Basis Collapse in Holographic Algorithms Over All Domain Sizes

Size: px
Start display at page:

Download "Basis Collapse in Holographic Algorithms Over All Domain Sizes"

Transcription

1 Basis Collapse in Holographic Algorithms Over All Domain Sizes Sitan Chen Harvard College March 29, 2016

2 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

3 Holographic algorithms reduce counting problems into the problem of counting perfect matchings in a graph G = (V, E). Perfect matching: M E for which every v V belongs to exactly one edge e M [Valiant 79]: Counting perfect matchings in arbitrary graphs is #P-complete. [Fisher-Temperley 1961, Kasteleyn 1961]: Counting perfect matchings in planar graphs is in P.

4 More generally, if every edge e of G has some weight w(e), define ( ) PerfMatch(G) = w(e). Theorem (FKT algorithm) perfect matchings M e M If G is a planar weighted graph, PerfMatch(G) can be computed in polynomial time. Idea. For an arbitrary graph G with adjacency matrix A, the Pfaffian ( ) Pf(A) = sgn(m) w(e) perfect matchings M e M satisfies Pf(A) 2 = det(a). For planar graphs, can flip the signs of some entries of A to make Pf and PerfMatch agree.

5 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )

6 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )

7 Imagine: each vertex v on the left propagates signals along its outgoing edges indicating whether v is assigned 1 (green) or 0 (black).

8 Each satisfying assignment corresponds to a collection of signals satisfying two constraints: Consistency: If x i is a vertex on the left, the two signals x i generates must be the same Satisfaction: If C j is a vertex on the right, at least one of the three signals it receives must be

9 Goal: encode these bit vectors using the matching properties of graphs Definition A matchgate is a weighted graph G with designated subsets of its vertices called external nodes X. We say that it is of arity X. Definition The standard signature G of matchgate G of arity n is a vector of dimension 2 n with entries indexed by bitstrings of length n. For Z X corresponding to bitstring α, Γ α = PerfMatch(Γ\Z).

10

11

12 We want planar matchgates G and R whose standard signatures respectively match the vectors encoding the consistency and satisfaction constraints: Consistency: If x i is a vertex on the left, the two signals x i generates must be the same Satisfaction: If C j is a vertex on the right, at least one of the three signals it receives must be

13 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )

14 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )

15 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )

16 Unfortunately, no recognizer has standard signature (0, 1, 1, 1, 1, 1, 1, 1): Observation (Parity Condition) Because a graph with an odd number of vertices has no perfect matchings, given any matchgate G, the indices of the nonzero entries in its standard signature must have the same parity.

17 The saving grace: rewrite number of perfect matchings of matchgrid Ω as an inner product and apply a change of basis. Suppose there are w wires in Ω, generators G 1,...G g, and R 1,..., R r recognizers, then g r PerfMatch(Ω) = y G i x i R j j = G, R, z {0,1} w, z=x 1 x r y 1 y g i=1 j=1 where G = i G i and R = i R i with the order of tensoring specified by the wires. Regard G as an element in X = C 2w and R as an element in X : PerfMatch(Ω) is the result of applying dual vector R to G, which is independent of the choice of basis for X.

18 Definition Given a 2 2 basis matrix M, the signature with respect to M of a generator G of arity n is the vector G satisfying G = M n G. The signature with respect to M of a recognizer R of arity n is the vector R satisfying R = RM n.

19 Suffices to find a basis M of matchgates G and R whose signatures with respect to M match the vectors encoding the consistency and satisfaction constraints. Over C and F 2, this still cannot be done. [Valiant 06, Cai-Lu 07]: Over F 7, take M = G = (3, 0, 0, 5), and R = (0, 3, 3, 0, 3, 0, 0, 5). ( ) 1 3, 6 5

20

21 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

22 The number of different values that objects in a counting problem can take on is called the domain size. Domain size 2: Boolean satisfying assignments Vertex covers Perfect matchings Ice problems Domain size k k-colorings

23 Over domain size k: Arity-n signatures are now vectors of dimension k n. M now has width k because G = M n G R = RM n.

24

25

26 Domain size 2: encode True/False by presence/absence of one external node Domain size k: encode colors {1,..., k} by removal of some subset of a group of l external nodes Arities are now multiples of l External nodes grouped into blocks of l, with wires connecting matchgates blockwise. If Γ has n blocks, Γ has 2 ln entries. M has height 2 l because We call l the basis size. G = M n G R = RM n.

27 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

28 We will regard standard signatures as matrices: Definition For standard signature G of generator G, the t-th matrix form G(t) (1 t n) is the 2 l 2 (n 1)l matrix of entries of G where the rows are indexed by α t {0, 1} l and the columns are indexed by α 1 α t 1 α t+1 α n {0, 1} (n 1)l.

29 We will also regard signatures as matrices: Definition For signature G of generator G, the t-th matrix form G(t) (1 t n) is the k k n 1 matrix of entries of G where the rows are indexed by α t [k] and the columns are indexed by α 1 α t 1 α t+1 α n [k] n 1. Note: we will denote row indices by superscripts and column indices by subscripts.

30 Definition A generator G is full rank if there exists t for which rank(g(t)) = k. It turns out we may assume that rank(m) = k. But we know So if G is of full rank, G(t) = MG(t)(M T ) (n 1). rank(g(t)) = k.

31 Key to understanding the ultimate capabilities of holographic algorithms for solving counting problems over a given domain size: Question Given k, what is the smallest l for which any holographic algorithm over domain size k with a full-rank matchgate can be simulated by one with basis size l? domain size basis size Cai-Lu

32 Key to understanding the ultimate capabilities of holographic algorithms for solving counting problems over a given domain size: Question Given k, what is the smallest l for which any holographic algorithm over domain size k with a full-rank matchgate can be simulated by one with basis size l? domain size basis size Cai-Lu Cai-Fu

33 Key to understanding the ultimate capabilities of holographic algorithms for solving counting problems over a given domain size: Question Given k, what is the smallest l for which any holographic algorithm over domain size k with a full-rank matchgate can be simulated by one with basis size l? domain size basis size Cai-Lu Cai-Fu C 15, Xia 15 k log 2 k

34 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

35 Definition Z {0, 1} n is a cluster if there exists s {0, 1} n and positions p 1,..., ( p m [n] such that each member of Z is of the form ) s j J e p j for some J {p 1,..., p m }, where e pj is the bitstring consisting of zeroes everywhere except position p j. We write Z as s + {e p1,..., e pm } (s only unique up to the bits outside of positions p 1,..., p m ). e.g. {000, 001, 100, 101} is a cluster denoted {e 1, e 3 }.

36 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows 2. Group property: Inverses of standard signatures are also standard signatures 3. Simulation: Use 1 and 2 to simulate with a basis of size K

37 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows (hardest part of the proof ) 2. Group property: Inverses of standard signatures are also standard signatures 3. Simulation: Use 1 and 2 to simulate with a basis of size K

38 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows (hardest part of the proof ) 2. Group property: Inverses of standard signatures are also standard signatures (adapted from Li/Xia result in matchgate character theory) 3. Simulation: Use 1 and 2 to simulate with a basis of size K

39 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows (hardest part of the proof ) 2. Group property: Inverses of standard signatures are also standard signatures (adapted from Li/Xia result in matchgate character theory) 3. Simulation: Use 1 and 2 to simulate with a basis of size K (technique due to Cai/Fu)

40 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

41 Lemma (Group Property) Full-rank 2 K 2 (n 1)K standard signatures G(t) have right inverses (under matrix multiplication) that are also standard signatures.

42

43 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

44 We use the approach introduced by Cai-Fu for simulation given cluster existence and group property have been proven. Take any holographic algorithm over domain size k = 2 K. 1. By cluster existence, can pick out a generator G with full-rank signature and find a cluster Z = s + {e p1,..., e pk } of 2 K linearly independent rows. Suppose WLOG s = 0 l. 2. Let M Z denote the submatrix of M with rows indexed by Z. This will be the basis of size log k = K we use for the simulation.

45 G Z = (M Z ) n G G tc Z = (M Z ) (t 1) M (M Z ) (n t) G

46 Modifying generators is easy: G Z i = (M Z ) n i G i has signature G i with respect to new basis M Z Modifying recognizers is more subtle. Can write ( ) R j = R j (M/M Z ) m i (M Z ) m j. Is R j (M/M Z ) m i a valid recognizer standard signature?

47 3. Define T = M(M Z ) By construction, G tc Z (t) = T G Z (t). 5. By group property, G Z (t) has a right-inverse, so right-multiply by this on both sides to conclude that T is a standard signature.

48 Over the new basis M Z : 6. Replace each recognizer R i with R i T m i 7. Replace each generator G j with G Z j. 8. These new matchgates have the same signatures as the originals, but over a basis of size K, so we re done.

49 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

50 The key ingredient: Theorem (Rank Rigidity) The rank of any standard signature Γ (in matrix form) is always a power of two.

51 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

52 Our methods are primarily algebraic and rely on the characterization of the set of all standard signatures as the variety cut out by a certain collection of quadratic relations: Theorem (Matchgate Identities) A 2 l 2 (n 1)l matrix Γ is the t-th matrix form of the standard signature of some generator matchgate iff for all ζ, η {0, 1} (n 1)l and σ, τ {0, 1} l, the following matchgate identity (MGI) holds. Let ζ η = e q1 e qd and σ τ = e p1 e pd, where q 1 < < q d and p 1 < < p d. Then if d is even, d ( 1) i+1 Γ (σ ep 1 ep i ) ζ Γ (τ ep 1 ep i ) d η = ± ( 1) j+1 Γ (σ ep 1 ) i=1 j=1 (ζ e qj ) Γ(τ ep 1 ) (η e qj ).

53 d ( 1) i+1 Γ (σ ep 1 ep i ) ζ Γ (τ ep 1 ep i ) d η = ± ( 1) j+1 Γ (σ ep 1 ) i=1 j=1 (ζ e qj ) Γ(τ ep 1 ) (η e qj ). Definition A 2 l 2 m matrix M is a pseudo-signature if for all σ, τ for which wt(σ τ) is even, its entries satisfy the corresponding MGI up to a factor of ±1 on the right-hand side. E.g. (matrix-form) standard signatures, clusters of rows, and their transposes are all pseudo-signatures.

54 The matchgate identities allow us to deduce key linear algebraic relationships between the rows of any pseudo-signature Γ. Example Suppose that d = 2, σ = 0000, τ = 0011, ζ = 1100, η = Then the MGIs become Γ Γ Γ Γ = ± ( Γ Γ Γ Γ )

55 Example (Cont d) Rows Γ 1100 and Γ 1111 are linearly dependent if Γ 1101 and Γ 1110 are linearly dependent. Similarly, rows Γ 0000 and Γ 1111 are linearly dependent if Γ 0001 and Γ 1110 Γ 0010 and Γ 1101 Γ 0100 and Γ 1011 Γ 1000 and Γ 0111 are linearly dependent

56 Lemma Let σ, τ {0, 1} l be such that σ τ = 2d j=1 e p i. If row Γ (σ ep i ) is linearly dependent with row Γ (τ ep i ) for all 1 i 2d, then row Γ σ is linearly dependent with row Γ τ. Coordinate-free interpretation: linear relations among wedges of rows of even parity yield linear relations among wedges of rows of odd parity.

57 Definition For V a vector space with basis {e j }, the second exterior power of V, denoted Λ 2 V, is the vector space given by quotienting V V by the relation v w w v for all v, w V. We denote the image of v w under this quotient map by v w. Λ 2 V has basis {e i e j } i<j. Explicitly, if v = v i e i and w = w i e i, then v w = (v i w j v j w i )e i e j = v i w i i<j i<j v j w j e i e j. In particular, v and w are linearly dependent iff v w = 0.

58 By the MGIs, linear relations among wedges of rows of even parity yield linear relations among wedges of rows of odd parity. Example implies that Γ 0000 Γ 1111 = 0 Γ 0001 Γ 1110 Γ 0010 Γ Γ 0100 Γ 1011 Γ 1000 Γ 0111 = 0

59 By the MGIs, linear relations among wedges of rows of even parity yield linear relations among wedges of rows of odd parity. Example implies that µ (Γ 0000 Γ 1111 ) + ν (Γ 0011 Γ 1100 ) = 0 µ (Γ 0001 Γ 1110 Γ 0010 Γ Γ 0100 Γ 1011 Γ 1000 Γ 0111 )± ν (Γ 0010 Γ 1101 Γ 0001 Γ Γ 0111 Γ 1000 Γ 1011 Γ 0100 ) = 0

60 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

61 Claim Rank rigidity implies cluster existence. Proof. Suppose Γ is a 2 l 2 m pseudo-signature of rank 2 K. Can assume Γ has no proper clusters of rows with the same rank as Γ. Otherwise, if there were such a cluster Z = σ + {e q1,..., e ql }, replace Γ by Γ Z and l by l, and ignore bits in positions outside of q 1,..., q l.

62 l K+1 {}}{ K 1 {}}{

63 l K+1=1 {}}{ K 1 {}}{

64 l K+1 {}}{ K 1 {}}{

65 l K+1 {}}{ K 1 {}}{

66 l K+1 {}}{ K 1 {}}{

67 l K+1 {}}{ K 1 {}}{

68 l K+1 {}}{ K 1 {}}{

69 l K+1 {}}{ K 1 {}}{

70 l K+1 {}}{ K 1 {}}{

71 l K+1 {}}{ K 1 {}}{ All other rows must be zero. By the MGIs, a contradiction. Γ 0z 0 K 1 Γ 1z 0 K 1 = 0,

72 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

73 Theorem If Γ is a 2 K+1 2 m pseudo-signature with rank at least 2 K + 1, then rank(γ) = 2 K+1. Sketch. Inductively, we know that Γ contains a cluster Z of 2 K linearly independent rows, say 0 K+1 {e 2,..., e K+1 }. Because rank(γ) 2 K + 1, there exists a row outside the linear span of Z.

74 Even columns: Odd columns:

75 Even columns: Odd columns: Suppose Γ 1001 lay in the span of the red rows, so Γ 1001 Γ 0000 = a σ (Γ σ Γ 0000). LHS: Γ 1000 Γ 0001 RHS: Γ 0 Γ 0 σ red, even

76 Even columns: Odd columns: Suppose Γ 1010 lay in the span of the red rows, so Γ 1010 Γ 0000 = a σ (Γ σ Γ 0000). σ red, even LHS: Γ 1000 Γ 0010 RHS: Γ 0 Γ 0, Γ 1000 Γ 0001

77 Even columns: Odd columns: Suppose Γ 1100 lay in the span of the red rows, so Γ 1100 Γ 0000 = a σ (Γ σ Γ 0000). σ red, even LHS: Γ 1000 Γ 0100 RHS: Γ 0 Γ 0, Γ 1000 Γ 0001, Γ 1000 Γ 0010

78 Even columns: Odd columns: Suppose Γ 1011 lay in the span of the red rows, so Γ 1011 Γ 0001 = a σ (Γ σ Γ 0001). σ red, odd LHS: Γ 1001 Γ 0011 RHS: Γ 0 Γ 0, Γ 0000 Γ 1001

79 Even columns: Odd columns: Suppose Γ 1101 lay in the span of the red rows, so Γ 1011 Γ 0001 = a σ (Γ σ Γ 0001). σ red, odd LHS: Γ 1001 Γ 0101 RHS: Γ 0 Γ 0, Γ 0000 Γ 1001, Γ 1001 Γ 0011

80 Even columns: Odd columns: Suppose Γ 1110 lay in the span of the red rows, so Γ 1110 Γ 0001 = a σ (Γ σ Γ 0001). σ red, odd LHS: Γ 1111 Γ 0000, Γ 1100 Γ 0011, Γ 1010 Γ 0101, Γ 0110 Γ 1001 RHS: Γ 0 Γ 0, Γ 0000 Γ 1001, Γ 1001 Γ 0011, Γ 1001 Γ 0101

81 Even columns: Odd columns: Suppose Γ 1111 lay in the span of the red rows, so Γ 1111 Γ 0000 = a σ (Γ σ Γ 0000). σ red, even LHS: Γ 1110 Γ 0001, Γ 1101 Γ 0010, Γ 1011 Γ 0100, Γ 0111 Γ 1000 RHS: Γ 0 Γ 0, Γ 1000 Γ 0001, Γ 1000 Γ 0010, Γ 1000 Γ 0100

82 Even columns: Odd columns:

83 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

84 Theorem Suppose l > K + 1. If Γ is a 2 l 2 m pseudo-signature of rank 2 K + 1, then there exists a cluster Z {0, 1} l for which Γ Z is also of rank 2 K + 1. Suppose to the contrary. Inductively we know Γ has a cluster Z of 2 K linearly independent rows, say 0 l + {e p1,..., e pk }.

85 l K K {}}{{}}{

86 l K K {}}{{}}{

87 l K K {}}{{}}{

88 l K K {}}{{}}{

89 l K K {}}{{}}{

90 To show Γ 0l and Γ 1l K 0 l are linearly dependent, by MGIs it s enough to show: Lemma Γ 0l e j = 0 for all j p 1,..., p K. Proof. For i {p 1,..., p K } and j {p 1,..., p K }, define: T i : all rows u for which u i = 0 T j i : all rows u for which u i = u j = 0 Z i : Z T i Note that Z i T j i T i. So inductively, proper cluster T j i has rank a power of two, either 2 K 1 or 2 K.

91 Proof (Cont d). If rank(t j i ) = 2K 1, then span(t j i ) = span(z i). This is true for all i {p 1,..., p K }, so Γ 0l e j K i=1span(z i ) = span({γ 0l }). If rank(t j i ) = 2K, then span(t i ) = span(t j i ) span(z), a contradiction.

92 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

93 Theorem (Fu/Yang 13) Suppose a basis collapse theorem holds on domain size 2. Then if a holographic algorithm uses a 2 l k basis of rank 2, then the same collapse theorem holds for this holographic algorithm.

94 Theorem Suppose a basis collapse theorem holds on domain size r. Then if a holographic algorithm uses a 2 l k basis of rank r, then the same collapse theorem holds for this holographic algorithm.

95 By rank rigidity, G(t) must have rank a power of two. If G is a full-rank signature, by G(t) = MG(t)(M T ) (n 1), we know M must have rank a power of two. So if k 2 K, we re done inductively by the collapse theorem for domain size 2 K, where K = log 2 k.

96 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments

97 Work out the case where no full-rank matchgate exists Use the collapse theorem to initiate a study of holographic algorithms over higher domains

98 Thank you to: Professor Leslie Valiant (Harvard University) Professor Jin-Yi Cai (University of Wisconsin) Harvard Herchel-Smith Research Fellowship Simons Institute for Computing

Some Results on Matchgates and Holographic Algorithms. Jin-Yi Cai Vinay Choudhary University of Wisconsin, Madison. NSF CCR and CCR

Some Results on Matchgates and Holographic Algorithms. Jin-Yi Cai Vinay Choudhary University of Wisconsin, Madison. NSF CCR and CCR Some Results on Matchgates and Holographic Algorithms Jin-Yi Cai Vinay Choudhary University of Wisconsin, Madison NSF CCR-0208013 and CCR-0511679. 1 #P Counting problems: #SAT: How many satisfying assignments

More information

A Complexity Classification of the Six Vertex Model as Holant Problems

A Complexity Classification of the Six Vertex Model as Holant Problems A Complexity Classification of the Six Vertex Model as Holant Problems Jin-Yi Cai (University of Wisconsin-Madison) Joint work with: Zhiguo Fu, Shuai Shao and Mingji Xia 1 / 84 Three Frameworks for Counting

More information

On Symmetric Signatures in Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Pinyan Lu Tsinghua University, Beijing

On Symmetric Signatures in Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Pinyan Lu Tsinghua University, Beijing On Symmetric Signatures in Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison Pinyan Lu Tsinghua University, Beijing NSF CCR-0208013 and CCR-0511679. 1 #P Counting problems: #SAT: How many

More information

Computational Complexity Theory. The World of P and NP. Jin-Yi Cai Computer Sciences Dept University of Wisconsin, Madison

Computational Complexity Theory. The World of P and NP. Jin-Yi Cai Computer Sciences Dept University of Wisconsin, Madison Computational Complexity Theory The World of P and NP Jin-Yi Cai Computer Sciences Dept University of Wisconsin, Madison Sept 11, 2012 Supported by NSF CCF-0914969. 1 2 Entscheidungsproblem The rigorous

More information

On Block-wise Symmetric Signatures for Matchgates

On Block-wise Symmetric Signatures for Matchgates On Block-wise Symmetric Signatures for Matchgates Jin-Yi Cai 1 and Pinyan Lu 2 1 Computer Sciences Department, University of Wisconsin Madison, WI 53706, USA yc@cs.wisc.edu 2 Department of Computer Science

More information

The Classification Program II: Tractable Classes and Hardness Proof

The Classification Program II: Tractable Classes and Hardness Proof The Classification Program II: Tractable Classes and Hardness Proof Jin-Yi Cai (University of Wisconsin-Madison) January 27, 2016 1 / 104 Kasteleyn s Algorithm and Matchgates Previously... By a Pfaffian

More information

Dichotomy Theorems in Counting Complexity and Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Supported by NSF CCF

Dichotomy Theorems in Counting Complexity and Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Supported by NSF CCF Dichotomy Theorems in Counting Complexity and Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison September 7th, 204 Supported by NSF CCF-27549. The P vs. NP Question It is generally conjectured

More information

This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing

More information

Bases Collapse in Holographic Algorithms

Bases Collapse in Holographic Algorithms Bases Collapse in Holographic Algorithms Jin-Yi Cai and Pinyan Lu 2 Computer Sciences Department, University of Wisconsin Madison, WI 53706, USA jyc@cswiscedu 2 Department of Computer Science and Technology,

More information

HOLOGRAPHIC ALGORITHMS

HOLOGRAPHIC ALGORITHMS SIAM J. COMPUT. Vol. 37, No. 5, pp. 1565 1594 c 2008 Society for Industrial and Applied Mathematics HOLOGRAPHIC ALGORITHMS LESLIE G. VALIANT Abstract. Complexity theory is built fundamentally on the notion

More information

Dichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia

Dichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia Dichotomy Theorems for Counting Problems Jin-Yi Cai University of Wisconsin, Madison Xi Chen Columbia University Pinyan Lu Microsoft Research Asia 1 Counting Problems Valiant defined the class #P, and

More information

On Symmetric Signatures in Holographic Algorithms

On Symmetric Signatures in Holographic Algorithms On Symmetric Signatures in Holographic Algorithms Jin-Yi Cai a and Pinyan Lu b a Computer Sciences Department, University of Wisconsin Madison, WI 53706, USA jyc@cs.wisc.edu b Department of Computer Science

More information

On the Theory of Matchgate Computations

On the Theory of Matchgate Computations On the Theory of Matchgate Computations Jin-Yi Cai 1 Vinay Choudhary 2 Computer Sciences Department University of Wisconsin Madison, WI 53706. USA. Email: {jyc, vinchr}@cs.wisc.edu 1 Supported by NSF CCR-0208013

More information

The Complexity of Planar Boolean #CSP with Complex Weights

The Complexity of Planar Boolean #CSP with Complex Weights The Complexity of Planar Boolean #CSP with Complex Weights Heng Guo University of Wisconsin-Madison hguo@cs.wisc.edu Tyson Williams University of Wisconsin-Madison tdw@cs.wisc.edu Abstract We prove a complexity

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Holographic Algorithms With Unsymmetric Signatures

Holographic Algorithms With Unsymmetric Signatures Holographic Algorithms With Unsymmetric Signatures Jin-Yi Cai University of Wisconsin-Madison Pinyan Lu Tsinghua University Abstract Holographic algorithms were introduced by Valiant as a new methodology

More information

Min-Rank Conjecture for Log-Depth Circuits

Min-Rank Conjecture for Log-Depth Circuits Min-Rank Conjecture for Log-Depth Circuits Stasys Jukna a,,1, Georg Schnitger b,1 a Institute of Mathematics and Computer Science, Akademijos 4, LT-80663 Vilnius, Lithuania b University of Frankfurt, Institut

More information

Dichotomy for Holant Problems of Boolean Domain

Dichotomy for Holant Problems of Boolean Domain Dichotomy for Holant Problems of Boolean Domain Jin-Yi Cai Pinyan Lu Mingji Xia Abstract Holant problems are a general framework to study counting problems. Both counting Constraint Satisfaction Problems

More information

Constrained Codes as Networks of Relations

Constrained Codes as Networks of Relations Constrained Codes as Networks of Relations Moshe Schwartz, Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract We address the well-known problem of determining the capacity of constrained coding systems.

More information

Siegel s Theorem, Edge Coloring, and a Holant Dichotomy

Siegel s Theorem, Edge Coloring, and a Holant Dichotomy Siegel s Theorem, Edge Coloring, and a Holant Dichotomy Jin-Yi Cai (University of Wisconsin-Madison) Joint with: Heng Guo and Tyson Williams (University of Wisconsin-Madison) 1 / 117 2 / 117 Theorem (Siegel

More information

Recitation 8: Graphs and Adjacency Matrices

Recitation 8: Graphs and Adjacency Matrices Math 1b TA: Padraic Bartlett Recitation 8: Graphs and Adjacency Matrices Week 8 Caltech 2011 1 Random Question Suppose you take a large triangle XY Z, and divide it up with straight line segments into

More information

k times l times n times

k times l times n times 1. Tensors on vector spaces Let V be a finite dimensional vector space over R. Definition 1.1. A tensor of type (k, l) on V is a map T : V V R k times l times which is linear in every variable. Example

More information

Linear Algebra and its Applications

Linear Algebra and its Applications Linear Algebra and its Applications xxx (2011) xxx xxx Contents lists available at ScienceDirect Linear Algebra and its Applications ournal homepage: www.elsevier.com/locate/laa Holographic algorithms

More information

Lecture 1 and 2: Random Spanning Trees

Lecture 1 and 2: Random Spanning Trees Recent Advances in Approximation Algorithms Spring 2015 Lecture 1 and 2: Random Spanning Trees Lecturer: Shayan Oveis Gharan March 31st Disclaimer: These notes have not been subjected to the usual scrutiny

More information

Holographic Reduction, Interpolation and Hardness

Holographic Reduction, Interpolation and Hardness Holographic Reduction, Interpolation and Hardness Jin-Yi Cai Pinyan Lu Mingji Xia Abstract We prove a dichotomy theorem for a class of counting problems expressible by Boolean signatures. The proof methods

More information

Notes on the Matrix-Tree theorem and Cayley s tree enumerator

Notes on the Matrix-Tree theorem and Cayley s tree enumerator Notes on the Matrix-Tree theorem and Cayley s tree enumerator 1 Cayley s tree enumerator Recall that the degree of a vertex in a tree (or in any graph) is the number of edges emanating from it We will

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh June 2009 1 Linear independence These problems both appeared in a course of Benny Sudakov at Princeton, but the links to Olympiad problems are due to Yufei

More information

Advanced Combinatorial Optimization Feb 13 and 25, Lectures 4 and 6

Advanced Combinatorial Optimization Feb 13 and 25, Lectures 4 and 6 18.438 Advanced Combinatorial Optimization Feb 13 and 25, 2014 Lectures 4 and 6 Lecturer: Michel X. Goemans Scribe: Zhenyu Liao and Michel X. Goemans Today, we will use an algebraic approach to solve the

More information

DOMINO TILING. Contents 1. Introduction 1 2. Rectangular Grids 2 Acknowledgments 10 References 10

DOMINO TILING. Contents 1. Introduction 1 2. Rectangular Grids 2 Acknowledgments 10 References 10 DOMINO TILING KASPER BORYS Abstract In this paper we explore the problem of domino tiling: tessellating a region with x2 rectangular dominoes First we address the question of existence for domino tilings

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

Parity Versions of 2-Connectedness

Parity Versions of 2-Connectedness Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida

More information

Review of Linear Algebra

Review of Linear Algebra Review of Linear Algebra Definitions An m n (read "m by n") matrix, is a rectangular array of entries, where m is the number of rows and n the number of columns. 2 Definitions (Con t) A is square if m=

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

1 Counting spanning trees: A determinantal formula

1 Counting spanning trees: A determinantal formula Math 374 Matrix Tree Theorem Counting spanning trees: A determinantal formula Recall that a spanning tree of a graph G is a subgraph T so that T is a tree and V (G) = V (T ) Question How many distinct

More information

2018 Fall 2210Q Section 013 Midterm Exam II Solution

2018 Fall 2210Q Section 013 Midterm Exam II Solution 08 Fall 0Q Section 0 Midterm Exam II Solution True or False questions points 0 0 points) ) Let A be an n n matrix. If the equation Ax b has at least one solution for each b R n, then the solution is unique

More information

c i r i i=1 r 1 = [1, 2] r 2 = [0, 1] r 3 = [3, 4].

c i r i i=1 r 1 = [1, 2] r 2 = [0, 1] r 3 = [3, 4]. Lecture Notes: Rank of a Matrix Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong taoyf@cse.cuhk.edu.hk 1 Linear Independence Definition 1. Let r 1, r 2,..., r m

More information

is the desired collar neighbourhood. Corollary Suppose M1 n, M 2 and f : N1 n 1 N2 n 1 is a diffeomorphism between some connected components

is the desired collar neighbourhood. Corollary Suppose M1 n, M 2 and f : N1 n 1 N2 n 1 is a diffeomorphism between some connected components 1. Collar neighbourhood theorem Definition 1.0.1. Let M n be a manifold with boundary. Let p M. A vector v T p M is called inward if for some local chart x: U V where U subsetm is open, V H n is open and

More information

Vector Space Concepts

Vector Space Concepts Vector Space Concepts ECE 174 Introduction to Linear & Nonlinear Optimization Ken Kreutz-Delgado ECE Department, UC San Diego Ken Kreutz-Delgado (UC San Diego) ECE 174 Fall 2016 1 / 25 Vector Space Theory

More information

18.S34 linear algebra problems (2007)

18.S34 linear algebra problems (2007) 18.S34 linear algebra problems (2007) Useful ideas for evaluating determinants 1. Row reduction, expanding by minors, or combinations thereof; sometimes these are useful in combination with an induction

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

The Matrix-Tree Theorem

The Matrix-Tree Theorem The Matrix-Tree Theorem Christopher Eur March 22, 2015 Abstract: We give a brief introduction to graph theory in light of linear algebra. Our results culminates in the proof of Matrix-Tree Theorem. 1 Preliminaries

More information

Siegel s theorem, edge coloring, and a holant dichotomy

Siegel s theorem, edge coloring, and a holant dichotomy Siegel s theorem, edge coloring, and a holant dichotomy Tyson Williams (University of Wisconsin-Madison) Joint with: Jin-Yi Cai and Heng Guo (University of Wisconsin-Madison) Appeared at FOCS 2014 1 /

More information

Unless otherwise specified, V denotes an arbitrary finite-dimensional vector space.

Unless otherwise specified, V denotes an arbitrary finite-dimensional vector space. MAT 90 // 0 points Exam Solutions Unless otherwise specified, V denotes an arbitrary finite-dimensional vector space..(0) Prove: a central arrangement A in V is essential if and only if the dual projective

More information

Corrigendum: The complexity of counting graph homomorphisms

Corrigendum: The complexity of counting graph homomorphisms Corrigendum: The complexity of counting graph homomorphisms Martin Dyer School of Computing University of Leeds Leeds, U.K. LS2 9JT dyer@comp.leeds.ac.uk Catherine Greenhill School of Mathematics The University

More information

A short course on matching theory, ECNU Shanghai, July 2011.

A short course on matching theory, ECNU Shanghai, July 2011. A short course on matching theory, ECNU Shanghai, July 2011. Sergey Norin LECTURE 3 Tight cuts, bricks and braces. 3.1. Outline of Lecture Ear decomposition of bipartite graphs. Tight cut decomposition.

More information

CHAPTER 10 Shape Preserving Properties of B-splines

CHAPTER 10 Shape Preserving Properties of B-splines CHAPTER 10 Shape Preserving Properties of B-splines In earlier chapters we have seen a number of examples of the close relationship between a spline function and its B-spline coefficients This is especially

More information

Classification for Counting Problems

Classification for Counting Problems Classification for Counting Problems Jin-Yi Cai (University of Wisconsin-Madison) Thanks to many collaborators: Xi Chen, Zhiguo Fu, Kurt Girstmair, Heng Guo, Mike Kowalczyk, Pinyan Lu, Tyson Williams...

More information

EIGENVALUES AND EIGENVECTORS 3

EIGENVALUES AND EIGENVECTORS 3 EIGENVALUES AND EIGENVECTORS 3 1. Motivation 1.1. Diagonal matrices. Perhaps the simplest type of linear transformations are those whose matrix is diagonal (in some basis). Consider for example the matrices

More information

MINIMALLY NON-PFAFFIAN GRAPHS

MINIMALLY NON-PFAFFIAN GRAPHS MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect

More information

ORIE 6300 Mathematical Programming I August 25, Recitation 1

ORIE 6300 Mathematical Programming I August 25, Recitation 1 ORIE 6300 Mathematical Programming I August 25, 2016 Lecturer: Calvin Wylie Recitation 1 Scribe: Mateo Díaz 1 Linear Algebra Review 1 1.1 Independence, Spanning, and Dimension Definition 1 A (usually infinite)

More information

Reconstruction and Higher Dimensional Geometry

Reconstruction and Higher Dimensional Geometry Reconstruction and Higher Dimensional Geometry Hongyu He Department of Mathematics Louisiana State University email: hongyu@math.lsu.edu Abstract Tutte proved that, if two graphs, both with more than two

More information

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502) Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise

More information

Econ Slides from Lecture 7

Econ Slides from Lecture 7 Econ 205 Sobel Econ 205 - Slides from Lecture 7 Joel Sobel August 31, 2010 Linear Algebra: Main Theory A linear combination of a collection of vectors {x 1,..., x k } is a vector of the form k λ ix i for

More information

Ma/CS 6b Class 20: Spectral Graph Theory

Ma/CS 6b Class 20: Spectral Graph Theory Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Recall: Parity of a Permutation S n the set of permutations of 1,2,, n. A permutation σ S n is even if it can be written as a composition of an

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170 UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability

More information

Determinantal Probability Measures. by Russell Lyons (Indiana University)

Determinantal Probability Measures. by Russell Lyons (Indiana University) Determinantal Probability Measures by Russell Lyons (Indiana University) 1 Determinantal Measures If E is finite and H l 2 (E) is a subspace, it defines the determinantal measure T E with T = dim H P H

More information

ACO Comprehensive Exam 19 March Graph Theory

ACO Comprehensive Exam 19 March Graph Theory 1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting

More information

Matrix Rank in Communication Complexity

Matrix Rank in Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Mohan Yang Date: January 18, 2012 LECTURE 3 Matrix Rank in Communication Complexity This lecture

More information

Determinants: Uniqueness and more

Determinants: Uniqueness and more Math 5327 Spring 2018 Determinants: Uniqueness and more Uniqueness The main theorem we are after: Theorem 1 The determinant of and n n matrix A is the unique n-linear, alternating function from F n n to

More information

Computability and Complexity Theory: An Introduction

Computability and Complexity Theory: An Introduction Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given

More information

RECAP How to find a maximum matching?

RECAP How to find a maximum matching? RECAP How to find a maximum matching? First characterize maximum matchings A maximal matching cannot be enlarged by adding another edge. A maximum matching of G is one of maximum size. Example. Maximum

More information

Solution. That ϕ W is a linear map W W follows from the definition of subspace. The map ϕ is ϕ(v + W ) = ϕ(v) + W, which is well-defined since

Solution. That ϕ W is a linear map W W follows from the definition of subspace. The map ϕ is ϕ(v + W ) = ϕ(v) + W, which is well-defined since MAS 5312 Section 2779 Introduction to Algebra 2 Solutions to Selected Problems, Chapters 11 13 11.2.9 Given a linear ϕ : V V such that ϕ(w ) W, show ϕ induces linear ϕ W : W W and ϕ : V/W V/W : Solution.

More information

LINEAR ALGEBRA REVIEW

LINEAR ALGEBRA REVIEW LINEAR ALGEBRA REVIEW JC Stuff you should know for the exam. 1. Basics on vector spaces (1) F n is the set of all n-tuples (a 1,... a n ) with a i F. It forms a VS with the operations of + and scalar multiplication

More information

(II.B) Basis and dimension

(II.B) Basis and dimension (II.B) Basis and dimension How would you explain that a plane has two dimensions? Well, you can go in two independent directions, and no more. To make this idea precise, we formulate the DEFINITION 1.

More information

Robin Thomas and Peter Whalen. School of Mathematics Georgia Institute of Technology Atlanta, Georgia , USA

Robin Thomas and Peter Whalen. School of Mathematics Georgia Institute of Technology Atlanta, Georgia , USA Odd K 3,3 subdivisions in bipartite graphs 1 Robin Thomas and Peter Whalen School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA Abstract We prove that every internally

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Complexity Dichotomies for Counting Problems

Complexity Dichotomies for Counting Problems Complexity Dichotomies for Counting Problems Jin-Yi Cai Computer Sciences Department University of Wisconsin Madison, WI 53706 Email: jyc@cs.wisc.edu Xi Chen Department of Computer Science Columbia University

More information

Ma/CS 6b Class 20: Spectral Graph Theory

Ma/CS 6b Class 20: Spectral Graph Theory Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Eigenvalues and Eigenvectors A an n n matrix of real numbers. The eigenvalues of A are the numbers λ such that Ax = λx for some nonzero vector x

More information

Polynomial-time classical simulation of quantum ferromagnets

Polynomial-time classical simulation of quantum ferromagnets Polynomial-time classical simulation of quantum ferromagnets Sergey Bravyi David Gosset IBM PRL 119, 100503 (2017) arxiv:1612.05602 Quantum Monte Carlo: a powerful suite of probabilistic classical simulation

More information

MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix.

MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. Basis Definition. Let V be a vector space. A linearly independent spanning set for V is called a basis.

More information

Statistical Mechanics and Combinatorics : Lecture IV

Statistical Mechanics and Combinatorics : Lecture IV Statistical Mechanics and Combinatorics : Lecture IV Dimer Model Local Statistics We ve already discussed the partition function Z for dimer coverings in a graph G which can be computed by Kasteleyn matrix

More information

Counting bases of representable matroids

Counting bases of representable matroids Counting bases of representable matroids Michael Snook School of Mathematics, Statistics and Operations Research Victoria University of Wellington Wellington, New Zealand michael.snook@msor.vuw.ac.nz Submitted:

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

HOLOGRAPHIC ALGORITHMS WITHOUT MATCHGATES

HOLOGRAPHIC ALGORITHMS WITHOUT MATCHGATES HOLOGRAPHIC ALGORITHMS WITHOUT MATCHGATES J.M. LANDSBERG, JASON MORTON AND SERGUEI NORINE Abstract. The theory of holographic algorithms, which are polynomial time algorithms for certain combinatorial

More information

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Yuval Filmus April 4, 2017 Abstract The seminal complete intersection theorem of Ahlswede and Khachatrian gives the maximum cardinality of

More information

Normal Factor Graphs, Linear Algebra and Probabilistic Modeling

Normal Factor Graphs, Linear Algebra and Probabilistic Modeling Normal Factor Graphs, Linear Algebra and Probabilistic Modeling Yongyi Mao University of Ottawa Workshop on Counting, Inference, and Optimization on Graphs Princeton University, NJ, USA November 3, 2011

More information

The definition of a vector space (V, +, )

The definition of a vector space (V, +, ) The definition of a vector space (V, +, ) 1. For any u and v in V, u + v is also in V. 2. For any u and v in V, u + v = v + u. 3. For any u, v, w in V, u + ( v + w) = ( u + v) + w. 4. There is an element

More information

Polynomials in graph theory

Polynomials in graph theory Polynomials in graph theory Alexey Bogatov Department of Software Engineering Faculty of Mathematics and Mechanics Saint Petersburg State University JASS 2007 Saint Petersburg Course 1: Polynomials: Their

More information

Matricial real algebraic geometry

Matricial real algebraic geometry Magdeburg, February 23th, 2012 Notation R - a commutative ring M n (R) - the ring of all n n matrices with entries in R S n (R) - the set of all symmetric matrices in M n (R) Mn (R) 2 - the set of all

More information

Journal of Computer and System Sciences

Journal of Computer and System Sciences Journal of Computer and System Sciences 77 20 4 6 Contents lists available at ScienceDirect Journal of Computer and System Sciences wwwelseviercom/locate/jcss Holographic algorithms: From art to science

More information

CS1800: Mathematical Induction. Professor Kevin Gold

CS1800: Mathematical Induction. Professor Kevin Gold CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size

More information

Zigzag Codes: MDS Array Codes with Optimal Rebuilding

Zigzag Codes: MDS Array Codes with Optimal Rebuilding 1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical

More information

Boolean Inner-Product Spaces and Boolean Matrices

Boolean Inner-Product Spaces and Boolean Matrices Boolean Inner-Product Spaces and Boolean Matrices Stan Gudder Department of Mathematics, University of Denver, Denver CO 80208 Frédéric Latrémolière Department of Mathematics, University of Denver, Denver

More information

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra. DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1

More information

Walks, Springs, and Resistor Networks

Walks, Springs, and Resistor Networks Spectral Graph Theory Lecture 12 Walks, Springs, and Resistor Networks Daniel A. Spielman October 8, 2018 12.1 Overview In this lecture we will see how the analysis of random walks, spring networks, and

More information

Fine Grained Counting Complexity I

Fine Grained Counting Complexity I Fine Grained Counting Complexity I Holger Dell Saarland University and Cluster of Excellence (MMCI) & Simons Institute for the Theory of Computing 1 50 Shades of Fine-Grained #W[1] W[1] fixed-parameter

More information

Instructions Please answer the five problems on your own paper. These are essay questions: you should write in complete sentences.

Instructions Please answer the five problems on your own paper. These are essay questions: you should write in complete sentences. Instructions Please answer the five problems on your own paper. These are essay questions: you should write in complete sentences.. Recall that P 3 denotes the vector space of polynomials of degree less

More information

The complexity of counting graph homomorphisms

The complexity of counting graph homomorphisms The complexity of counting graph homomorphisms Martin Dyer and Catherine Greenhill Abstract The problem of counting homomorphisms from a general graph G to a fixed graph H is a natural generalisation of

More information

MULTILINEAR ALGEBRA MCKENZIE LAMB

MULTILINEAR ALGEBRA MCKENZIE LAMB MULTILINEAR ALGEBRA MCKENZIE LAMB 1. Introduction This project consists of a rambling introduction to some basic notions in multilinear algebra. The central purpose will be to show that the div, grad,

More information

On the adjacency matrix of a block graph

On the adjacency matrix of a block graph On the adjacency matrix of a block graph R. B. Bapat Stat-Math Unit Indian Statistical Institute, Delhi 7-SJSS Marg, New Delhi 110 016, India. email: rbb@isid.ac.in Souvik Roy Economics and Planning Unit

More information

Nowhere zero flow. Definition: A flow on a graph G = (V, E) is a pair (D, f) such that. 1. D is an orientation of G. 2. f is a function on E.

Nowhere zero flow. Definition: A flow on a graph G = (V, E) is a pair (D, f) such that. 1. D is an orientation of G. 2. f is a function on E. Nowhere zero flow Definition: A flow on a graph G = (V, E) is a pair (D, f) such that 1. D is an orientation of G. 2. f is a function on E. 3. u N + D (v) f(uv) = w ND f(vw) for every (v) v V. Example:

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18

More information

8.5 Sequencing Problems

8.5 Sequencing Problems 8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,

More information

Chordal structure in computer algebra: Permanents

Chordal structure in computer algebra: Permanents Chordal structure in computer algebra: Permanents Diego Cifuentes Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology Joint

More information

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 7: Schwartz-Zippel Lemma, Perfect Matching Lecturer: Shayan Oveis Gharan 01/30/2017 Scribe: Philip Cho Disclaimer: These notes have not

More information

ELE/MCE 503 Linear Algebra Facts Fall 2018

ELE/MCE 503 Linear Algebra Facts Fall 2018 ELE/MCE 503 Linear Algebra Facts Fall 2018 Fact N.1 A set of vectors is linearly independent if and only if none of the vectors in the set can be written as a linear combination of the others. Fact N.2

More information

The Complexity of Complex Weighted Boolean #CSP

The Complexity of Complex Weighted Boolean #CSP The Complexity of Complex Weighted Boolean #CSP Jin-Yi Cai 1 Computer Sciences Department University of Wisconsin Madison, WI 53706. USA jyc@cs.wisc.edu Pinyan Lu 2 Institute for Theoretical Computer Science

More information

An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015

An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 D. Capodilupo 1, S. Freedman 1, M. Hua 1, and J. Sun 1 1 Department of Mathematics, University of Michigan Abstract A central

More information