PRAMs. M 1 M 2 M p. globaler Speicher

Size: px
Start display at page:

Download "PRAMs. M 1 M 2 M p. globaler Speicher"

Transcription

1 PRAMs A PRAM (parallel random access machine) consists of p many identical processors M,..., M p (RAMs). Processors can read from/write to a shared (global) memory. Processors work synchronously. M M 2 M p globaler Speicher

2 PRAMs Different variants: CRCW (Concurrent Read Concurrent Write) CREW (Concurrent Read Exclusive Write) EREW (Exclusive Read Exclusive Write) ERCW (Exclusive Read Concurrent Write) randomized PRAMs: Processors may toss coins.

3 The Class NC Problems which are efficiently parallelizable. NC is called Nick s Class (after Nick Pippenger). Definition: A problem belongs to the class NC, if it can be solved on a PRAM such that for an input of length n, we: use only n d many processors (for a constant d), and spend time (log n) c (for a constant c). The class is robust to minor changes of the machine model: for instance, it doesn t matter, whether we use the CRCW/CREW/EREW/ERCW PRAM-model. The question NC? = P is still open.

4 Recall that an independent set of an undirected graph G = (V, E) is a subset I V such that (u, v) E for all u, v I. Goal: For a given undirected graph G = (V, E), find an independent set I V of G, which is maximal under inclusion, i.e., if I J for an independent set J then I = J. We want to do this in NC, i.e., in polylogarithmic time using polynomially many processors. Our first solution will be a randomized NC-algorithm. For a set U V of nodes let N(U) = {v V u U : (u, v) E} be the set of neighbors of U.

5 Luby s algorithm works in rounds. In every round we calculate an independent set I in the current graph G and remove I N(I ) (and all edges that are incident with a node from I N(I )) from G. We repeat this until the graph is empty. The calculated independent set is the union of the independent sets calculated in the rounds. A single round, where d(v) = N(v) for v V : In parallel: for every node v V, put v with probability 2d(v) into a set S (isolated nodes can be put into S into a preprocessing step), independently from the other nodes (i.e., Pr( k i= v i S) = k i= Pr(v i S)). In parallel: For every (u, v) E with u, v S, remove from S the node with the smaller degree (break ties arbitrarily). Call the remaining set I ; it is an independent set.

6 A single round can be done in constant time using O( V 2 ) processors. We will show that the expected value of the number of rounds is in O(log E ). First step: We show that the expected number of edges that are deleted in every round is at least 72 of the total number of edges.

7 Lemma For every node v: Pr(v I ) 4d(v) Proof: We will show that Then we obtain: Pr(v I v S) 2 Pr(v I ) = Pr(v I v S) Pr(v S) Pr(v S) = 2 4d(v).

8 We have Thus: Pr(v I v S) Pr( u L(v) : u S v S) where L(v) = {u N(v) d(u) d(v)}. Pr(v I v S) u L(v) = u L(v) = u L(v) u L(v) Pr(u S v S) Pr(u S) 2d(u) (independence) 2d(v), since L(v) N(v). 2

9 Definition: A node v V is good, if 2d(u) 6 u N(v) (intuition: many neighbors with small degree), otherwise v is bad. An edge (u, v) E is good, if u or v is good, otherwise it is bad. Lemma For a good node v V we have Pr(v N(I )) 36. Proof: Case : u N(v) : 2d(u) > 6. Then, by the previous lemma, Pr(v N(I )) Pr(u I ) 4d(u) > 2 > 36.

10 Case 2: u N(v) : 2d(u) 6. Then there exists M(v) N(v) with 6 u M(v) 2d(u) 3. Thus Pr(v N(I )) Pr( u M(v) : u I ) Pr(u I ) = u M(v) u M(v) 4d(u) (independence) 4d(u) u M(v) u M(v) 2d(u) u,w M(v),u w u,w M(v),u w u,w M(v) 2 w M(v) 2d(u) Pr(u I w I ) Pr(u S w S) 2d(w) 2d(w) 6 6 = 36

11 By the previous lemma, a good edge will be deleted with probability at least /36. Lemma At least half of all edges are good. Proof: Direct every edge towards its endpoint of higher degree, breaking ties arbitrarily. Claim: For every bad node v V, there are at least twice as many outgoing edges than incoming edges. Proof of the claim: Let N be the set of predecessors of v after directing the edges. If N d(v) 3, then u N(v) 2d(u) u N 2d(v) = 2 N d(v) 6, i.e., v would be good a contradiction.

12 Thus, N d(v) < 3, i.e., N < 2 (d(v) N ), which proves the claim. Hence, to every bad edge e (for which both endpoints are bad) we can assign a set P(e) = {e, e 2 } of two edges e e 2 such that e f P(e) P(f ) =. This proves the lemma.

13 Theorem Let X be the number of edges that are deleted (in a certain round). Then for the expected value E(X ) of X we have E(X ) E 72. Proof: Let X e =, if e is deleted, otherwise X e = 0. Then we have: E(X ) = E(X e ) E(X e ) e E e good e good 36 E 2 36

14 Let m be the total number of edges in our graph. For i 0 we define S i = number of edges that were removed in round i. X i = number of edges that are removed in round i. Thus, S 0 = 0, S i m, and S i+ = S i + X i+. The statement of the previous theorem can be restated as follows, where ε = 72 : E(X i+ S i = l) = k N k Pr(X i+ = k S i = l) ε(m l) Lemma E(X i+ ) ε m ε E(S i )

15 Proof: E(X i+ ) = k Pr(X i+ = k) k N = k Pr(X i+ = k S i = l) k,l N = k Pr(X i+ = k S i = l) Pr(S i = l) k,l N = Pr(S i = l) k Pr(X i+ = k S i = l) l N k N = Pr(S i = l) E(X i+ S i = l) l N Pr(S i = l) ε(m l) l N = ε m ε l Pr(S i = l) = ε m ε E(S i ) l N

16 Lemma E(S i ) m( ( ε) i ). Proof: Induction on i. The case i = 0 is clear. For i + we obtain: E(S i+ ) = E(S i ) + E(X i+ ) E(S i ) + εm ε E(S i ) = εm + ( ε)e(s i ) εm + m( ε)( ( ε) i ) = m( ( ε) i+ )

17 Lemma E(S i ) m + Pr(S i = m) Proof: E(S i ) = m j Pr(S i = j) j=0 m (m ) Pr(S i = j) + m Pr(S i = m) j=0 = m Pr(S i = m) + (m )( Pr(S i = m)) = m + Pr(S i = m)

18 By the two previous lemmas we have Pr(S i = m) m( ε) i. Thus, Pr(S i < m) m( ε) i. Choose k O(log m) such that m( ε) k. Then, for i k we have Pr(S i < m) m( ε) i ( ε) i k. Define f : N {0, } by f (x) = { if x < m 0 otherwise. Thus, E(f (S i )) = Pr(S i < m) ( ε) i k for i k.

19 The random variable R = f (S 0 ) + f (S ) + f (S 2 ) + counts the number of rounds in Luby s algorithm. We have E(R) = i 0 E(f (S i )) k + i k E(f (S i )) k + i k ( ε) i k = k + ε O(log m) We have shown Theorem The expected number of rounds in Luby s algorithm is in O(log m).

20 In the current version of Luby s algorithm we put a node v into S with probability 2d(v). For this we have to flip n = V many biased coins (with Pr(head) = 2d(v) and Pr(tail) = 2d(v) ) independently. It can be shown that n Ω() many truely random bits (fair coin flips) are necessary (and sufficient) in order to approximate these n independent biased coin flips sufficiently good. But: In the analysis of Luby s algorithm, we only used pairwise independence. We will show that Ω(log(n)) many random bits suffice in order to generate n = V biased coin flips (Pr(head) 2d(v) ) that are pairwise independent.

21 This leads to a derandomized version of Luby s algorithm: Assume that α log(n) random bits suffice in order to generate n biased coin flips, where α is a constant. Let R = {0, } α log(n), thus R = n α. A single round in Luby s algorithm is replaced by the following procedure: for all s = a a α log(n) R do in parallel simulate the next round of Luby s algorithm deterministically with a i = the i-th random bit endfor choose that simulation that removes the largest number of edges and go with the resulting graph to the next round

22 For every v V let δ(v) R such that 7 9 2d(v) = 2d(v) 9d(v) 2δ(v) 2d(v) First, we check that the analysis of Luby s algorithm also works when we replace d(v) by δ(v) everywhere (in particular, Pr(v S) := 2δ(v) ). Lemma ( v V : Pr(v I ) 4δ(v) ): Lemma 2 (v good Pr(v N(I )) /36): Recall that v is good if u N(v) good if one of its endpoints is good. 2δ(u) 6 and that an edge is

23 Instead of showing that at least half of the edges are good (Lemma 3), we will prove that at least /4 of all edges are good. Again, we direct every edge towards its endpoint with larger δ-value. Lemma Let n = N be the number of incoming edges of a node v. If then v is good. 7n 8d(v) 6 Proof u N(v) 2δ(u) u N 2δ(v) = n 2δ(v) 7 9 n 2d(v) 6

24 Thus, if v is bad then 7 8 n d(v) 6. We obtain n 3 7 d(v). Thus, d(v) n 7 3 n n = 4 3 n. Therefore, n 3 4 (d(v) n ), i.e., at least /4 of all edges is good. If X is the number of edges that are removed (in a certain round), then we obtain E(X ) 36 E 4 = 44 E

25 We have shown that Luby s algorithm works with δ(v) instead of d(v) as well. [ ] 7 Recall δ only has to satisfy 2δ(v) 9 2d(v),. 2d(v) Now choose a prime number p with 9n p 8n such a prime exists by Betrand s postulat. We may identify V with a subset of F p = {0,..., p }. [ ] The interval 7 9 2d(v), 2d(v) has size 2d(v) 7 9 2d(v) = 9d(v) 9n p, thus there exists a number of the form av 9n in this interval for some a v N. We can set 2δ(v) = av p. Determine a subset A v F p with A v = a v, where 7 9 2d(v) av p = 2δ(v) 2d(v)

26 Now choose (x, y) F p F p randomly (using O(log(n)) many random bits) and put v into S if and only if x + vy A v. Since for every y, z F p there is exactly one x F p with x + vy = z, namely x = z vy, we have Pr(v S) = p 2 {(x, y) x + vy A v} = p 2 z A v {(x, y) x + vy = z} = p 2 z A v p = a v p

27 Finally, we have to show pairwise independence: Let u v be two different nodes. Then Pr(u S v S) = p 2 {(x, y) x + uy A u x + vy A v } = { ( ) ( ) ( )} u x zu p 2 (x, y) = v y (z u,z v ) A u A v z v

28 The matrix has an inverse (the determinant is v u 0), thus for every (z u, z v ) there is exactly one (x, y) F p F p for We obtain ( u v ) ( x y ) = ( zu z v ) Pr(u S v S) = p 2 a ua v = a u p a v p = Pr(u S) Pr(v S). We have shown pairwise independence.

R ij = 2. Using all of these facts together, you can solve problem number 9.

R ij = 2. Using all of these facts together, you can solve problem number 9. Help for Homework Problem #9 Let G(V,E) be any undirected graph We want to calculate the travel time across the graph. Think of each edge as one resistor of 1 Ohm. Say we have two nodes: i and j Let the

More information

Graph-theoretic Problems

Graph-theoretic Problems Graph-theoretic Problems Parallel algorithms for fundamental graph-theoretic problems: We already used a parallelization of dynamic programming to solve the all-pairs-shortest-path problem. Here we are

More information

Lecture Notes CS:5360 Randomized Algorithms Lecture 20 and 21: Nov 6th and 8th, 2018 Scribe: Qianhang Sun

Lecture Notes CS:5360 Randomized Algorithms Lecture 20 and 21: Nov 6th and 8th, 2018 Scribe: Qianhang Sun 1 Probabilistic Method Lecture Notes CS:5360 Randomized Algorithms Lecture 20 and 21: Nov 6th and 8th, 2018 Scribe: Qianhang Sun Turning the MaxCut proof into an algorithm. { Las Vegas Algorithm Algorithm

More information

Dominating Set. Chapter 7

Dominating Set. Chapter 7 Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Dominating Set. Chapter 26

Dominating Set. Chapter 26 Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET 294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It

More information

CSE 190, Great ideas in algorithms: Pairwise independent hash functions

CSE 190, Great ideas in algorithms: Pairwise independent hash functions CSE 190, Great ideas in algorithms: Pairwise independent hash functions 1 Hash functions The goal of hash functions is to map elements from a large domain to a small one. Typically, to obtain the required

More information

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Coping With NP-hardness Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you re unlikely to find poly-time algorithm. Must sacrifice one of three desired features. Solve

More information

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 Recall the definition of probabilistically checkable proofs (PCP) from last time. We say L has

More information

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria 12. LOCAL SEARCH gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley h ttp://www.cs.princeton.edu/~wayne/kleinberg-tardos

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H, K) with H K = G and E(H K) = and V (H) V (K) = k. Such a separation is proper if V (H) \ V (K) and V (K)

More information

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected.

Observation 4.1 G has a proper separation of order 0 if and only if G is disconnected. 4 Connectivity 2-connectivity Separation: A separation of G of order k is a pair of subgraphs (H 1, H 2 ) so that H 1 H 2 = G E(H 1 ) E(H 2 ) = V (H 1 ) V (H 2 ) = k Such a separation is proper if V (H

More information

Lecture 11: Generalized Lovász Local Lemma. Lovász Local Lemma

Lecture 11: Generalized Lovász Local Lemma. Lovász Local Lemma Lecture 11: Generalized Recall We design an experiment with independent random variables X 1,..., X m We define bad events A 1,..., A n where) the bad event A i depends on the variables (X k1,..., X kni

More information

The Algorithmic Aspects of the Regularity Lemma

The Algorithmic Aspects of the Regularity Lemma The Algorithmic Aspects of the Regularity Lemma N. Alon R. A. Duke H. Lefmann V. Rödl R. Yuster Abstract The Regularity Lemma of Szemerédi is a result that asserts that every graph can be partitioned in

More information

CS151 Complexity Theory. Lecture 14 May 17, 2017

CS151 Complexity Theory. Lecture 14 May 17, 2017 CS151 Complexity Theory Lecture 14 May 17, 2017 IP = PSPACE Theorem: (Shamir) IP = PSPACE Note: IP PSPACE enumerate all possible interactions, explicitly calculate acceptance probability interaction extremely

More information

Ma/CS 6b Class 15: The Probabilistic Method 2

Ma/CS 6b Class 15: The Probabilistic Method 2 Ma/CS 6b Class 15: The Probabilistic Method 2 By Adam Sheffer Reminder: Random Variables A random variable is a function from the set of possible events to R. Example. Say that we flip five coins. We can

More information

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness

More information

Finding Hamilton cycles in robustly expanding digraphs

Finding Hamilton cycles in robustly expanding digraphs Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 16, no. 2, pp. 335 358 (2012) Finding Hamilton cycles in robustly expanding digraphs Demetres Christofides 1 Peter Keevash 1 Daniela

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should

More information

1 More finite deterministic automata

1 More finite deterministic automata CS 125 Section #6 Finite automata October 18, 2016 1 More finite deterministic automata Exercise. Consider the following game with two players: Repeatedly flip a coin. On heads, player 1 gets a point.

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

CMPUT 675: Approximation Algorithms Fall 2014

CMPUT 675: Approximation Algorithms Fall 2014 CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

Testing Monotone High-Dimensional Distributions

Testing Monotone High-Dimensional Distributions Testing Monotone High-Dimensional Distributions Ronitt Rubinfeld Computer Science & Artificial Intelligence Lab. MIT Cambridge, MA 02139 ronitt@theory.lcs.mit.edu Rocco A. Servedio Department of Computer

More information

Maximal Independent Set

Maximal Independent Set Lecture 5 Maximal Independent Set The problem Definition 5.1 (Independent Set). Given an undirected Graph G = (V, E) an independent set is a subset of nodes U V, such that no two nodes in U are adjacent.

More information

14.1 Finding frequent elements in stream

14.1 Finding frequent elements in stream Chapter 14 Streaming Data Model 14.1 Finding frequent elements in stream A very useful statistics for many applications is to keep track of elements that occur more frequently. It can come in many flavours

More information

Lecture 21 November 11, 2014

Lecture 21 November 11, 2014 CS 224: Advanced Algorithms Fall 2-14 Prof. Jelani Nelson Lecture 21 November 11, 2014 Scribe: Nithin Tumma 1 Overview In the previous lecture we finished covering the multiplicative weights method and

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Umans Complexity Theory Lectures Lecture 8: Introduction to Randomized Complexity: - Randomized complexity classes, - Error reduction, - in P/poly - Reingold s Undirected Graph Reachability in RL Randomized

More information

CS151 Complexity Theory. Lecture 13 May 15, 2017

CS151 Complexity Theory. Lecture 13 May 15, 2017 CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P

More information

Lecture 18: PCP Theorem and Hardness of Approximation I

Lecture 18: PCP Theorem and Hardness of Approximation I Lecture 18: and Hardness of Approximation I Arijit Bishnu 26.04.2010 Outline 1 Introduction to Approximation Algorithm 2 Outline 1 Introduction to Approximation Algorithm 2 Approximation Algorithm Approximation

More information

Notes on MapReduce Algorithms

Notes on MapReduce Algorithms Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our

More information

CS261: A Second Course in Algorithms Lecture #18: Five Essential Tools for the Analysis of Randomized Algorithms

CS261: A Second Course in Algorithms Lecture #18: Five Essential Tools for the Analysis of Randomized Algorithms CS261: A Second Course in Algorithms Lecture #18: Five Essential Tools for the Analysis of Randomized Algorithms Tim Roughgarden March 3, 2016 1 Preamble In CS109 and CS161, you learned some tricks of

More information

All of the above algorithms are such that the total work done by themisω(n 2 m 2 ). (The work done by a parallel algorithm that uses p processors and

All of the above algorithms are such that the total work done by themisω(n 2 m 2 ). (The work done by a parallel algorithm that uses p processors and Efficient Parallel Algorithms for Template Matching Sanguthevar Rajasekaran Department of CISE, University of Florida Abstract. The parallel complexity of template matching has been well studied. In this

More information

Lecture 26: Arthur-Merlin Games

Lecture 26: Arthur-Merlin Games CS 710: Complexity Theory 12/09/2011 Lecture 26: Arthur-Merlin Games Instructor: Dieter van Melkebeek Scribe: Chetan Rao and Aaron Gorenstein Last time we compared counting versus alternation and showed

More information

Formalizing Probability. Choosing the Sample Space. Probability Measures

Formalizing Probability. Choosing the Sample Space. Probability Measures Formalizing Probability Choosing the Sample Space What do we assign probability to? Intuitively, we assign them to possible events (things that might happen, outcomes of an experiment) Formally, we take

More information

Parallel Peeling Algorithms

Parallel Peeling Algorithms Parallel Peeling Algorithms Jiayang Jiang Michael Mitzenmacher Justin Thaler Abstract The analysis of several algorithms and data structures can be framed as a peeling process on a random hypergraph: vertices

More information

Randomized Algorithms

Randomized Algorithms Randomized Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A new 4 credit unit course Part of Theoretical Computer Science courses at the Department of Mathematics There will be 4 hours

More information

Probabilistic Combinatorics. Jeong Han Kim

Probabilistic Combinatorics. Jeong Han Kim Probabilistic Combinatorics Jeong Han Kim 1 Tentative Plans 1. Basics for Probability theory Coin Tossing, Expectation, Linearity of Expectation, Probability vs. Expectation, Bool s Inequality 2. First

More information

arxiv: v1 [cs.dc] 22 May 2017

arxiv: v1 [cs.dc] 22 May 2017 Symmetry Breaking in the Congest Model: Timeand Message-Efficient Algorithms for Ruling Sets Shreyas Pai, Gopal Pandurangan 2, Sriram V. Pemmaraju, Talal Riaz, and Peter Robinson 3 arxiv:705.0786v [cs.dc]

More information

Notes on Complexity Theory Last updated: November, Lecture 10

Notes on Complexity Theory Last updated: November, Lecture 10 Notes on Complexity Theory Last updated: November, 2015 Lecture 10 Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Randomized Time Complexity 1.1 How Large is BPP? We know that P ZPP = RP corp

More information

Representations of All Solutions of Boolean Programming Problems

Representations of All Solutions of Boolean Programming Problems Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland

More information

Fixed Parameter Algorithms for Interval Vertex Deletion and Interval Completion Problems

Fixed Parameter Algorithms for Interval Vertex Deletion and Interval Completion Problems Fixed Parameter Algorithms for Interval Vertex Deletion and Interval Completion Problems Arash Rafiey Department of Informatics, University of Bergen, Norway arash.rafiey@ii.uib.no Abstract We consider

More information

PRAM lower bounds. 1 Overview. 2 Definitions. 3 Monotone Circuit Value Problem

PRAM lower bounds. 1 Overview. 2 Definitions. 3 Monotone Circuit Value Problem U.C. Berkeley CS273: Parallel and Distributed Theory PRAM lower bounds. Professor Satish Rao October 16, 2006 Lecturer: Satish Rao Last revised Scribe so far: Satish Rao cribbing from previous years lectures

More information

Math 151. Rumbos Fall Solutions to Review Problems for Exam 2. Pr(X = 1) = ) = Pr(X = 2) = Pr(X = 3) = p X. (k) =

Math 151. Rumbos Fall Solutions to Review Problems for Exam 2. Pr(X = 1) = ) = Pr(X = 2) = Pr(X = 3) = p X. (k) = Math 5. Rumbos Fall 07 Solutions to Review Problems for Exam. A bowl contains 5 chips of the same size and shape. Two chips are red and the other three are blue. Draw three chips from the bowl at random,

More information

Randomness and Computation March 13, Lecture 3

Randomness and Computation March 13, Lecture 3 0368.4163 Randomness and Computation March 13, 2009 Lecture 3 Lecturer: Ronitt Rubinfeld Scribe: Roza Pogalnikova and Yaron Orenstein Announcements Homework 1 is released, due 25/03. Lecture Plan 1. Do

More information

Lecture 4: Two-point Sampling, Coupon Collector s problem

Lecture 4: Two-point Sampling, Coupon Collector s problem Randomized Algorithms Lecture 4: Two-point Sampling, Coupon Collector s problem Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized Algorithms

More information

Complexity: Some examples

Complexity: Some examples Algorithms and Architectures III: Distributed Systems H-P Schwefel, Jens M. Pedersen Mm6 Distributed storage and access (jmp) Mm7 Introduction to security aspects (hps) Mm8 Parallel complexity (hps) Mm9

More information

Bichain graphs: geometric model and universal graphs

Bichain graphs: geometric model and universal graphs Bichain graphs: geometric model and universal graphs Robert Brignall a,1, Vadim V. Lozin b,, Juraj Stacho b, a Department of Mathematics and Statistics, The Open University, Milton Keynes MK7 6AA, United

More information

Strongly chordal and chordal bipartite graphs are sandwich monotone

Strongly chordal and chordal bipartite graphs are sandwich monotone Strongly chordal and chordal bipartite graphs are sandwich monotone Pinar Heggernes Federico Mancini Charis Papadopoulos R. Sritharan Abstract A graph class is sandwich monotone if, for every pair of its

More information

CS781 Lecture 3 January 27, 2011

CS781 Lecture 3 January 27, 2011 CS781 Lecture 3 January 7, 011 Greedy Algorithms Topics: Interval Scheduling and Partitioning Dijkstra s Shortest Path Algorithm Minimum Spanning Trees Single-Link k-clustering Interval Scheduling Interval

More information

Topic -2. Probability. Larson & Farber, Elementary Statistics: Picturing the World, 3e 1

Topic -2. Probability. Larson & Farber, Elementary Statistics: Picturing the World, 3e 1 Topic -2 Probability Larson & Farber, Elementary Statistics: Picturing the World, 3e 1 Probability Experiments Experiment : An experiment is an act that can be repeated under given condition. Rolling a

More information

Limitations of the QRQW and EREW PRAM Models?

Limitations of the QRQW and EREW PRAM Models? Limitations of the QRQW and EREW PRAM Models? Mirosław Kutyłowski, Heinz Nixdorf Institute and Dept. of Mathematics & Computer Science University of Paderborn, D-33095 Paderborn, Germany, mirekk@uni-paderborn.de

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 22 Maximum Flow Applications Image segmentation Project selection Extensions to Max Flow Sofya Raskhodnikova 11/07/2016 S. Raskhodnikova; based on slides by E. Demaine,

More information

Discrete mathematics , Fall Instructor: prof. János Pach

Discrete mathematics , Fall Instructor: prof. János Pach Discrete mathematics 016-017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations, 1.7.

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

Aditya Bhaskara CS 5968/6968, Lecture 1: Introduction and Review 12 January 2016

Aditya Bhaskara CS 5968/6968, Lecture 1: Introduction and Review 12 January 2016 Lecture 1: Introduction and Review We begin with a short introduction to the course, and logistics. We then survey some basics about approximation algorithms and probability. We also introduce some of

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Notes on Complexity Theory Last updated: December, Lecture 27

Notes on Complexity Theory Last updated: December, Lecture 27 Notes on Complexity Theory Last updated: December, 2011 Jonathan Katz Lecture 27 1 Space-Bounded Derandomization We now discuss derandomization of space-bounded algorithms. Here non-trivial results can

More information

Packing and Covering Dense Graphs

Packing and Covering Dense Graphs Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

1 Introduction (January 21)

1 Introduction (January 21) CS 97: Concrete Models of Computation Spring Introduction (January ). Deterministic Complexity Consider a monotonically nondecreasing function f : {,,..., n} {, }, where f() = and f(n) =. We call f a step

More information

Janson s Inequality and Poisson Heuristic

Janson s Inequality and Poisson Heuristic Janson s Inequality and Poisson Heuristic Dinesh K CS11M019 IIT Madras April 30, 2012 Dinesh (IITM) Janson s Inequality April 30, 2012 1 / 11 Outline 1 Motivation Dinesh (IITM) Janson s Inequality April

More information

1 Adjacency matrix and eigenvalues

1 Adjacency matrix and eigenvalues CSC 5170: Theory of Computational Complexity Lecture 7 The Chinese University of Hong Kong 1 March 2010 Our objective of study today is the random walk algorithm for deciding if two vertices in an undirected

More information

CS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify)

CS5314 Randomized Algorithms. Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify) CS5314 Randomized Algorithms Lecture 18: Probabilistic Method (De-randomization, Sample-and-Modify) 1 Introduce two topics: De-randomize by conditional expectation provides a deterministic way to construct

More information

The Parameterized Complexity of Approximate Inference in Bayesian Networks

The Parameterized Complexity of Approximate Inference in Bayesian Networks The Parameterized Complexity of Approximate Inference in Bayesian Networks Johan Kwisthout j.kwisthout@donders.ru.nl http://www.dcc.ru.nl/johank/ Donders Center for Cognition Department of Artificial Intelligence

More information

GIRTH SIX CUBIC GRAPHS HAVE PETERSEN MINORS

GIRTH SIX CUBIC GRAPHS HAVE PETERSEN MINORS GIRTH SIX CUBIC GRAPHS HAVE PETERSEN MINORS Neil Robertson 1 Department of Mathematics Ohio State University 231 W. 18th Ave. Columbus, Ohio 43210, USA P. D. Seymour Bellcore 445 South St. Morristown,

More information

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover Grant Schoenebeck Luca Trevisan Madhur Tulsiani Abstract We study semidefinite programming relaxations of Vertex Cover arising

More information

arxiv: v1 [cs.ds] 19 Apr 2016

arxiv: v1 [cs.ds] 19 Apr 2016 New Deterministic Approximation Algorithms for Fully Dynamic Matching Sayan Bhattacharya Monika Henzinger Danupon Nanongkai arxiv:1604.05765v1 [cs.ds] 19 Apr 2016 April 21, 2016 Abstract We present two

More information

ACO Comprehensive Exam 19 March Graph Theory

ACO Comprehensive Exam 19 March Graph Theory 1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting

More information

Lecture 5: January 30

Lecture 5: January 30 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

The Lovász Local Lemma : A constructive proof

The Lovász Local Lemma : A constructive proof The Lovász Local Lemma : A constructive proof Andrew Li 19 May 2016 Abstract The Lovász Local Lemma is a tool used to non-constructively prove existence of combinatorial objects meeting a certain conditions.

More information

Even Pairs and Prism Corners in Square-Free Berge Graphs

Even Pairs and Prism Corners in Square-Free Berge Graphs Even Pairs and Prism Corners in Square-Free Berge Graphs Maria Chudnovsky Princeton University, Princeton, NJ 08544 Frédéric Maffray CNRS, Laboratoire G-SCOP, University of Grenoble-Alpes, France Paul

More information

Compatible probability measures

Compatible probability measures Coin tossing space Think of a coin toss as a random choice from the two element set {0,1}. Thus the set {0,1} n represents the set of possible outcomes of n coin tosses, and Ω := {0,1} N, consisting of

More information

Lecture 12: Randomness Continued

Lecture 12: Randomness Continued CS 710: Complexity Theory 2/25/2010 Lecture 12: Randomness Continued Instructor: Dieter van Melkebeek Scribe: Beth Skubak & Nathan Collins In the last lecture we introduced randomized computation in terms

More information

Maximal Independent Set

Maximal Independent Set Lecture 5 Maximal Independent Set 5.1 The Problem Definition 5.1 (Independent Set). Given an undirected Graph G = (V, E), an independent set is a subset of nodes U V, such that no two nodes in U are adjacent.

More information

On Probabilistic Pushdown Automata

On Probabilistic Pushdown Automata On Probabilistic Pushdown Automata Juraj Hromkovič 1 a Departement Informatik, ETH Zürich, CAB F16, Universitätsstrasse 6, 8092 Zürich, Switzerland Georg Schnitger 2 b Institut für Informatik, Johann Wolfgang

More information

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 14

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 14 CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 14 Introduction One of the key properties of coin flips is independence: if you flip a fair coin ten times and get ten

More information

MINIMALLY NON-PFAFFIAN GRAPHS

MINIMALLY NON-PFAFFIAN GRAPHS MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect

More information

MA : Introductory Probability

MA : Introductory Probability MA 320-001: Introductory Probability David Murrugarra Department of Mathematics, University of Kentucky http://www.math.uky.edu/~dmu228/ma320/ Spring 2017 David Murrugarra (University of Kentucky) MA 320:

More information

An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem

An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem An 1.75 approximation algorithm for the leaf-to-leaf tree augmentation problem Zeev Nutov, László A. Végh January 12, 2016 We study the tree augmentation problem: Tree Augmentation Problem (TAP) Instance:

More information

Exact Algorithms for Dominating Induced Matching Based on Graph Partition

Exact Algorithms for Dominating Induced Matching Based on Graph Partition Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,

More information

Monty Hall Puzzle. Draw a tree diagram of possible choices (a possibility tree ) One for each strategy switch or no-switch

Monty Hall Puzzle. Draw a tree diagram of possible choices (a possibility tree ) One for each strategy switch or no-switch Monty Hall Puzzle Example: You are asked to select one of the three doors to open. There is a large prize behind one of the doors and if you select that door, you win the prize. After you select a door,

More information

Assignment 4: Solutions

Assignment 4: Solutions Math 340: Discrete Structures II Assignment 4: Solutions. Random Walks. Consider a random walk on an connected, non-bipartite, undirected graph G. Show that, in the long run, the walk will traverse each

More information

Topics in Probabilistic Combinatorics and Algorithms Winter, Basic Derandomization Techniques

Topics in Probabilistic Combinatorics and Algorithms Winter, Basic Derandomization Techniques Topics in Probabilistic Combinatorics and Algorithms Winter, 016 3. Basic Derandomization Techniques Definition. DTIME(t(n)) : {L : L can be decided deterministically in time O(t(n)).} EXP = { L: L can

More information

Distributed approximation algorithms for k-dominating set in graphs of bounded genus and linklessly embeddable graphs Regular Submission

Distributed approximation algorithms for k-dominating set in graphs of bounded genus and linklessly embeddable graphs Regular Submission Distributed approximation algorithms for k-dominating set in graphs of bounded genus and linklessly embeddable graphs Regular Submission Andrzej Czygrinow 1, Micha l Hanćkowiak 2, Wojciech Wawrzyniak 2,

More information

Graph G = (V, E). V ={vertices}, E={edges}. V={a,b,c,d,e,f,g,h,k} E={(a,b),(a,g),( a,h),(a,k),(b,c),(b,k),...,(h,k)}

Graph G = (V, E). V ={vertices}, E={edges}. V={a,b,c,d,e,f,g,h,k} E={(a,b),(a,g),( a,h),(a,k),(b,c),(b,k),...,(h,k)} Graph Theory Graph G = (V, E). V ={vertices}, E={edges}. a b c h k d g f e V={a,b,c,d,e,f,g,h,k} E={(a,b),(a,g),( a,h),(a,k),(b,c),(b,k),...,(h,k)} E =16. Digraph D = (V, A). V ={vertices}, E={edges}.

More information

The number of Euler tours of random directed graphs

The number of Euler tours of random directed graphs The number of Euler tours of random directed graphs Páidí Creed School of Mathematical Sciences Queen Mary, University of London United Kingdom P.Creed@qmul.ac.uk Mary Cryan School of Informatics University

More information

CS6999 Probabilistic Methods in Integer Programming Randomized Rounding Andrew D. Smith April 2003

CS6999 Probabilistic Methods in Integer Programming Randomized Rounding Andrew D. Smith April 2003 CS6999 Probabilistic Methods in Integer Programming Randomized Rounding April 2003 Overview 2 Background Randomized Rounding Handling Feasibility Derandomization Advanced Techniques Integer Programming

More information

How to Discreetly Spread a Rumor in a Crowd

How to Discreetly Spread a Rumor in a Crowd How to Discreetly Spread a Rumor in a Crowd Mohsen Ghaffari MIT ghaffari@mit.edu Calvin Newport Georgetown University cnewport@cs.georgetown.edu Abstract In this paper, we study PUSH-PULL style rumor spreading

More information

Section 6 Fault-Tolerant Consensus

Section 6 Fault-Tolerant Consensus Section 6 Fault-Tolerant Consensus CS586 - Panagiota Fatourou 1 Description of the Problem Consensus Each process starts with an individual input from a particular value set V. Processes may fail by crashing.

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth

The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth The Mixed Chinese Postman Problem Parameterized by Pathwidth and Treedepth Gregory Gutin, Mark Jones, and Magnus Wahlström Royal Holloway, University of London Egham, Surrey TW20 0EX, UK Abstract In the

More information

Lecture 23: Alternation vs. Counting

Lecture 23: Alternation vs. Counting CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture

More information

Rao s degree sequence conjecture

Rao s degree sequence conjecture Rao s degree sequence conjecture Maria Chudnovsky 1 Columbia University, New York, NY 10027 Paul Seymour 2 Princeton University, Princeton, NJ 08544 July 31, 2009; revised December 10, 2013 1 Supported

More information

REGULARITY LEMMAS FOR GRAPHS

REGULARITY LEMMAS FOR GRAPHS REGULARITY LEMMAS FOR GRAPHS Abstract. Szemerédi s regularity lemma proved to be a fundamental result in modern graph theory. It had a number of important applications and is a widely used tool in extremal

More information

EE/CSCI 451: Parallel and Distributed Computation

EE/CSCI 451: Parallel and Distributed Computation EE/CSCI 451: Parallel and Distributed Computation Lecture #19 3/28/2017 Xuehai Qian Xuehai.qian@usc.edu http://alchem.usc.edu/portal/xuehaiq.html University of Southern California 1 From last class PRAM

More information

Lecture 7: Spectral Graph Theory II

Lecture 7: Spectral Graph Theory II A Theorist s Toolkit (CMU 18-859T, Fall 2013) Lecture 7: Spectral Graph Theory II September 30, 2013 Lecturer: Ryan O Donnell Scribe: Christian Tjandraatmadja 1 Review We spend a page to review the previous

More information

Rubber bands, convex embeddings and connectivity

Rubber bands, convex embeddings and connectivity Rubber bands, convex embeddings and connectivity N. Linial The Hebrew University, Jerusalem and Mathematical Sciences Research Institute, Berkeley CA 94720 L. Lovász Eötvös Loránd University, H-1088 Budapest

More information

Lecture 10 February 4, 2013

Lecture 10 February 4, 2013 UBC CPSC 536N: Sparse Approximations Winter 2013 Prof Nick Harvey Lecture 10 February 4, 2013 Scribe: Alexandre Fréchette This lecture is about spanning trees and their polyhedral representation Throughout

More information