Basis Collapse in Holographic Algorithms Over All Domain Sizes
|
|
- Gervais Bryan
- 5 years ago
- Views:
Transcription
1 Basis Collapse in Holographic Algorithms Over All Domain Sizes Sitan Chen Harvard College March 29, 2016
2 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
3 Holographic algorithms reduce counting problems into the problem of counting perfect matchings in a graph G = (V, E). Perfect matching: M E for which every v V belongs to exactly one edge e M [Valiant 79]: Counting perfect matchings in arbitrary graphs is #P-complete. [Fisher-Temperley 1961, Kasteleyn 1961]: Counting perfect matchings in planar graphs is in P.
4 More generally, if every edge e of G has some weight w(e), define ( ) PerfMatch(G) = w(e). Theorem (FKT algorithm) perfect matchings M e M If G is a planar weighted graph, PerfMatch(G) can be computed in polynomial time. Idea. For an arbitrary graph G with adjacency matrix A, the Pfaffian ( ) Pf(A) = sgn(m) w(e) perfect matchings M e M satisfies Pf(A) 2 = det(a). For planar graphs, can flip the signs of some entries of A to make Pf and PerfMatch agree.
5 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )
6 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )
7 Imagine: each vertex v on the left propagates signals along its outgoing edges indicating whether v is assigned 1 (green) or 0 (black).
8 Each satisfying assignment corresponds to a collection of signals satisfying two constraints: Consistency: If x i is a vertex on the left, the two signals x i generates must be the same Satisfaction: If C j is a vertex on the right, at least one of the three signals it receives must be
9 Goal: encode these bit vectors using the matching properties of graphs Definition A matchgate is a weighted graph G with designated subsets of its vertices called external nodes X. We say that it is of arity X. Definition The standard signature G of matchgate G of arity n is a vector of dimension 2 n with entries indexed by bitstrings of length n. For Z X corresponding to bitstring α, Γ α = PerfMatch(Γ\Z).
10
11
12 We want planar matchgates G and R whose standard signatures respectively match the vectors encoding the consistency and satisfaction constraints: Consistency: If x i is a vertex on the left, the two signals x i generates must be the same Satisfaction: If C j is a vertex on the right, at least one of the three signals it receives must be
13 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )
14 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )
15 (x 1 x 2 x 3 ) (x 1 x 3 x 4 ) (x 5 x 6 x 7 ) (x 4 x 5 x 6 )
16 Unfortunately, no recognizer has standard signature (0, 1, 1, 1, 1, 1, 1, 1): Observation (Parity Condition) Because a graph with an odd number of vertices has no perfect matchings, given any matchgate G, the indices of the nonzero entries in its standard signature must have the same parity.
17 The saving grace: rewrite number of perfect matchings of matchgrid Ω as an inner product and apply a change of basis. Suppose there are w wires in Ω, generators G 1,...G g, and R 1,..., R r recognizers, then g r PerfMatch(Ω) = y G i x i R j j = G, R, z {0,1} w, z=x 1 x r y 1 y g i=1 j=1 where G = i G i and R = i R i with the order of tensoring specified by the wires. Regard G as an element in X = C 2w and R as an element in X : PerfMatch(Ω) is the result of applying dual vector R to G, which is independent of the choice of basis for X.
18 Definition Given a 2 2 basis matrix M, the signature with respect to M of a generator G of arity n is the vector G satisfying G = M n G. The signature with respect to M of a recognizer R of arity n is the vector R satisfying R = RM n.
19 Suffices to find a basis M of matchgates G and R whose signatures with respect to M match the vectors encoding the consistency and satisfaction constraints. Over C and F 2, this still cannot be done. [Valiant 06, Cai-Lu 07]: Over F 7, take M = G = (3, 0, 0, 5), and R = (0, 3, 3, 0, 3, 0, 0, 5). ( ) 1 3, 6 5
20
21 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
22 The number of different values that objects in a counting problem can take on is called the domain size. Domain size 2: Boolean satisfying assignments Vertex covers Perfect matchings Ice problems Domain size k k-colorings
23 Over domain size k: Arity-n signatures are now vectors of dimension k n. M now has width k because G = M n G R = RM n.
24
25
26 Domain size 2: encode True/False by presence/absence of one external node Domain size k: encode colors {1,..., k} by removal of some subset of a group of l external nodes Arities are now multiples of l External nodes grouped into blocks of l, with wires connecting matchgates blockwise. If Γ has n blocks, Γ has 2 ln entries. M has height 2 l because We call l the basis size. G = M n G R = RM n.
27 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
28 We will regard standard signatures as matrices: Definition For standard signature G of generator G, the t-th matrix form G(t) (1 t n) is the 2 l 2 (n 1)l matrix of entries of G where the rows are indexed by α t {0, 1} l and the columns are indexed by α 1 α t 1 α t+1 α n {0, 1} (n 1)l.
29 We will also regard signatures as matrices: Definition For signature G of generator G, the t-th matrix form G(t) (1 t n) is the k k n 1 matrix of entries of G where the rows are indexed by α t [k] and the columns are indexed by α 1 α t 1 α t+1 α n [k] n 1. Note: we will denote row indices by superscripts and column indices by subscripts.
30 Definition A generator G is full rank if there exists t for which rank(g(t)) = k. It turns out we may assume that rank(m) = k. But we know So if G is of full rank, G(t) = MG(t)(M T ) (n 1). rank(g(t)) = k.
31 Key to understanding the ultimate capabilities of holographic algorithms for solving counting problems over a given domain size: Question Given k, what is the smallest l for which any holographic algorithm over domain size k with a full-rank matchgate can be simulated by one with basis size l? domain size basis size Cai-Lu
32 Key to understanding the ultimate capabilities of holographic algorithms for solving counting problems over a given domain size: Question Given k, what is the smallest l for which any holographic algorithm over domain size k with a full-rank matchgate can be simulated by one with basis size l? domain size basis size Cai-Lu Cai-Fu
33 Key to understanding the ultimate capabilities of holographic algorithms for solving counting problems over a given domain size: Question Given k, what is the smallest l for which any holographic algorithm over domain size k with a full-rank matchgate can be simulated by one with basis size l? domain size basis size Cai-Lu Cai-Fu C 15, Xia 15 k log 2 k
34 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
35 Definition Z {0, 1} n is a cluster if there exists s {0, 1} n and positions p 1,..., ( p m [n] such that each member of Z is of the form ) s j J e p j for some J {p 1,..., p m }, where e pj is the bitstring consisting of zeroes everywhere except position p j. We write Z as s + {e p1,..., e pm } (s only unique up to the bits outside of positions p 1,..., p m ). e.g. {000, 001, 100, 101} is a cluster denoted {e 1, e 3 }.
36 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows 2. Group property: Inverses of standard signatures are also standard signatures 3. Simulation: Use 1 and 2 to simulate with a basis of size K
37 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows (hardest part of the proof ) 2. Group property: Inverses of standard signatures are also standard signatures 3. Simulation: Use 1 and 2 to simulate with a basis of size K
38 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows (hardest part of the proof ) 2. Group property: Inverses of standard signatures are also standard signatures (adapted from Li/Xia result in matchgate character theory) 3. Simulation: Use 1 and 2 to simulate with a basis of size K
39 For now, assume k = 2 K. Steps of proof: 1. Cluster existence: Any standard signature of rank at least 2 K contains a cluster of 2 K linearly independent rows (hardest part of the proof ) 2. Group property: Inverses of standard signatures are also standard signatures (adapted from Li/Xia result in matchgate character theory) 3. Simulation: Use 1 and 2 to simulate with a basis of size K (technique due to Cai/Fu)
40 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
41 Lemma (Group Property) Full-rank 2 K 2 (n 1)K standard signatures G(t) have right inverses (under matrix multiplication) that are also standard signatures.
42
43 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
44 We use the approach introduced by Cai-Fu for simulation given cluster existence and group property have been proven. Take any holographic algorithm over domain size k = 2 K. 1. By cluster existence, can pick out a generator G with full-rank signature and find a cluster Z = s + {e p1,..., e pk } of 2 K linearly independent rows. Suppose WLOG s = 0 l. 2. Let M Z denote the submatrix of M with rows indexed by Z. This will be the basis of size log k = K we use for the simulation.
45 G Z = (M Z ) n G G tc Z = (M Z ) (t 1) M (M Z ) (n t) G
46 Modifying generators is easy: G Z i = (M Z ) n i G i has signature G i with respect to new basis M Z Modifying recognizers is more subtle. Can write ( ) R j = R j (M/M Z ) m i (M Z ) m j. Is R j (M/M Z ) m i a valid recognizer standard signature?
47 3. Define T = M(M Z ) By construction, G tc Z (t) = T G Z (t). 5. By group property, G Z (t) has a right-inverse, so right-multiply by this on both sides to conclude that T is a standard signature.
48 Over the new basis M Z : 6. Replace each recognizer R i with R i T m i 7. Replace each generator G j with G Z j. 8. These new matchgates have the same signatures as the originals, but over a basis of size K, so we re done.
49 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
50 The key ingredient: Theorem (Rank Rigidity) The rank of any standard signature Γ (in matrix form) is always a power of two.
51 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
52 Our methods are primarily algebraic and rely on the characterization of the set of all standard signatures as the variety cut out by a certain collection of quadratic relations: Theorem (Matchgate Identities) A 2 l 2 (n 1)l matrix Γ is the t-th matrix form of the standard signature of some generator matchgate iff for all ζ, η {0, 1} (n 1)l and σ, τ {0, 1} l, the following matchgate identity (MGI) holds. Let ζ η = e q1 e qd and σ τ = e p1 e pd, where q 1 < < q d and p 1 < < p d. Then if d is even, d ( 1) i+1 Γ (σ ep 1 ep i ) ζ Γ (τ ep 1 ep i ) d η = ± ( 1) j+1 Γ (σ ep 1 ) i=1 j=1 (ζ e qj ) Γ(τ ep 1 ) (η e qj ).
53 d ( 1) i+1 Γ (σ ep 1 ep i ) ζ Γ (τ ep 1 ep i ) d η = ± ( 1) j+1 Γ (σ ep 1 ) i=1 j=1 (ζ e qj ) Γ(τ ep 1 ) (η e qj ). Definition A 2 l 2 m matrix M is a pseudo-signature if for all σ, τ for which wt(σ τ) is even, its entries satisfy the corresponding MGI up to a factor of ±1 on the right-hand side. E.g. (matrix-form) standard signatures, clusters of rows, and their transposes are all pseudo-signatures.
54 The matchgate identities allow us to deduce key linear algebraic relationships between the rows of any pseudo-signature Γ. Example Suppose that d = 2, σ = 0000, τ = 0011, ζ = 1100, η = Then the MGIs become Γ Γ Γ Γ = ± ( Γ Γ Γ Γ )
55 Example (Cont d) Rows Γ 1100 and Γ 1111 are linearly dependent if Γ 1101 and Γ 1110 are linearly dependent. Similarly, rows Γ 0000 and Γ 1111 are linearly dependent if Γ 0001 and Γ 1110 Γ 0010 and Γ 1101 Γ 0100 and Γ 1011 Γ 1000 and Γ 0111 are linearly dependent
56 Lemma Let σ, τ {0, 1} l be such that σ τ = 2d j=1 e p i. If row Γ (σ ep i ) is linearly dependent with row Γ (τ ep i ) for all 1 i 2d, then row Γ σ is linearly dependent with row Γ τ. Coordinate-free interpretation: linear relations among wedges of rows of even parity yield linear relations among wedges of rows of odd parity.
57 Definition For V a vector space with basis {e j }, the second exterior power of V, denoted Λ 2 V, is the vector space given by quotienting V V by the relation v w w v for all v, w V. We denote the image of v w under this quotient map by v w. Λ 2 V has basis {e i e j } i<j. Explicitly, if v = v i e i and w = w i e i, then v w = (v i w j v j w i )e i e j = v i w i i<j i<j v j w j e i e j. In particular, v and w are linearly dependent iff v w = 0.
58 By the MGIs, linear relations among wedges of rows of even parity yield linear relations among wedges of rows of odd parity. Example implies that Γ 0000 Γ 1111 = 0 Γ 0001 Γ 1110 Γ 0010 Γ Γ 0100 Γ 1011 Γ 1000 Γ 0111 = 0
59 By the MGIs, linear relations among wedges of rows of even parity yield linear relations among wedges of rows of odd parity. Example implies that µ (Γ 0000 Γ 1111 ) + ν (Γ 0011 Γ 1100 ) = 0 µ (Γ 0001 Γ 1110 Γ 0010 Γ Γ 0100 Γ 1011 Γ 1000 Γ 0111 )± ν (Γ 0010 Γ 1101 Γ 0001 Γ Γ 0111 Γ 1000 Γ 1011 Γ 0100 ) = 0
60 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
61 Claim Rank rigidity implies cluster existence. Proof. Suppose Γ is a 2 l 2 m pseudo-signature of rank 2 K. Can assume Γ has no proper clusters of rows with the same rank as Γ. Otherwise, if there were such a cluster Z = σ + {e q1,..., e ql }, replace Γ by Γ Z and l by l, and ignore bits in positions outside of q 1,..., q l.
62 l K+1 {}}{ K 1 {}}{
63 l K+1=1 {}}{ K 1 {}}{
64 l K+1 {}}{ K 1 {}}{
65 l K+1 {}}{ K 1 {}}{
66 l K+1 {}}{ K 1 {}}{
67 l K+1 {}}{ K 1 {}}{
68 l K+1 {}}{ K 1 {}}{
69 l K+1 {}}{ K 1 {}}{
70 l K+1 {}}{ K 1 {}}{
71 l K+1 {}}{ K 1 {}}{ All other rows must be zero. By the MGIs, a contradiction. Γ 0z 0 K 1 Γ 1z 0 K 1 = 0,
72 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
73 Theorem If Γ is a 2 K+1 2 m pseudo-signature with rank at least 2 K + 1, then rank(γ) = 2 K+1. Sketch. Inductively, we know that Γ contains a cluster Z of 2 K linearly independent rows, say 0 K+1 {e 2,..., e K+1 }. Because rank(γ) 2 K + 1, there exists a row outside the linear span of Z.
74 Even columns: Odd columns:
75 Even columns: Odd columns: Suppose Γ 1001 lay in the span of the red rows, so Γ 1001 Γ 0000 = a σ (Γ σ Γ 0000). LHS: Γ 1000 Γ 0001 RHS: Γ 0 Γ 0 σ red, even
76 Even columns: Odd columns: Suppose Γ 1010 lay in the span of the red rows, so Γ 1010 Γ 0000 = a σ (Γ σ Γ 0000). σ red, even LHS: Γ 1000 Γ 0010 RHS: Γ 0 Γ 0, Γ 1000 Γ 0001
77 Even columns: Odd columns: Suppose Γ 1100 lay in the span of the red rows, so Γ 1100 Γ 0000 = a σ (Γ σ Γ 0000). σ red, even LHS: Γ 1000 Γ 0100 RHS: Γ 0 Γ 0, Γ 1000 Γ 0001, Γ 1000 Γ 0010
78 Even columns: Odd columns: Suppose Γ 1011 lay in the span of the red rows, so Γ 1011 Γ 0001 = a σ (Γ σ Γ 0001). σ red, odd LHS: Γ 1001 Γ 0011 RHS: Γ 0 Γ 0, Γ 0000 Γ 1001
79 Even columns: Odd columns: Suppose Γ 1101 lay in the span of the red rows, so Γ 1011 Γ 0001 = a σ (Γ σ Γ 0001). σ red, odd LHS: Γ 1001 Γ 0101 RHS: Γ 0 Γ 0, Γ 0000 Γ 1001, Γ 1001 Γ 0011
80 Even columns: Odd columns: Suppose Γ 1110 lay in the span of the red rows, so Γ 1110 Γ 0001 = a σ (Γ σ Γ 0001). σ red, odd LHS: Γ 1111 Γ 0000, Γ 1100 Γ 0011, Γ 1010 Γ 0101, Γ 0110 Γ 1001 RHS: Γ 0 Γ 0, Γ 0000 Γ 1001, Γ 1001 Γ 0011, Γ 1001 Γ 0101
81 Even columns: Odd columns: Suppose Γ 1111 lay in the span of the red rows, so Γ 1111 Γ 0000 = a σ (Γ σ Γ 0000). σ red, even LHS: Γ 1110 Γ 0001, Γ 1101 Γ 0010, Γ 1011 Γ 0100, Γ 0111 Γ 1000 RHS: Γ 0 Γ 0, Γ 1000 Γ 0001, Γ 1000 Γ 0010, Γ 1000 Γ 0100
82 Even columns: Odd columns:
83 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
84 Theorem Suppose l > K + 1. If Γ is a 2 l 2 m pseudo-signature of rank 2 K + 1, then there exists a cluster Z {0, 1} l for which Γ Z is also of rank 2 K + 1. Suppose to the contrary. Inductively we know Γ has a cluster Z of 2 K linearly independent rows, say 0 l + {e p1,..., e pk }.
85 l K K {}}{{}}{
86 l K K {}}{{}}{
87 l K K {}}{{}}{
88 l K K {}}{{}}{
89 l K K {}}{{}}{
90 To show Γ 0l and Γ 1l K 0 l are linearly dependent, by MGIs it s enough to show: Lemma Γ 0l e j = 0 for all j p 1,..., p K. Proof. For i {p 1,..., p K } and j {p 1,..., p K }, define: T i : all rows u for which u i = 0 T j i : all rows u for which u i = u j = 0 Z i : Z T i Note that Z i T j i T i. So inductively, proper cluster T j i has rank a power of two, either 2 K 1 or 2 K.
91 Proof (Cont d). If rank(t j i ) = 2K 1, then span(t j i ) = span(z i). This is true for all i {p 1,..., p K }, so Γ 0l e j K i=1span(z i ) = span({γ 0l }). If rank(t j i ) = 2K, then span(t i ) = span(t j i ) span(z), a contradiction.
92 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
93 Theorem (Fu/Yang 13) Suppose a basis collapse theorem holds on domain size 2. Then if a holographic algorithm uses a 2 l k basis of rank 2, then the same collapse theorem holds for this holographic algorithm.
94 Theorem Suppose a basis collapse theorem holds on domain size r. Then if a holographic algorithm uses a 2 l k basis of rank r, then the same collapse theorem holds for this holographic algorithm.
95 By rank rigidity, G(t) must have rank a power of two. If G is a full-rank signature, by G(t) = MG(t)(M T ) (n 1), we know M must have rank a power of two. So if k 2 K, we re done inductively by the collapse theorem for domain size 2 K, where K = log 2 k.
96 Introduction Matchgates/Holographic Algorithms: A Crash Course Basis Size and Domain Size Collapse Theorems Setup Overview of Proof Group Property Simulation Rank Rigidity Matchgate Identities Implies Cluster Existence Base Case Inductive Step Epilogue k 2 K? Next Steps Acknowledgments
97 Work out the case where no full-rank matchgate exists Use the collapse theorem to initiate a study of holographic algorithms over higher domains
98 Thank you to: Professor Leslie Valiant (Harvard University) Professor Jin-Yi Cai (University of Wisconsin) Harvard Herchel-Smith Research Fellowship Simons Institute for Computing
Some Results on Matchgates and Holographic Algorithms. Jin-Yi Cai Vinay Choudhary University of Wisconsin, Madison. NSF CCR and CCR
Some Results on Matchgates and Holographic Algorithms Jin-Yi Cai Vinay Choudhary University of Wisconsin, Madison NSF CCR-0208013 and CCR-0511679. 1 #P Counting problems: #SAT: How many satisfying assignments
More informationA Complexity Classification of the Six Vertex Model as Holant Problems
A Complexity Classification of the Six Vertex Model as Holant Problems Jin-Yi Cai (University of Wisconsin-Madison) Joint work with: Zhiguo Fu, Shuai Shao and Mingji Xia 1 / 84 Three Frameworks for Counting
More informationOn Symmetric Signatures in Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Pinyan Lu Tsinghua University, Beijing
On Symmetric Signatures in Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison Pinyan Lu Tsinghua University, Beijing NSF CCR-0208013 and CCR-0511679. 1 #P Counting problems: #SAT: How many
More informationComputational Complexity Theory. The World of P and NP. Jin-Yi Cai Computer Sciences Dept University of Wisconsin, Madison
Computational Complexity Theory The World of P and NP Jin-Yi Cai Computer Sciences Dept University of Wisconsin, Madison Sept 11, 2012 Supported by NSF CCF-0914969. 1 2 Entscheidungsproblem The rigorous
More informationOn Block-wise Symmetric Signatures for Matchgates
On Block-wise Symmetric Signatures for Matchgates Jin-Yi Cai 1 and Pinyan Lu 2 1 Computer Sciences Department, University of Wisconsin Madison, WI 53706, USA yc@cs.wisc.edu 2 Department of Computer Science
More informationThe Classification Program II: Tractable Classes and Hardness Proof
The Classification Program II: Tractable Classes and Hardness Proof Jin-Yi Cai (University of Wisconsin-Madison) January 27, 2016 1 / 104 Kasteleyn s Algorithm and Matchgates Previously... By a Pfaffian
More informationDichotomy Theorems in Counting Complexity and Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Supported by NSF CCF
Dichotomy Theorems in Counting Complexity and Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison September 7th, 204 Supported by NSF CCF-27549. The P vs. NP Question It is generally conjectured
More informationThis article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing
More informationBases Collapse in Holographic Algorithms
Bases Collapse in Holographic Algorithms Jin-Yi Cai and Pinyan Lu 2 Computer Sciences Department, University of Wisconsin Madison, WI 53706, USA jyc@cswiscedu 2 Department of Computer Science and Technology,
More informationHOLOGRAPHIC ALGORITHMS
SIAM J. COMPUT. Vol. 37, No. 5, pp. 1565 1594 c 2008 Society for Industrial and Applied Mathematics HOLOGRAPHIC ALGORITHMS LESLIE G. VALIANT Abstract. Complexity theory is built fundamentally on the notion
More informationDichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia
Dichotomy Theorems for Counting Problems Jin-Yi Cai University of Wisconsin, Madison Xi Chen Columbia University Pinyan Lu Microsoft Research Asia 1 Counting Problems Valiant defined the class #P, and
More informationOn Symmetric Signatures in Holographic Algorithms
On Symmetric Signatures in Holographic Algorithms Jin-Yi Cai a and Pinyan Lu b a Computer Sciences Department, University of Wisconsin Madison, WI 53706, USA jyc@cs.wisc.edu b Department of Computer Science
More informationOn the Theory of Matchgate Computations
On the Theory of Matchgate Computations Jin-Yi Cai 1 Vinay Choudhary 2 Computer Sciences Department University of Wisconsin Madison, WI 53706. USA. Email: {jyc, vinchr}@cs.wisc.edu 1 Supported by NSF CCR-0208013
More informationThe Complexity of Planar Boolean #CSP with Complex Weights
The Complexity of Planar Boolean #CSP with Complex Weights Heng Guo University of Wisconsin-Madison hguo@cs.wisc.edu Tyson Williams University of Wisconsin-Madison tdw@cs.wisc.edu Abstract We prove a complexity
More informationAlgebraic Methods in Combinatorics
Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationHolographic Algorithms With Unsymmetric Signatures
Holographic Algorithms With Unsymmetric Signatures Jin-Yi Cai University of Wisconsin-Madison Pinyan Lu Tsinghua University Abstract Holographic algorithms were introduced by Valiant as a new methodology
More informationMin-Rank Conjecture for Log-Depth Circuits
Min-Rank Conjecture for Log-Depth Circuits Stasys Jukna a,,1, Georg Schnitger b,1 a Institute of Mathematics and Computer Science, Akademijos 4, LT-80663 Vilnius, Lithuania b University of Frankfurt, Institut
More informationDichotomy for Holant Problems of Boolean Domain
Dichotomy for Holant Problems of Boolean Domain Jin-Yi Cai Pinyan Lu Mingji Xia Abstract Holant problems are a general framework to study counting problems. Both counting Constraint Satisfaction Problems
More informationConstrained Codes as Networks of Relations
Constrained Codes as Networks of Relations Moshe Schwartz, Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract We address the well-known problem of determining the capacity of constrained coding systems.
More informationSiegel s Theorem, Edge Coloring, and a Holant Dichotomy
Siegel s Theorem, Edge Coloring, and a Holant Dichotomy Jin-Yi Cai (University of Wisconsin-Madison) Joint with: Heng Guo and Tyson Williams (University of Wisconsin-Madison) 1 / 117 2 / 117 Theorem (Siegel
More informationRecitation 8: Graphs and Adjacency Matrices
Math 1b TA: Padraic Bartlett Recitation 8: Graphs and Adjacency Matrices Week 8 Caltech 2011 1 Random Question Suppose you take a large triangle XY Z, and divide it up with straight line segments into
More informationk times l times n times
1. Tensors on vector spaces Let V be a finite dimensional vector space over R. Definition 1.1. A tensor of type (k, l) on V is a map T : V V R k times l times which is linear in every variable. Example
More informationLinear Algebra and its Applications
Linear Algebra and its Applications xxx (2011) xxx xxx Contents lists available at ScienceDirect Linear Algebra and its Applications ournal homepage: www.elsevier.com/locate/laa Holographic algorithms
More informationLecture 1 and 2: Random Spanning Trees
Recent Advances in Approximation Algorithms Spring 2015 Lecture 1 and 2: Random Spanning Trees Lecturer: Shayan Oveis Gharan March 31st Disclaimer: These notes have not been subjected to the usual scrutiny
More informationHolographic Reduction, Interpolation and Hardness
Holographic Reduction, Interpolation and Hardness Jin-Yi Cai Pinyan Lu Mingji Xia Abstract We prove a dichotomy theorem for a class of counting problems expressible by Boolean signatures. The proof methods
More informationNotes on the Matrix-Tree theorem and Cayley s tree enumerator
Notes on the Matrix-Tree theorem and Cayley s tree enumerator 1 Cayley s tree enumerator Recall that the degree of a vertex in a tree (or in any graph) is the number of edges emanating from it We will
More informationAlgebraic Methods in Combinatorics
Algebraic Methods in Combinatorics Po-Shen Loh June 2009 1 Linear independence These problems both appeared in a course of Benny Sudakov at Princeton, but the links to Olympiad problems are due to Yufei
More informationAdvanced Combinatorial Optimization Feb 13 and 25, Lectures 4 and 6
18.438 Advanced Combinatorial Optimization Feb 13 and 25, 2014 Lectures 4 and 6 Lecturer: Michel X. Goemans Scribe: Zhenyu Liao and Michel X. Goemans Today, we will use an algebraic approach to solve the
More informationDOMINO TILING. Contents 1. Introduction 1 2. Rectangular Grids 2 Acknowledgments 10 References 10
DOMINO TILING KASPER BORYS Abstract In this paper we explore the problem of domino tiling: tessellating a region with x2 rectangular dominoes First we address the question of existence for domino tilings
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationTopics in Approximation Algorithms Solution for Homework 3
Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L
More informationParity Versions of 2-Connectedness
Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida
More informationReview of Linear Algebra
Review of Linear Algebra Definitions An m n (read "m by n") matrix, is a rectangular array of entries, where m is the number of rows and n the number of columns. 2 Definitions (Con t) A is square if m=
More informationACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex
More information1 Counting spanning trees: A determinantal formula
Math 374 Matrix Tree Theorem Counting spanning trees: A determinantal formula Recall that a spanning tree of a graph G is a subgraph T so that T is a tree and V (G) = V (T ) Question How many distinct
More information2018 Fall 2210Q Section 013 Midterm Exam II Solution
08 Fall 0Q Section 0 Midterm Exam II Solution True or False questions points 0 0 points) ) Let A be an n n matrix. If the equation Ax b has at least one solution for each b R n, then the solution is unique
More informationc i r i i=1 r 1 = [1, 2] r 2 = [0, 1] r 3 = [3, 4].
Lecture Notes: Rank of a Matrix Yufei Tao Department of Computer Science and Engineering Chinese University of Hong Kong taoyf@cse.cuhk.edu.hk 1 Linear Independence Definition 1. Let r 1, r 2,..., r m
More informationis the desired collar neighbourhood. Corollary Suppose M1 n, M 2 and f : N1 n 1 N2 n 1 is a diffeomorphism between some connected components
1. Collar neighbourhood theorem Definition 1.0.1. Let M n be a manifold with boundary. Let p M. A vector v T p M is called inward if for some local chart x: U V where U subsetm is open, V H n is open and
More informationVector Space Concepts
Vector Space Concepts ECE 174 Introduction to Linear & Nonlinear Optimization Ken Kreutz-Delgado ECE Department, UC San Diego Ken Kreutz-Delgado (UC San Diego) ECE 174 Fall 2016 1 / 25 Vector Space Theory
More information18.S34 linear algebra problems (2007)
18.S34 linear algebra problems (2007) Useful ideas for evaluating determinants 1. Row reduction, expanding by minors, or combinations thereof; sometimes these are useful in combination with an induction
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationThe Matrix-Tree Theorem
The Matrix-Tree Theorem Christopher Eur March 22, 2015 Abstract: We give a brief introduction to graph theory in light of linear algebra. Our results culminates in the proof of Matrix-Tree Theorem. 1 Preliminaries
More informationSiegel s theorem, edge coloring, and a holant dichotomy
Siegel s theorem, edge coloring, and a holant dichotomy Tyson Williams (University of Wisconsin-Madison) Joint with: Jin-Yi Cai and Heng Guo (University of Wisconsin-Madison) Appeared at FOCS 2014 1 /
More informationUnless otherwise specified, V denotes an arbitrary finite-dimensional vector space.
MAT 90 // 0 points Exam Solutions Unless otherwise specified, V denotes an arbitrary finite-dimensional vector space..(0) Prove: a central arrangement A in V is essential if and only if the dual projective
More informationCorrigendum: The complexity of counting graph homomorphisms
Corrigendum: The complexity of counting graph homomorphisms Martin Dyer School of Computing University of Leeds Leeds, U.K. LS2 9JT dyer@comp.leeds.ac.uk Catherine Greenhill School of Mathematics The University
More informationA short course on matching theory, ECNU Shanghai, July 2011.
A short course on matching theory, ECNU Shanghai, July 2011. Sergey Norin LECTURE 3 Tight cuts, bricks and braces. 3.1. Outline of Lecture Ear decomposition of bipartite graphs. Tight cut decomposition.
More informationCHAPTER 10 Shape Preserving Properties of B-splines
CHAPTER 10 Shape Preserving Properties of B-splines In earlier chapters we have seen a number of examples of the close relationship between a spline function and its B-spline coefficients This is especially
More informationClassification for Counting Problems
Classification for Counting Problems Jin-Yi Cai (University of Wisconsin-Madison) Thanks to many collaborators: Xi Chen, Zhiguo Fu, Kurt Girstmair, Heng Guo, Mike Kowalczyk, Pinyan Lu, Tyson Williams...
More informationEIGENVALUES AND EIGENVECTORS 3
EIGENVALUES AND EIGENVECTORS 3 1. Motivation 1.1. Diagonal matrices. Perhaps the simplest type of linear transformations are those whose matrix is diagonal (in some basis). Consider for example the matrices
More informationMINIMALLY NON-PFAFFIAN GRAPHS
MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect
More informationORIE 6300 Mathematical Programming I August 25, Recitation 1
ORIE 6300 Mathematical Programming I August 25, 2016 Lecturer: Calvin Wylie Recitation 1 Scribe: Mateo Díaz 1 Linear Algebra Review 1 1.1 Independence, Spanning, and Dimension Definition 1 A (usually infinite)
More informationReconstruction and Higher Dimensional Geometry
Reconstruction and Higher Dimensional Geometry Hongyu He Department of Mathematics Louisiana State University email: hongyu@math.lsu.edu Abstract Tutte proved that, if two graphs, both with more than two
More informationTechnische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)
Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise
More informationEcon Slides from Lecture 7
Econ 205 Sobel Econ 205 - Slides from Lecture 7 Joel Sobel August 31, 2010 Linear Algebra: Main Theory A linear combination of a collection of vectors {x 1,..., x k } is a vector of the form k λ ix i for
More informationMa/CS 6b Class 20: Spectral Graph Theory
Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Recall: Parity of a Permutation S n the set of permutations of 1,2,, n. A permutation σ S n is even if it can be written as a composition of an
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170
UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability
More informationDeterminantal Probability Measures. by Russell Lyons (Indiana University)
Determinantal Probability Measures by Russell Lyons (Indiana University) 1 Determinantal Measures If E is finite and H l 2 (E) is a subspace, it defines the determinantal measure T E with T = dim H P H
More informationACO Comprehensive Exam 19 March Graph Theory
1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting
More informationMatrix Rank in Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Mohan Yang Date: January 18, 2012 LECTURE 3 Matrix Rank in Communication Complexity This lecture
More informationDeterminants: Uniqueness and more
Math 5327 Spring 2018 Determinants: Uniqueness and more Uniqueness The main theorem we are after: Theorem 1 The determinant of and n n matrix A is the unique n-linear, alternating function from F n n to
More informationComputability and Complexity Theory: An Introduction
Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given
More informationRECAP How to find a maximum matching?
RECAP How to find a maximum matching? First characterize maximum matchings A maximal matching cannot be enlarged by adding another edge. A maximum matching of G is one of maximum size. Example. Maximum
More informationSolution. That ϕ W is a linear map W W follows from the definition of subspace. The map ϕ is ϕ(v + W ) = ϕ(v) + W, which is well-defined since
MAS 5312 Section 2779 Introduction to Algebra 2 Solutions to Selected Problems, Chapters 11 13 11.2.9 Given a linear ϕ : V V such that ϕ(w ) W, show ϕ induces linear ϕ W : W W and ϕ : V/W V/W : Solution.
More informationLINEAR ALGEBRA REVIEW
LINEAR ALGEBRA REVIEW JC Stuff you should know for the exam. 1. Basics on vector spaces (1) F n is the set of all n-tuples (a 1,... a n ) with a i F. It forms a VS with the operations of + and scalar multiplication
More information(II.B) Basis and dimension
(II.B) Basis and dimension How would you explain that a plane has two dimensions? Well, you can go in two independent directions, and no more. To make this idea precise, we formulate the DEFINITION 1.
More informationRobin Thomas and Peter Whalen. School of Mathematics Georgia Institute of Technology Atlanta, Georgia , USA
Odd K 3,3 subdivisions in bipartite graphs 1 Robin Thomas and Peter Whalen School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA Abstract We prove that every internally
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationComplexity Dichotomies for Counting Problems
Complexity Dichotomies for Counting Problems Jin-Yi Cai Computer Sciences Department University of Wisconsin Madison, WI 53706 Email: jyc@cs.wisc.edu Xi Chen Department of Computer Science Columbia University
More informationMa/CS 6b Class 20: Spectral Graph Theory
Ma/CS 6b Class 20: Spectral Graph Theory By Adam Sheffer Eigenvalues and Eigenvectors A an n n matrix of real numbers. The eigenvalues of A are the numbers λ such that Ax = λx for some nonzero vector x
More informationPolynomial-time classical simulation of quantum ferromagnets
Polynomial-time classical simulation of quantum ferromagnets Sergey Bravyi David Gosset IBM PRL 119, 100503 (2017) arxiv:1612.05602 Quantum Monte Carlo: a powerful suite of probabilistic classical simulation
More informationMATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix.
MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. Basis Definition. Let V be a vector space. A linearly independent spanning set for V is called a basis.
More informationStatistical Mechanics and Combinatorics : Lecture IV
Statistical Mechanics and Combinatorics : Lecture IV Dimer Model Local Statistics We ve already discussed the partition function Z for dimer coverings in a graph G which can be computed by Kasteleyn matrix
More informationCounting bases of representable matroids
Counting bases of representable matroids Michael Snook School of Mathematics, Statistics and Operations Research Victoria University of Wellington Wellington, New Zealand michael.snook@msor.vuw.ac.nz Submitted:
More informationLecture 22: Counting
CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.
More informationHOLOGRAPHIC ALGORITHMS WITHOUT MATCHGATES
HOLOGRAPHIC ALGORITHMS WITHOUT MATCHGATES J.M. LANDSBERG, JASON MORTON AND SERGUEI NORINE Abstract. The theory of holographic algorithms, which are polynomial time algorithms for certain combinatorial
More informationAhlswede Khachatrian Theorems: Weighted, Infinite, and Hamming
Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Yuval Filmus April 4, 2017 Abstract The seminal complete intersection theorem of Ahlswede and Khachatrian gives the maximum cardinality of
More informationNormal Factor Graphs, Linear Algebra and Probabilistic Modeling
Normal Factor Graphs, Linear Algebra and Probabilistic Modeling Yongyi Mao University of Ottawa Workshop on Counting, Inference, and Optimization on Graphs Princeton University, NJ, USA November 3, 2011
More informationThe definition of a vector space (V, +, )
The definition of a vector space (V, +, ) 1. For any u and v in V, u + v is also in V. 2. For any u and v in V, u + v = v + u. 3. For any u, v, w in V, u + ( v + w) = ( u + v) + w. 4. There is an element
More informationPolynomials in graph theory
Polynomials in graph theory Alexey Bogatov Department of Software Engineering Faculty of Mathematics and Mechanics Saint Petersburg State University JASS 2007 Saint Petersburg Course 1: Polynomials: Their
More informationMatricial real algebraic geometry
Magdeburg, February 23th, 2012 Notation R - a commutative ring M n (R) - the ring of all n n matrices with entries in R S n (R) - the set of all symmetric matrices in M n (R) Mn (R) 2 - the set of all
More informationJournal of Computer and System Sciences
Journal of Computer and System Sciences 77 20 4 6 Contents lists available at ScienceDirect Journal of Computer and System Sciences wwwelseviercom/locate/jcss Holographic algorithms: From art to science
More informationCS1800: Mathematical Induction. Professor Kevin Gold
CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size
More informationZigzag Codes: MDS Array Codes with Optimal Rebuilding
1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical
More informationBoolean Inner-Product Spaces and Boolean Matrices
Boolean Inner-Product Spaces and Boolean Matrices Stan Gudder Department of Mathematics, University of Denver, Denver CO 80208 Frédéric Latrémolière Department of Mathematics, University of Denver, Denver
More informationDS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.
DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1
More informationWalks, Springs, and Resistor Networks
Spectral Graph Theory Lecture 12 Walks, Springs, and Resistor Networks Daniel A. Spielman October 8, 2018 12.1 Overview In this lecture we will see how the analysis of random walks, spring networks, and
More informationFine Grained Counting Complexity I
Fine Grained Counting Complexity I Holger Dell Saarland University and Cluster of Excellence (MMCI) & Simons Institute for the Theory of Computing 1 50 Shades of Fine-Grained #W[1] W[1] fixed-parameter
More informationInstructions Please answer the five problems on your own paper. These are essay questions: you should write in complete sentences.
Instructions Please answer the five problems on your own paper. These are essay questions: you should write in complete sentences.. Recall that P 3 denotes the vector space of polynomials of degree less
More informationThe complexity of counting graph homomorphisms
The complexity of counting graph homomorphisms Martin Dyer and Catherine Greenhill Abstract The problem of counting homomorphisms from a general graph G to a fixed graph H is a natural generalisation of
More informationMULTILINEAR ALGEBRA MCKENZIE LAMB
MULTILINEAR ALGEBRA MCKENZIE LAMB 1. Introduction This project consists of a rambling introduction to some basic notions in multilinear algebra. The central purpose will be to show that the div, grad,
More informationOn the adjacency matrix of a block graph
On the adjacency matrix of a block graph R. B. Bapat Stat-Math Unit Indian Statistical Institute, Delhi 7-SJSS Marg, New Delhi 110 016, India. email: rbb@isid.ac.in Souvik Roy Economics and Planning Unit
More informationNowhere zero flow. Definition: A flow on a graph G = (V, E) is a pair (D, f) such that. 1. D is an orientation of G. 2. f is a function on E.
Nowhere zero flow Definition: A flow on a graph G = (V, E) is a pair (D, f) such that 1. D is an orientation of G. 2. f is a function on E. 3. u N + D (v) f(uv) = w ND f(vw) for every (v) v V. Example:
More informationHMMT February 2018 February 10, 2018
HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18
More information8.5 Sequencing Problems
8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,
More informationChordal structure in computer algebra: Permanents
Chordal structure in computer algebra: Permanents Diego Cifuentes Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology Joint
More informationLecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma
CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 7: Schwartz-Zippel Lemma, Perfect Matching Lecturer: Shayan Oveis Gharan 01/30/2017 Scribe: Philip Cho Disclaimer: These notes have not
More informationELE/MCE 503 Linear Algebra Facts Fall 2018
ELE/MCE 503 Linear Algebra Facts Fall 2018 Fact N.1 A set of vectors is linearly independent if and only if none of the vectors in the set can be written as a linear combination of the others. Fact N.2
More informationThe Complexity of Complex Weighted Boolean #CSP
The Complexity of Complex Weighted Boolean #CSP Jin-Yi Cai 1 Computer Sciences Department University of Wisconsin Madison, WI 53706. USA jyc@cs.wisc.edu Pinyan Lu 2 Institute for Theoretical Computer Science
More informationAn Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015
An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 D. Capodilupo 1, S. Freedman 1, M. Hua 1, and J. Sun 1 1 Department of Mathematics, University of Michigan Abstract A central
More information