Clique vs. Independent Set

Size: px
Start display at page:

Download "Clique vs. Independent Set"

Transcription

1 Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

2 On page 6... Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

3 CIS problem [Yannakakis, STOC 88] G = ([n], E) Alice Bob Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

4 CIS problem [Yannakakis, STOC 88] G = ([n], E) Alice Clique x [n] of G Bob Independent set y [n] of G Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

5 CIS problem [Yannakakis, STOC 88] G = ([n], E) Alice Clique x [n] of G Bob Independent set y [n] of G Compute: CIS G (x, y) = x y Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

6 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

7 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Known bounds: G : NP cc (CIS G ) = log n (guess x y) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

8 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Known bounds: G : G : NP cc (CIS G ) = log n (guess x y) conp cc (CIS G ) O(log n) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

9 Background Yannakakis s motivation: Size of LPs for the vertex packing polytope of G Breakthrough: [Fiorini et al., STOC ] Known bounds: G : G : NP cc (CIS G ) = log n (guess x y) conp cc (CIS G ) O(log n) Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

10 Background Alon Saks Seymour conjecture: G : χ(g) bp(g) +? Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

11 Background Alon Saks Seymour conjecture: G : χ(g) bp(g) +? [Huang Sudakov, ]: G : χ(g) bp(g) 6/5 Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

12 Background Polynomial Alon Saks Seymour conjecture: G : χ(g) poly( bp(g))? Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

13 Background Polynomial Alon Saks Seymour conjecture: G : χ(g) poly( bp(g))? [Alon Haviv] = = [Bousquet et al.] Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

14 Background Polynomial Alon Saks Seymour conjecture: G : χ(g) poly( bp(g))? [Alon Haviv] = = [Bousquet et al.] Yannakakis s question: G : conp cc (CIS G ) O(log n)? Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

15 Our result Main theorem G : conp cc (CIS G ) Ω(log.8 n) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4

16 Our result Main theorem G : conp cc (CIS G ) Ω(log.8 n) Prior bounds Measure Lower bound Reference P cc log n Kushilevitz, Linial, and Ostrovsky (999) conp cc 6/5 log n Huang and Sudakov () conp cc / log n Amano (4) conp cc log n Shigeta and Amano (4) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4

17 Our result Main theorem G : conp cc (CIS G ) Ω(log.8 n) Proof strategy: Query complexity Communication complexity Cf. lower bounds for log-rank [Nisan Wigderson, 995] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4

18 Models of communication F : X Y {, } Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4

19 Models of communication NP cc Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4

20 Models of communication UP cc Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4

21 Models of communication CIS G is complete for UP cc : F CIS G UP cc (F) = UP cc (CIS G ) = log n Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 5 / 4

22 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4

23 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4

24 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Decision tree complexity measures: NP dt = DNF width = -certificate complexity conp dt = CNF width = -certificate complexity UP dt = Unambiguous DNF width Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4

25 Proof strategy Restatement of Main theorem: F : X Y {, } conp cc (F) UP cc (F).8 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Agenda: Step : Query separation Step : Simulation theorem [GLMWZ, 5] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 6 / 4

26 Step : Query separation Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 7 / 4

27 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4

28 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Recursive composition: f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) x x x Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4

29 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Recursive composition: f f f f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) x x x x 4 x 5 x 6 x 7 x 8 x 9 Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4

30 Warm-up Example: Let f (x, x, x ) = iff x + x + x {, } UP dt ( f ) = because f x x x x x x conp dt ( f ) = because -input is fully sensitive Recursive composition: f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) f x x x f x 4 x 5 x 6 f x 7 x 8 x 9 Hope: conp dt ( f i ) UP dt ( f i ) ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4

31 Warm-up Example: Problem! Let f (x, x, x ) = iff x + x + x {, } In order UP dt ( tof ) certify = because f i ( ) = f, x x x (should x x x be easy) might need conp dt to certify f ( f ) = because i ( ) = (should be hard) -input is fully sensitive Recursive composition: f f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) f x x x f x 4 x 5 x 6 f x 7 x 8 x 9 Hope: conp dt ( f i ) UP dt ( f i ) ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4

32 Warm-up Example: Problem! Let f (x, x, x ) = iff x + x + x {, } In order UP dt ( tof ) certify = because f i ( ) = f, x x x (should x x x be easy) might need conp dt to certify f ( f ) = because i ( ) = (should be hard) -input is fully sensitive Solution: Enlarge input/output alphabets Recursive composition: f x x x f f x 4 x 5 x 6 f : ({} Σ) n {} Σ f x 7 x 8 x 9 f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) Hope: conp dt ( f i ) UP dt ( f i ) ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4

33 Warm-up Example: Problem! Let f (x, x, x ) = iff x + x + x {, } In order UP dt ( tof ) certify = because f i ( ) = f, x x x (should x x x be easy) might need conp dt to certify f ( f ) = because i ( ) = (should be hard) -input is fully sensitive Solution: Enlarge input/output alphabets Recursive composition: f f : ({} Σ) n {} Σ f ( ) := f ( ) f i+ ( ) := f ( f i ( ), f i ( ), f i ( )) f f f Now: In order to certify f i ( ) = σ for σ Σ, only need to certify f i ( conp Hope: ) = σ for σ dt Σ( f i ) UP dt ( f x x x x 4 x 5 x 6 x 7 x 8 x i ) 9 ( ) i Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 8 / 4

34 Defining f Any two certificates in an UP dt decision tree intersect in variables = Finite projective planes! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

35 Defining f Incidence ordering: Each node orders its incident edges using numbers from [] Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

36 Defining f Inputs to nodes: Pointer values from {} [] }{{} ( is a null pointer) =Σ Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

37 Defining f Defining f : ({} []) 7 {, } Say edge e is satisfied on input x iff all nodes v e point to e under x f (x) = iff x satisfies an edge Clearly UP dt ( f ) = Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

38 Defining f Problem! Certifying f ( ) = too easy! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

39 Defining f Add input weights: f g 7 Gadget g is such that deciding if g( ) = i for i [] costs i queries Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

40 Defining f Add input weights: f g 7 Gadget g is such that deciding if g( ) = i for i [] costs i queries Else Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

41 Defining f Key properties: UP dt ( f g 7 ) = + + = 6 Certifying ( f g 7 )( ) = requires (# edges) = 7 queries Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

42 Defining f Key properties: UP dt ( f g 7 ) = + + = 6 Certifying ( f g 7 )( ) = requires (# edges) = 7 queries (Magic numerology: ) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

43 Defining f Key properties: UP dt ( f g 7 ) = + + = 6 Recursive composition Certifying ( f g 7 )( ) = Key trick: requires (# edges) = 7 queries ) From ({} Σ) (Magic n {, } numerology: Construct ({} Σ) n {} {pointers} Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 9 / 4

44 Query separation: f : {, } n {, } conp dt ( f ) UP dt ( f ).8 Step : Simulation theorem from Rectangles Are Nonnegative Juntas Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman (STOC 5) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

45 Composed functions f g n f Compose with gn f z z z z 4 z 5 g g g g g x y x y x y x 4 y 4 x 5 y 5 Examples: Set-disjointness: OR AND n Inner-product: XOR AND n Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

46 Composed functions f g n f Compose with gn f z z z z 4 z 5 g g g g g x y x y x y x 4 y 4 x 5 y 5 Examples: In general: We choose: Set-disjointness: OR AND n Inner-product: XOR AND n g : {, } b {, } b {, } is a small gadget Alice holds x {, } bn Bob holds y {, } bn g = inner-product with b = Θ(log n) bits per party Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

47 Approximation by juntas Conical d-junta: Nonnegative combination of d-conjunctions (Example:.4 z z +.66 z z +.5 z z ) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

48 Approximation by juntas Conical d-junta: Nonnegative combination of d-conjunctions (Example:.4 z z +.66 z z +.5 z z ) Main Structure Theorem: Suppose Π is cost-d randomised protocol for f g n Then there exists a conical d-junta h s.t. z dom f : Pr [ Π(x, y) accepts ] h(z) (x,y) (g n ) (z) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

49 Approximation by juntas Conical d-junta: Nonnegative combination of d-conjunctions (Example:.4 z z +.66 z z +.5 z z ) Main Structure Theorem: Suppose Π is cost-d randomised protocol for f g n Then there exists a conical d-junta h s.t. z dom f : Pr [ Π(x, y) accepts ] h(z) (x,y) (g n ) (z) Cf. Polynomial approximation [Razborov, Sherstov, Shi Zhu,... ]: Approximate poly-degree of AND = Θ( n) Approximate junta-degree of AND = Θ(n) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

50 Corollaries Simulation for NP: NP cc ( f g n ) = Θ(NP dt ( f ) b)... recall b = Θ(log n) Conical d-junta:.4 z z +.66 z z +.5 z z d-dnf: z z z z z z Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

51 Corollaries Simulation for NP: NP cc ( f g n ) = Θ(NP dt ( f ) b)... recall b = Θ(log n) Trivially: UP cc ( f g n ) O(UP dt ( f ) b) Main theorem follows! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

52 Corollaries Simulation for NP: NP cc ( f g n ) = Θ(NP dt ( f ) b)... recall b = Θ(log n) NP MA Also covered! P BPP WAPP SBP PostBPP PP smooth rectangle corruption ext. discrepancy discrepancy Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4

53 Summary Main result G : conp cc (CIS G ) Ω(log.8 n) Open problems Better separation for conp dt vs. UP dt? Simulation theorems for new models (e.g., BPP) Improve gadget size down to b = O() (Would give new proof of Ω(n) bound for set-disjointness) Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4

54 Summary Main result G : conp cc (CIS G ) Ω(log.8 n) Open problems Better separation for conp dt vs. UP dt? Simulation theorems for new models (e.g., BPP) Improve gadget size down to b = O() (Would give new proof of Ω(n) bound for set-disjointness) Cheers! Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 4 / 4

THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY

THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY THE CIS PROBLEM AND RELATED RESULTS IN GRAPH THEORY RYAN ALWEISS, YANG LIU Abstract. In this survey, we will show that there are instances of the CIS problem on n vertices which cannot be solved deterministically

More information

Monotone Circuit Lower Bounds from Resolution

Monotone Circuit Lower Bounds from Resolution Monotone Circuit Lower Bounds from Resolution Ankit Garg Mika Göös Pritish Kamath Dmitry Sokolov MSR Harvard MIT KTH Mika Göös Monotone Circuits & Resolution 25th October 2017 1 / 22 Background: Query-to-communication

More information

Communication Lower Bounds via Query Complexity

Communication Lower Bounds via Query Complexity Communication Lower Bounds via Query Complexity by Mika Göös A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy, Graduate Department of Computer Science, University

More information

A Composition Theorem for Conical Juntas

A Composition Theorem for Conical Juntas A Composition Theorem for Conical Juntas Mika Göös T.S. Jayram University of Toronto IBM Almaden Göös and Jayram A composition theorem for conical juntas 29th May 2016 1 / 12 Motivation Randomised communication

More information

Nonnegative Rank vs. Binary Rank

Nonnegative Rank vs. Binary Rank CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 06, Article, pages 3 http://cjtcs.cs.uchicago.edu/ Nonnegative Rank vs. Binary Rank Thomas Watson Received February 3, 04; Revised August 5, 05, and on February

More information

Communication Lower Bounds via Critical Block Sensitivity

Communication Lower Bounds via Critical Block Sensitivity Communication Lower Bounds via Critical Block Sensitivity Mika Göös & Toniann Pitassi University of Toronto Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January 2014 1 / 18 Communication

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

The Alon-Saks-Seymour and Rank-Coloring Conjectures

The Alon-Saks-Seymour and Rank-Coloring Conjectures The Alon-Saks-Seymour and Rank-Coloring Conjectures Michael Tait Department of Mathematical Sciences University of Delaware Newark, DE 19716 tait@math.udel.edu April 20, 2011 Preliminaries A graph is a

More information

Query-to-Communication Lifting for BPP

Query-to-Communication Lifting for BPP 58th Annual IEEE Symposium on Foundations of Computer Science Query-to-Communication Lifting for BPP Mika Göös Computer Science Department Harvard University Cambridge, MA, USA Email: mika@seas.harvard.edu

More information

arxiv: v3 [cs.cc] 28 Jun 2015

arxiv: v3 [cs.cc] 28 Jun 2015 Parity Decision Tree Complexity and 4-Party Communication Complexity of XOR-functions Are Polynomially Equivalent arxiv:156.2936v3 [cs.cc] 28 Jun 215 Penghui Yao CWI, Amsterdam phyao1985@gmail.com September

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Approximation norms and duality for communication complexity lower bounds

Approximation norms and duality for communication complexity lower bounds Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased

More information

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.

More information

THE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES. by Michael Tait

THE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES. by Michael Tait THE ALON-SAKS-SEYMOUR AND RANK-COLORING CONJECTURES by Michael Tait A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of

More information

Communication Complexity

Communication Complexity Communication Complexity Jie Ren Adaptive Signal Processing and Information Theory Group Nov 3 rd, 2014 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, 2014 1 / 77 1 E. Kushilevitz and N. Nisan, Communication Complexity,

More information

Chebyshev Polynomials, Approximate Degree, and Their Applications

Chebyshev Polynomials, Approximate Degree, and Their Applications Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)

More information

Communication is bounded by root of rank

Communication is bounded by root of rank Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r

More information

Post-selected classical query complexity

Post-selected classical query complexity Post-selected classical query complexity Chris Cade School of Mathematics, University of Bristol, UK May 5, 08 arxiv:804.000v [cs.cc] 4 May 08 Abstract We study classical query algorithms with post-selection,

More information

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single

More information

The Computational Complexity Column

The Computational Complexity Column The Computational Complexity Column by Vikraman Arvind Institute of Mathematical Sciences, CIT Campus, Taramani Chennai 600113, India arvind@imsc.res.in http://www.imsc.res.in/~arvind Communication complexity

More information

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we

More information

Structure of protocols for XOR functions

Structure of protocols for XOR functions Electronic Colloquium on Computational Complexity, Report No. 44 (016) Structure of protocols for XOR functions Kaave Hosseini Computer Science and Engineering University of California, San Diego skhossei@ucsd.edu

More information

Polynomial-time Reductions

Polynomial-time Reductions Polynomial-time Reductions Disclaimer: Many denitions in these slides should be taken as the intuitive meaning, as the precise meaning of some of the terms are hard to pin down without introducing the

More information

Kernelization Lower Bounds: A Brief History

Kernelization Lower Bounds: A Brief History Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi

More information

Structure of protocols for XOR functions

Structure of protocols for XOR functions Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 44 (2016) Structure of protocols for XOR functions Hamed Hatami School of Computer Science McGill University, Montreal hatami@cs.mcgill.ca

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Lower bounds on the size of semidefinite relaxations. David Steurer Cornell

Lower bounds on the size of semidefinite relaxations. David Steurer Cornell Lower bounds on the size of semidefinite relaxations David Steurer Cornell James R. Lee Washington Prasad Raghavendra Berkeley Institute for Advanced Study, November 2015 overview of results unconditional

More information

Polynomial Identity Testing and Circuit Lower Bounds

Polynomial Identity Testing and Circuit Lower Bounds Polynomial Identity Testing and Circuit Lower Bounds Robert Špalek, CWI based on papers by Nisan & Wigderson, 1994 Kabanets & Impagliazzo, 2003 1 Randomised algorithms For some problems (polynomial identity

More information

Information Complexity vs. Communication Complexity: Hidden Layers Game

Information Complexity vs. Communication Complexity: Hidden Layers Game Information Complexity vs. Communication Complexity: Hidden Layers Game Jiahui Liu Final Project Presentation for Information Theory in TCS Introduction Review of IC vs CC Hidden Layers Game Upper Bound

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

On the P versus NP intersected with co-np question in communication complexity

On the P versus NP intersected with co-np question in communication complexity On the P versus NP intersected with co-np question in communication complexity Stasys Jukna Abstract We consider the analog of the P versus NP co-np question for the classical two-party communication protocols

More information

Non-Deterministic Time

Non-Deterministic Time Non-Deterministic Time Master Informatique 2016 1 Non-Deterministic Time Complexity Classes Reminder on DTM vs NDTM [Turing 1936] (q 0, x 0 ) (q 1, x 1 ) Deterministic (q n, x n ) Non-Deterministic (q

More information

Lifting Nullstellensatz to Monotone Span Programs over Any Field

Lifting Nullstellensatz to Monotone Span Programs over Any Field Lifting Nullstellensatz to Monotone Span Programs over Any Field Toniann Pitassi University of Toronto and the Institute for Advanced Study Toronto, Canada and Princeton, U.S.A. toni@cs.toronto.edu ABSTRACT

More information

A.Antonopoulos 18/1/2010

A.Antonopoulos 18/1/2010 Class DP Basic orems 18/1/2010 Class DP Basic orems 1 Class DP 2 Basic orems Class DP Basic orems TSP Versions 1 TSP (D) 2 EXACT TSP 3 TSP COST 4 TSP (1) P (2) P (3) P (4) DP Class Class DP Basic orems

More information

Communication vs information complexity, relative discrepancy and other lower bounds

Communication vs information complexity, relative discrepancy and other lower bounds Communication vs information complexity, relative discrepancy and other lower bounds Iordanis Kerenidis CNRS, LIAFA- Univ Paris Diderot 7 Joint work with: L. Fontes, R. Jain, S. Laplante, M. Lauriere,

More information

Asymmetric Communication Complexity and Data Structure Lower Bounds

Asymmetric Communication Complexity and Data Structure Lower Bounds Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey

More information

CSE200: Computability and complexity Space Complexity

CSE200: Computability and complexity Space Complexity CSE200: Computability and complexity Space Complexity Shachar Lovett January 29, 2018 1 Space complexity We would like to discuss languages that may be determined in sub-linear space. Lets first recall

More information

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching

More information

CS151 Complexity Theory. Lecture 13 May 15, 2017

CS151 Complexity Theory. Lecture 13 May 15, 2017 CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P

More information

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Robert Špalek Google Direct product theorems: Why is Google interested? Direct product theorems: Why should Google be interested? Direct

More information

14. Direct Sum (Part 1) - Introduction

14. Direct Sum (Part 1) - Introduction Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in

More information

arxiv: v1 [cs.cc] 12 Feb 2009

arxiv: v1 [cs.cc] 12 Feb 2009 Symposium on Theoretical Aspects of Computer Science 2009 (Freiburg), pp. 685 696 www.stacs-conf.org arxiv:0902.2146v1 [cs.cc] 12 Feb 2009 A STRONGER LP BOUND FOR FORMULA SIZE LOWER BOUNDS VIA CLIQUE CONSTRAINTS

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Essential facts about NP-completeness:

Essential facts about NP-completeness: CMPSCI611: NP Completeness Lecture 17 Essential facts about NP-completeness: Any NP-complete problem can be solved by a simple, but exponentially slow algorithm. We don t have polynomial-time solutions

More information

Complexity, P and NP

Complexity, P and NP Complexity, P and NP EECS 477 Lecture 21, 11/26/2002 Last week Lower bound arguments Information theoretic (12.2) Decision trees (sorting) Adversary arguments (12.3) Maximum of an array Graph connectivity

More information

COMMUNICATION VS. COMPUTATION

COMMUNICATION VS. COMPUTATION comput. complex. 16 (2007), 1 33 1016-3328/07/010001-33 DOI 10.1007/s00037-007-0224-y c Birkhäuser Verlag, Basel 2007 computational complexity COMMUNICATION VS. COMPUTATION Prahladh Harsha, Yuval Ishai,

More information

Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I

Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I Yoshio Okamoto Tokyo Institute of Technology May, 008 Last updated: Wed May 6: 008 Y. Okamoto (Tokyo Tech) TCMSI Graph Theory

More information

Lecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition.

Lecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. Lecture #14: 0.0.1 NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. 0.0.2 Preliminaries: Definition 1 n abstract problem Q is a binary relations on a set I of

More information

Algebraic Problems in Computational Complexity

Algebraic Problems in Computational Complexity Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can

More information

Circuits. Lecture 11 Uniform Circuit Complexity

Circuits. Lecture 11 Uniform Circuit Complexity Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall

More information

Grothendieck Inequalities, XOR games, and Communication Complexity

Grothendieck Inequalities, XOR games, and Communication Complexity Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s

More information

COMP Analysis of Algorithms & Data Structures

COMP Analysis of Algorithms & Data Structures COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial

More information

Communication vs. Computation

Communication vs. Computation Communication vs. Computation Prahladh Harsha Yuval Ishai Joe Kilian Kobbi Nissim S. Venkatesh October 18, 2005 Abstract We initiate a study of tradeoffs between communication and computation in well-known

More information

Lecture 5: February 21, 2017

Lecture 5: February 21, 2017 COMS 6998: Advanced Complexity Spring 2017 Lecture 5: February 21, 2017 Lecturer: Rocco Servedio Scribe: Diana Yin 1 Introduction 1.1 Last Time 1. Established the exact correspondence between communication

More information

On The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product. Lijie Chen (Massachusetts Institute of Technology)

On The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product. Lijie Chen (Massachusetts Institute of Technology) On The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product Max a,b A B a b Lijie Chen (Massachusetts Institute of Technology) Max-IP and Z-Max-IP (Boolean) Max-IP: Given sets A and B

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q

More information

Introduction to Advanced Results

Introduction to Advanced Results Introduction to Advanced Results Master Informatique Université Paris 5 René Descartes 2016 Master Info. Complexity Advanced Results 1/26 Outline Boolean Hierarchy Probabilistic Complexity Parameterized

More information

Lecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time

Lecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time Analysis of Boolean Functions (CMU 8-859S, Spring 2007) Lecture 0: Learning DNF, AC 0, Juntas Feb 5, 2007 Lecturer: Ryan O Donnell Scribe: Elaine Shi Learning DNF in Almost Polynomial Time From previous

More information

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY Eric Blais, Joshua Brody, and Kevin Matulef February 1, 01 Abstract. We develop a new technique for proving lower bounds in property testing,

More information

BBM402-Lecture 11: The Class NP

BBM402-Lecture 11: The Class NP BBM402-Lecture 11: The Class NP Lecturer: Lale Özkahya Resources for the presentation: http://ocw.mit.edu/courses/electrical-engineering-andcomputer-science/6-045j-automata-computability-andcomplexity-spring-2011/syllabus/

More information

Evaluation of DNF Formulas

Evaluation of DNF Formulas Evaluation of DNF Formulas Sarah R. Allen Carnegie Mellon University Computer Science Department Pittsburgh, PA, USA Lisa Hellerstein and Devorah Kletenik Polytechnic Institute of NYU Dept. of Computer

More information

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 9/6/2004. Notes for Lecture 3

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 9/6/2004. Notes for Lecture 3 U.C. Berkeley CS278: Computational Complexity Handout N3 Professor Luca Trevisan 9/6/2004 Notes for Lecture 3 Revised 10/6/04 1 Space-Bounded Complexity Classes A machine solves a problem using space s(

More information

NP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof

NP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof T-79.5103 / Autumn 2006 NP-complete problems 1 NP-COMPLETE PROBLEMS Characterizing NP Variants of satisfiability Graph-theoretic problems Coloring problems Sets and numbers Pseudopolynomial algorithms

More information

1 PSPACE-Completeness

1 PSPACE-Completeness CS 6743 Lecture 14 1 Fall 2007 1 PSPACE-Completeness Recall the NP-complete problem SAT: Is a given Boolean formula φ(x 1,..., x n ) satisfiable? The same question can be stated equivalently as: Is the

More information

ON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS

ON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS Quantum Information and Computation, Vol. 0, No. 0 (2010) 000 000 c Rinton Press ON QUANTUM-CLASSICAL EQUIVALENCE FOR COMPOSED COMMUNICATION PROBLEMS ALEXANDER A. SHERSTOV Department of Computer Sciences,

More information

Notes on Space-Bounded Complexity

Notes on Space-Bounded Complexity U.C. Berkeley CS172: Automata, Computability and Complexity Handout 6 Professor Luca Trevisan 4/13/2004 Notes on Space-Bounded Complexity These are notes for CS278, Computational Complexity, scribed by

More information

Classes of Boolean Functions

Classes of Boolean Functions Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions

More information

Linear sketching for Functions over Boolean Hypercube

Linear sketching for Functions over Boolean Hypercube Linear sketching for Functions over Boolean Hypercube Grigory Yaroslavtsev (Indiana University, Bloomington) http://grigory.us with Sampath Kannan (U. Pennsylvania), Elchanan Mossel (MIT) and Swagato Sanyal

More information

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam Limits to Approximability: When Algorithms Won't Help You Note: Contents of today s lecture won t be on the exam Outline Limits to Approximability: basic results Detour: Provers, verifiers, and NP Graph

More information

Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine)

Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Mihai Pǎtraşcu, MIT, web.mit.edu/ mip/www/ Index terms: partial-sums problem, prefix sums, dynamic lower bounds Synonyms: dynamic trees 1

More information

Lecture 20: conp and Friends, Oracles in Complexity Theory

Lecture 20: conp and Friends, Oracles in Complexity Theory 6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:

More information

The Polynomial Hierarchy

The Polynomial Hierarchy The Polynomial Hierarchy Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Motivation..synthesizing circuits is exceedingly difficulty. It is even

More information

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels

More information

1.1 P, NP, and NP-complete

1.1 P, NP, and NP-complete CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Introduction to NP-complete Problems Date: 11/01/2008 Lecturer: Lap Chi Lau Scribe: Jerry Jilin Le This lecture gives a general introduction

More information

On the Isomorphism Problem for Decision Trees and Decision Lists

On the Isomorphism Problem for Decision Trees and Decision Lists On the Isomorphism Problem for Decision Trees and Decision Lists V. Arvind 1, Johannes Köbler 2, Sebastian Kuhnert 2, Gaurav Rattan 1, and Yadu Vasudev 1 1 The Institute of Mathematical Sciences, Chennai,

More information

The Zero-Error Randomized Query Complexity of the Pointer Function

The Zero-Error Randomized Query Complexity of the Pointer Function The Zero-Error Randomized Query Complexity of the Pointer Function Jaikumar Radhakrishnan 1 and Swagato Sanyal 2 1 Tata Institute of Fundamental Research, India jaikumar@tifr.res.in 2 Tata Institute of

More information

NP-Completeness. A language B is NP-complete iff B NP. This property means B is NP hard

NP-Completeness. A language B is NP-complete iff B NP. This property means B is NP hard NP-Completeness A language B is NP-complete iff B NP A NP A P B This property means B is NP hard 1 3SAT is NP-complete 2 Result Idea: B is known to be NP complete Use it to prove NP-Completeness of C IF

More information

A An Overview of Complexity Theory for the Algorithm Designer

A An Overview of Complexity Theory for the Algorithm Designer A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula

More information

CS 583: Algorithms. NP Completeness Ch 34. Intractability

CS 583: Algorithms. NP Completeness Ch 34. Intractability CS 583: Algorithms NP Completeness Ch 34 Intractability Some problems are intractable: as they grow large, we are unable to solve them in reasonable time What constitutes reasonable time? Standard working

More information

Lecture 24: Randomized Complexity, Course Summary

Lecture 24: Randomized Complexity, Course Summary 6.045 Lecture 24: Randomized Complexity, Course Summary 1 1/4 1/16 1/4 1/4 1/32 1/16 1/32 Probabilistic TMs 1/16 A probabilistic TM M is a nondeterministic TM where: Each nondeterministic step is called

More information

arxiv: v1 [cs.cc] 6 Apr 2010

arxiv: v1 [cs.cc] 6 Apr 2010 arxiv:1004.0817v1 [cs.cc] 6 Apr 2010 A Separation of NP and conp in Multiparty Communication Complexity Dmitry Gavinsky Alexander A. Sherstov Abstract We prove that NP conp and conp MA in the number-onforehead

More information

1. Introduction Recap

1. Introduction Recap 1. Introduction Recap 1. Tractable and intractable problems polynomial-boundness: O(n k ) 2. NP-complete problems informal definition 3. Examples of P vs. NP difference may appear only slightly 4. Optimization

More information

Lower Bound Techniques for Multiparty Communication Complexity

Lower Bound Techniques for Multiparty Communication Complexity Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1 The multiparty number-in-hand

More information

Notes on Space-Bounded Complexity

Notes on Space-Bounded Complexity U.C. Berkeley CS172: Automata, Computability and Complexity Handout 7 Professor Luca Trevisan April 14, 2015 Notes on Space-Bounded Complexity These are notes for CS278, Computational Complexity, scribed

More information

Cutting Plane Methods II

Cutting Plane Methods II 6.859/5.083 Integer Programming and Combinatorial Optimization Fall 2009 Cutting Plane Methods II Gomory-Chvátal cuts Reminder P = {x R n : Ax b} with A Z m n, b Z m. For λ [0, ) m such that λ A Z n, (λ

More information

Multiparty Communication Complexity of Disjointness

Multiparty Communication Complexity of Disjointness Multiparty Communication Complexity of Disjointness Aradev Chattopadhyay and Anil Ada School of Computer Science McGill University, Montreal, Canada achatt3,aada@cs.mcgill.ca We obtain a lower bound of

More information

CS 151 Complexity Theory Spring Solution Set 5

CS 151 Complexity Theory Spring Solution Set 5 CS 151 Complexity Theory Spring 2017 Solution Set 5 Posted: May 17 Chris Umans 1. We are given a Boolean circuit C on n variables x 1, x 2,..., x n with m, and gates. Our 3-CNF formula will have m auxiliary

More information

Lecture 20: Lower Bounds for Inner Product & Indexing

Lecture 20: Lower Bounds for Inner Product & Indexing 15-859: Information Theory and Applications in TCS CMU: Spring 201 Lecture 20: Lower Bounds for Inner Product & Indexing April 9, 201 Lecturer: Venkatesan Guruswami Scribe: Albert Gu 1 Recap Last class

More information

Lecture 15: Privacy Amplification against Active Attackers

Lecture 15: Privacy Amplification against Active Attackers Randomness in Cryptography April 25, 2013 Lecture 15: Privacy Amplification against Active Attackers Lecturer: Yevgeniy Dodis Scribe: Travis Mayberry 1 Last Time Previously we showed that we could construct

More information

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V. Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains

More information

CS 395T Computational Learning Theory. Scribe: Mike Halcrow. x 4. x 2. x 6

CS 395T Computational Learning Theory. Scribe: Mike Halcrow. x 4. x 2. x 6 CS 395T Computational Learning Theory Lecture 3: September 0, 2007 Lecturer: Adam Klivans Scribe: Mike Halcrow 3. Decision List Recap In the last class, we determined that, when learning a t-decision list,

More information

Lecture notes on OPP algorithms [Preliminary Draft]

Lecture notes on OPP algorithms [Preliminary Draft] Lecture notes on OPP algorithms [Preliminary Draft] Jesper Nederlof June 13, 2016 These lecture notes were quickly assembled and probably contain many errors. Use at your own risk! Moreover, especially

More information