-np question in communication complexity
On the P versus NP intersected with co-np question in communication complexity Stasys Jukna Abstract We consider the analog of the P versus NP co-np question for the classical two-party communication protocols
More informationNon-Deterministic Time
Non-Deterministic Time Master Informatique 2016 1 Non-Deterministic Time Complexity Classes Reminder on DTM vs NDTM [Turing 1936] (q 0, x 0 ) (q 1, x 1 ) Deterministic (q n, x n ) Non-Deterministic (q
More informationLifting Nullstellensatz to Monotone Span Programs over Any Field
Lifting Nullstellensatz to Monotone Span Programs over Any Field Toniann Pitassi University of Toronto and the Institute for Advanced Study Toronto, Canada and Princeton, U.S.A. toni@cs.toronto.edu ABSTRACT
More informationA.Antonopoulos 18/1/2010
Class DP Basic orems 18/1/2010 Class DP Basic orems 1 Class DP 2 Basic orems Class DP Basic orems TSP Versions 1 TSP (D) 2 EXACT TSP 3 TSP COST 4 TSP (1) P (2) P (3) P (4) DP Class Class DP Basic orems
More informationCommunication vs information complexity, relative discrepancy and other lower bounds
Communication vs information complexity, relative discrepancy and other lower bounds Iordanis Kerenidis CNRS, LIAFA- Univ Paris Diderot 7 Joint work with: L. Fontes, R. Jain, S. Laplante, M. Lauriere,
More informationAsymmetric Communication Complexity and Data Structure Lower Bounds
Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey
More informationCSE200: Computability and complexity Space Complexity
CSE200: Computability and complexity Space Complexity Shachar Lovett January 29, 2018 1 Space complexity We would like to discuss languages that may be determined in sub-linear space. Lets first recall
More informationCSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds
CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching
More informationCS151 Complexity Theory. Lecture 13 May 15, 2017
CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P
More informationCSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010
CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Robert Špalek Google Direct product theorems: Why is Google interested? Direct product theorems: Why should Google be interested? Direct
More information14. Direct Sum (Part 1) - Introduction
Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in
More informationarxiv: v1 [cs.cc] 12 Feb 2009
Symposium on Theoretical Aspects of Computer Science 2009 (Freiburg), pp. 685 696 www.stacs-conf.org arxiv:0902.2146v1 [cs.cc] 12 Feb 2009 A STRONGER LP BOUND FOR FORMULA SIZE LOWER BOUNDS VIA CLIQUE CONSTRAINTS
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationEssential facts about NP-completeness:
CMPSCI611: NP Completeness Lecture 17 Essential facts about NP-completeness: Any NP-complete problem can be solved by a simple, but exponentially slow algorithm. We don t have polynomial-time solutions
More informationComplexity, P and NP
Complexity, P and NP EECS 477 Lecture 21, 11/26/2002 Last week Lower bound arguments Information theoretic (12.2) Decision trees (sorting) Adversary arguments (12.3) Maximum of an array Graph connectivity
More informationCOMMUNICATION VS. COMPUTATION
comput. complex. 16 (2007), 1 33 1016-3328/07/010001-33 DOI 10.1007/s00037-007-0224-y c Birkhäuser Verlag, Basel 2007 computational complexity COMMUNICATION VS. COMPUTATION Prahladh Harsha, Yuval Ishai,
More informationTopics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I
Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I Yoshio Okamoto Tokyo Institute of Technology May, 008 Last updated: Wed May 6: 008 Y. Okamoto (Tokyo Tech) TCMSI Graph Theory
More informationLecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition.
Lecture #14: 0.0.1 NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. 0.0.2 Preliminaries: Definition 1 n abstract problem Q is a binary relations on a set I of
More informationAlgebraic Problems in Computational Complexity
Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can
More informationCircuits. Lecture 11 Uniform Circuit Complexity
Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall
More informationGrothendieck Inequalities, XOR games, and Communication Complexity
Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial
More informationCommunication vs. Computation
Communication vs. Computation Prahladh Harsha Yuval Ishai Joe Kilian Kobbi Nissim S. Venkatesh October 18, 2005 Abstract We initiate a study of tradeoffs between communication and computation in well-known
More informationLecture 5: February 21, 2017
COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication
More informationOn The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product. Lijie Chen (Massachusetts Institute of Technology)
On The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product Max a,b A B a b Lijie Chen (Massachusetts Institute of Technology) Max-IP and Z-Max-IP (Boolean) Max-IP: Given sets A and B
More informationUmans Complexity Theory Lectures
Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q
More informationIntroduction to Advanced Results
Introduction to Advanced Results Master Informatique Université Paris 5 René Descartes 2016 Master Info. Complexity Advanced Results 1/26 Outline Boolean Hierarchy Probabilistic Complexity Parameterized
More informationLecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time
Analysis of Boolean Functions (CMU 8-859S, Spring 2007) Lecture 0: Learning DNF, AC 0, Juntas Feb 5, 2007 Lecturer: Ryan O Donnell Scribe: Elaine Shi Learning DNF in Almost Polynomial Time From previous
More informationPROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY
PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY Eric Blais, Joshua Brody, and Kevin Matulef February 1, 01 Abstract. We develop a new technique for proving lower bounds in property testing,
More informationBBM402-Lecture 11: The Class NP
BBM402-Lecture 11: The Class NP Lecturer: Lale Özkahya Resources for the presentation: http://ocw.mit.edu/courses/electrical-engineering-andcomputer-science/6-045j-automata-computability-andcomplexity-spring-2011/syllabus/
More informationEvaluation of DNF Formulas
Evaluation of DNF Formulas Sarah R. Allen Carnegie Mellon University Computer Science Department Pittsburgh, PA, USA Lisa Hellerstein and Devorah Kletenik Polytechnic Institute of NYU Dept. of Computer
More informationU.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 9/6/2004. Notes for Lecture 3
U.C. Berkeley CS278: Computational Complexity Handout N3 Professor Luca Trevisan 9/6/2004 Notes for Lecture 3 Revised 10/6/04 1 Space-Bounded Complexity Classes A machine solves a problem using space s(
More informationNP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof
T-79.5103 / Autumn 2006 NP-complete problems 1 NP-COMPLETE PROBLEMS Characterizing NP Variants of satisfiability Graph-theoretic problems Coloring problems Sets and numbers Pseudopolynomial algorithms
More information1 PSPACE-Completeness
CS 6743 Lecture 14 1 Fall 2007 1 PSPACE-Completeness Recall the NP-complete problem SAT: Is a given Boolean formula φ(x 1,..., x n ) satisfiable? The same question can be stated equivalently as: Is the
More informationON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS
Quantum Information and Computation, Vol. 0, No. 0 (2010) 000 000 c Rinton Press ON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS ALEXANDER A. SHERSTOV Department of Computer Sciences,
More informationNotes on Space-Bounded Complexity
U.C. Berkeley CS172: Automata, Computability and Complexity Handout 6 Professor Luca Trevisan 4/13/2004 Notes on Space-Bounded Complexity These are notes for CS278, Computational Complexity, scribed by
More informationClasses of Boolean Functions
Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions
More informationLinear sketching for Functions over Boolean Hypercube
Linear sketching for Functions over Boolean Hypercube Grigory Yaroslavtsev (Indiana University, Bloomington) http://grigory.us with Sampath Kannan (U. Pennsylvania), Elchanan Mossel (MIT) and Swagato Sanyal
More informationLimits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam
Limits to Approximability: When Algorithms Won't Help You Note: Contents of today s lecture won t be on the exam Outline Limits to Approximability: basic results Detour: Provers, verifiers, and NP Graph
More informationLower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine)
Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Mihai Pǎtraşcu, MIT, web.mit.edu/ mip/www/ Index terms: partial-sums problem, prefix sums, dynamic lower bounds Synonyms: dynamic trees 1
More informationLecture 20: conp and Friends, Oracles in Complexity Theory
6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:
More informationThe Polynomial Hierarchy
The Polynomial Hierarchy Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Motivation..synthesizing circuits is exceedingly difficulty. It is even
More informationInformation Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017
Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels
More information1.1 P, NP, and NP-complete
CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Introduction to NP-complete Problems Date: 11/01/2008 Lecturer: Lap Chi Lau Scribe: Jerry Jilin Le This lecture gives a general introduction
More informationOn the Isomorphism Problem for Decision Trees and Decision Lists
On the Isomorphism Problem for Decision Trees and Decision Lists V. Arvind 1, Johannes Köbler 2, Sebastian Kuhnert 2, Gaurav Rattan 1, and Yadu Vasudev 1 1 The Institute of Mathematical Sciences, Chennai,
More informationThe Zero-Error Randomized Query Complexity of the Pointer Function
The Zero-Error Randomized Query Complexity of the Pointer Function Jaikumar Radhakrishnan 1 and Swagato Sanyal 2 1 Tata Institute of Fundamental Research, India jaikumar@tifr.res.in 2 Tata Institute of
More informationNP-Completeness. A language B is NP-complete iff B NP. This property means B is NP hard
NP-Completeness A language B is NP-complete iff B NP A NP A P B This property means B is NP hard 1 3SAT is NP-complete 2 Result Idea: B is known to be NP complete Use it to prove NP-Completeness of C IF
More informationA An Overview of Complexity Theory for the Algorithm Designer
A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula
More informationCS 583: Algorithms. NP Completeness Ch 34. Intractability
CS 583: Algorithms NP Completeness Ch 34 Intractability Some problems are intractable: as they grow large, we are unable to solve them in reasonable time What constitutes reasonable time? Standard working
More informationLecture 24: Randomized Complexity, Course Summary
6.045 Lecture 24: Randomized Complexity, Course Summary 1 1/4 1/16 1/4 1/4 1/32 1/16 1/32 Probabilistic TMs 1/16 A probabilistic TM M is a nondeterministic TM where: Each nondeterministic step is called
More informationarxiv: v1 [cs.cc] 6 Apr 2010
arxiv:1004.0817v1 [cs.cc] 6 Apr 2010 A Separation of NP and conp in Multiparty Communication Complexity Dmitry Gavinsky Alexander A. Sherstov Abstract We prove that NP conp and conp MA in the number-onforehead
More information1. Introduction Recap
1. Introduction Recap 1. Tractable and intractable problems polynomial-boundness: O(n k ) 2. NP-complete problems informal definition 3. Examples of P vs. NP difference may appear only slightly 4. Optimization
More informationLower Bound Techniques for Multiparty Communication Complexity
Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1 The multiparty number-in-hand
More informationNotes on Space-Bounded Complexity
U.C. Berkeley CS172: Automata, Computability and Complexity Handout 7 Professor Luca Trevisan April 14, 2015 Notes on Space-Bounded Complexity These are notes for CS278, Computational Complexity, scribed
More informationCutting Plane Methods II
6.859/5.083 Integer Programming and Combinatorial Optimization Fall 2009 Cutting Plane Methods II Gomory-Chvátal cuts Reminder P = {x R n : Ax b} with A Z m n, b Z m. For λ [0, ) m such that λ A Z n, (λ
More informationMultiparty Communication Complexity of Disjointness
Multiparty Communication Complexity of Disjointness Aradev Chattopadhyay and Anil Ada School of Computer Science McGill University, Montreal, Canada achatt3,aada@cs.mcgill.ca We obtain a lower bound of
More informationCS 151 Complexity Theory Spring Solution Set 5
CS 151 Complexity Theory Spring 2017 Solution Set 5 Posted: May 17 Chris Umans 1. We are given a Boolean circuit C on n variables x 1, x 2,..., x n with m, and gates. Our 3-CNF formula will have m auxiliary
More informationLecture 20: Lower Bounds for Inner Product & Indexing
15-859: Information Theory and Applications in TCS CMU: Spring 201 Lecture 20: Lower Bounds for Inner Product & Indexing April 9, 201 Lecturer: Venkatesan Guruswami Scribe: Albert Gu 1 Recap Last class
More informationLecture 15: Privacy Amplification against Active Attackers
Randomness in Cryptography April 25, 2013 Lecture 15: Privacy Amplification against Active Attackers Lecturer: Yevgeniy Dodis Scribe: Travis Mayberry 1 Last Time Previously we showed that we could construct
More informationDynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.
Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains
More informationCS 395T Computational Learning Theory. Scribe: Mike Halcrow. x 4. x 2. x 6
CS 395T Computational Learning Theory Lecture 3: September 0, 2007 Lecturer: Adam Klivans Scribe: Mike Halcrow 3. Decision List Recap In the last class, we determined that, when learning a t-decision list,
More informationLecture notes on OPP algorithms [Preliminary Draft]
Lecture notes on OPP algorithms [Preliminary Draft] Jesper Nederlof June 13, 2016 These lecture notes were quickly assembled and probably contain many errors. Use at your own risk! Moreover, especially
More information