Lecture 8: Pesudorandom Generators (II) 1 Pseudorandom Generators for Bounded Computation

Size: px
Start display at page:

Download "Lecture 8: Pesudorandom Generators (II) 1 Pseudorandom Generators for Bounded Computation"

Transcription

1 Expander Graphs in Computer Science WS 2010/2011 Lecture 8: Pesudorandom Generators (II) Lecturer: He Sun 1 Pseudorandom Generators for Bounded Computation Definition 8.1 Let M be a randomized TM that on input w requires l( w ) random bits. The family { n } n=1 of functions ( n : {0, 1} s(n) {0, 1} l(n) ) is an ε enerator for M if for any w {0, 1}, it holds that ( Pr M(w, r) = 1] Pr M w, w (z) ) = 1 ] < ε r {0,1} l( w ) z {0,1} s( w ) Instead of a family of functions, it is more convenient to view, the ε enerator for M as a TM that on input a strin of lenth s(n) outputs a strin of lenth l(n). We call w the seed of the PG. 2 andomized Lospace TM In this lecture, we present a PG that fools all randomized lospace TMs. Before proceedin any further, we have to clarify a point reardin how the random bits are accessed in a randomized space bounded computation (lospace in our case). There are two varyin definitions of randomized space bounded TMs based on the manner the random bits are accessed: The TM obtains the random bits as and when required by it. The strin of random bits is fed as an auxiliary off-line input (on a separate tape) in addition to the reular input to the TM. In this case, the head accessin the random bits on this tape can move back and forth on the tape. It is to be noted that in the case of randomized time bounded computation it is immaterial which convention we observe. For randomized space bounded computation, we consider only TMs of the first kind or equivalently consider TMs of the second kind in which the head on the random tape is restricted in the sense that it can only move riht alon the tape (i. e., the random tape is one-way read-only tape). We also assume that all randomized space S TMs halt in time less than 2 S. 3 Nisan s Generators The main task of this lecture is to construct the followin PG. 1

2 2 Lecture 8: Pesudorandom Generators (II) 2 Lecture 8: Pesudorandom Generators (II) 3 Nisan s Generators Theorem 8.2 There exists an n-space-bounded TM G : {0, 1} O(lo2 m) {0, 1} m such that for Theorem all randomized 8.2 There S-space-bounded exists a SPACE(n) TM M, TM G is G, ag 2 S : {0, -enerator 1} O(lo2 m) for M, {0, 1} where m such m that = 2 S forand n = all O(lo randomized 2 m). lospace TM M, G is a 1 n enerator for M.1 Before discussin the space-bounded PGs, let us look at the structure of computation tableaubefore of a randomized discussin the TM. space-bounded For an S space-bounded PGs, we studytm them, structure the of computation tableau of M consists of a randomized of at most TM. 2 S rows For aand space each S-bounded row corresponds TM M, the tocomputation a confiuration tableau of M, of Masconsists shown in Fiure of at 1. most 2 S rows and each row corresponds to a confiuration of M, as shown in 1. S 2 S andom bits Fiure 1: The computation tableau of a space S-bounded TM Fiure 1: The computation tableau of a space S-bounded TM By the definition of randomized TM, each step of M s processin requires one random By the definition of randomized TMs, each step of M s processin bit and the number of random bits required for is at most 2 S requires one random. For simplicity we assume bit and that the M requires number 2 S of random random bits. bits Consider required the for tableau M is at divided most into 2 S. two For simplicity with each we assume half thatrequirin the runnin random time strins of Mr 1 isand 2 S. r 2 Consider respectively theeach tableau of lenth divided r = into 2 S /2. two If rhalves 1 and r 2 with are chosen each half requirin independently, random then strins by rdefinition 1 and r 2 the respectively randomized each TMofcan lenth output r = the 2 S correct /2. If ranswer. 1 and r 2 However, are chosen independently, we would like then to choose by definition r 1 and Mr 2 in cansuch output a manner the correct that their answer. behavior However, is not sinificantly we would like to choose different r 1 from and the r 2 incase such when a manner they arethat chosen their independently. behavior is not sinificantly different from the case when To put theythins are chosen more formally, independently. we have 2 alorithms A 1 and such that Formally, we assume that A 1 and are the upper and lower halves respectively of the computation tableau of M and x 1 We shall infact prove a more eneral 1 and x result 2 are independently chosen random strins, see Fiure 2. that for all randomized space S TM M, G is a 1 enerator for 2 Moreover, S M. alorithms A 1 and are of the followin form: Alorithm A 1 takes an input x 1 of lenth r and outputs a strin b 1 of lenth c. Alorithm takes as input the output b 1 of A 1 and another strin x 2 of lenth r and outputs a strin b 2 of lenth c.

3 Lecture 8: Pesudorandom Generators (II) 3 A 1 x 1 b 1 x 2 b 2 Fiure 2: A 1, with random inputs What we are in search of is a enerator that supplies strins x 1 and x 2 in a fashion better than choosin them independently. For notational brevity, iven a function, we use l (z) and r (z) to express the left half and the riht half of the strin (z), i. e., (z) = l (z) r (z) and l (z) = r (z). See Fiure 3. A 1 l (z) b 1 r (z) b 2 Fiure 3: A 1, with inputs from enerator Definition 8.3 A function : {0, 1} t {0, 1} r {0, 1} r is defined to be a ε-enerator for communication c if for all functions A 1 : {0, 1} r {0, 1} c and : {0, 1} c {0, 1} r {0, 1} c, we have that b Pr (A 1 (x 1 ), x 2 ) = b] Pr (A 1 ( l (z)), r (z)) = b] < ε. x 1,x 2 {0,1} r z {0,1} t For simplicity, we call a 2 c -enerator for communication c a c-enerator. For the present we shall assume the followin lemma hold and use expanders to prove this lemma in the end of the lecture. Lemma 8.4 There exists a constant k > 0 such that for all r, c, there exists a polynomial time computable c-enerator of the form : {0, 1} r+kc {0, 1} r {0, 1} r. Now we break the tableau into several components, called A 1,,, S, and let the output of be the random strins for every pair of consecutive components (i 1 and i ) such that their behavior is not sinificantly different from usin pure random bits, see Fiure 4. Moreover, we hope that every application of causes error at most 1/2 2S. Because we invoke at most 2 S 1 times, so the total error is at most 2 S 1 1/2 2S. Notice that in the above framework there are 2 S 1 components each of which require +ks random bits. We use the same approach to reduce the number of random bits required by every

4 4 Lecture 8: Pesudorandom Generators (II) A 1 + ks A 3 + ks A 4 S 1 + ks S Fiure 4: The first level of the recursive construction A ks 2 A ks A 4 S + S 2 + ks 2 S ks S Fiure 5: ecursive construction of G S pair of components from + ks each to + 2kS total. We perform this operation recursively till there is only one component left. See Fiure 5. Formally let i : {0, 1} +iks {0, 1} +(i 1)kS {0, 1} +(i 1)kS be an S-enerator for i = 1,, S. Define G i : {0, 1} +iks {0, 1} 2i inductively as follows: G i (z) = { z i = 0 G i 1 ( l i (z) ) G i 1 ( r i (z)) i > 0 Lemma 8.5 The PG G S runs in space O ( + ks 2). Lemma 8.6 For all space S-bounded TM M, G S is a 2 S -enerator for M. Proof: Since each application of i incurs an error of at most 1/2 2S, and there are 2 S S = 2 S 1 applications of i, therefore by the union bound the error probability is at most (2 S 1)/2 2S 1/2 S.

5 Lecture 8: Pesudorandom Generators (II) 5 4 Proof of Lemma 8.4 Lemma 8.7 Let G = (V, E) be a d-reular raph with spectral expansion λ. subsets S, T V we have E(S, T ) S E V T V λ S V T V. Then for any Proof: Apply the Expander Mixin Lemma on the double coverin of G. Now we prove Lemma 8.4. Proof: Let G = (V, E) be a d = 2 6c -reular amanujan expander on V = 2 r vertices. The enerator : {0, 1} r+6c {0, 1} r {0, 1} r works as follows: On input z = (x, i) {0, 1} r {0, 1} d, output ( l (z), r (z) ) = (x, y) where y is the vertex reached by takin the i-th ede out of x. Let b be any output of the alorithms (A 1, ). Fix b. For any b {0, 1} c, define S b = { x {0, 1} r A 1 (x) = b }, T b = { x {0, 1} r (b, x) = b }. Thus for truly random strins x 1 and x 2, the probability that alorithms (A 1, ) outputs b is expressed by Pr (A 1 (x 1 ), x 2 ) = b] = Prx 1 S b x 2 T b ] x 1,x 2 = S b V T b V. On the other hand, when usin the output of to instead truly random bits, the probability that (A 1, ) outputs b becomes ] Pr (A 1 ( l (z)), r (z)) = b = Pr x S b z {0,1} r+d x,i ith ede out of x leads to T b ] Therefore = E(S b, T b ). E Pr (A 1 (x 1 ), x 2 ) = b] Pr (A 1 ( l (z)), r (z)) = b] x 1,x 2 z {0,1} r+d ( = Sb V T b V E(S b, T b ) ) E b {0,1} c S b V T b V E(S b, T b ) E. Because S b and T b are subsets of V, by Lemma 8.7 we know that S b V T b V E(S b, T b ) E λ S b V T b λ, V

6 6 Lecture 8: Pesudorandom Generators (II) where λ is the spectral expansion of G and satisfies λ 2 d 1/d. Therefore Pr (A 1 (x 1 ), x 2 ) = b] Pr (A 1 ( l (z)), r (z)) = b] x 1,x 2 z {0,1} r+d λ 2 d 1 d <2 c 1 2 c c

Pseudorandom Generators

Pseudorandom Generators 8 Pseudorandom Generators Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 andomness is one of the fundamental computational resources and appears everywhere. In computer science,

More information

Notes on Complexity Theory Last updated: December, Lecture 27

Notes on Complexity Theory Last updated: December, Lecture 27 Notes on Complexity Theory Last updated: December, 2011 Jonathan Katz Lecture 27 1 Space-Bounded Derandomization We now discuss derandomization of space-bounded algorithms. Here non-trivial results can

More information

PRGs for space-bounded computation: INW, Nisan

PRGs for space-bounded computation: INW, Nisan 0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,

More information

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5 UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look

More information

Lecture 3: Randomness in Computation

Lecture 3: Randomness in Computation Great Ideas in Theoretical Computer Science Summer 2013 Lecture 3: Randomness in Computation Lecturer: Kurt Mehlhorn & He Sun Randomness is one of basic resources and appears everywhere. In computer science,

More information

198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007

198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007 198:538 Complexity of Computation Lecture 16 Rutgers University, Spring 2007 8 March 2007 In this lecture we discuss Shamir s theorem that PSPACE is the set of languages that have interactive proofs with

More information

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0. Notes on Complexity Theory Last updated: October, 2005 Jonathan Katz Handout 5 1 An Improved Upper-Bound on Circuit Size Here we show the result promised in the previous lecture regarding an upper-bound

More information

CSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits

CSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits CSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits Chris Calabro January 13, 2016 1 RAM model There are many possible, roughly equivalent RAM models. Below we will define one in the fashion

More information

Matrix multiplication: a group-theoretic approach

Matrix multiplication: a group-theoretic approach CSG399: Gems of Theoretical Computer Science. Lec. 21-23. Mar. 27-Apr. 3, 2009. Instructor: Emanuele Viola Scribe: Ravi Sundaram Matrix multiplication: a roup-theoretic approach Given two n n matrices

More information

PSRGs via Random Walks on Graphs

PSRGs via Random Walks on Graphs Spectral Graph Theory Lecture 9 PSRGs via Random Walks on Graphs Daniel A. Spielman September 30, 2009 9.1 Overview There has been a lot of work on the design of Pseudo-Random Number Generators (PSRGs)

More information

Lecture 14: Recursive Languages

Lecture 14: Recursive Languages Lecture 14: Recursive Languages Instructor: Ketan Mulmuley Scriber: Yuan Li February 24, 2015 1 Recursive Languages Definition 1.1. A language L Σ is called recursively enumerable (r. e.) or computably

More information

PHY 133 Lab 1 - The Pendulum

PHY 133 Lab 1 - The Pendulum 3/20/2017 PHY 133 Lab 1 The Pendulum [Stony Brook Physics Laboratory Manuals] Stony Brook Physics Laboratory Manuals PHY 133 Lab 1 - The Pendulum The purpose of this lab is to measure the period of a simple

More information

LP Rounding and Combinatorial Algorithms for Minimizing Active and Busy Time

LP Rounding and Combinatorial Algorithms for Minimizing Active and Busy Time LP Roundin and Combinatorial Alorithms for Minimizin Active and Busy Time Jessica Chan, Samir Khuller, and Koyel Mukherjee University of Maryland, Collee Park {jschan,samir,koyelm}@cs.umd.edu Abstract.

More information

Lecture 7: ɛ-biased and almost k-wise independent spaces

Lecture 7: ɛ-biased and almost k-wise independent spaces Lecture 7: ɛ-biased and almost k-wise independent spaces Topics in Complexity Theory and Pseudorandomness (pring 203) Rutgers University wastik Kopparty cribes: Ben Lund, Tim Naumovitz Today we will see

More information

15-855: Intensive Intro to Complexity Theory Spring Lecture 16: Nisan s PRG for small space

15-855: Intensive Intro to Complexity Theory Spring Lecture 16: Nisan s PRG for small space 15-855: Intensive Intro to Complexity Theory Spring 2009 Lecture 16: Nisan s PRG for small space For the next few lectures we will study derandomization. In algorithms classes one often sees clever randomized

More information

Randomized Time Space Tradeoffs for Directed Graph Connectivity

Randomized Time Space Tradeoffs for Directed Graph Connectivity Randomized Time Space Tradeoffs for Directed Graph Connectivity Parikshit Gopalan, Richard Lipton, and Aranyak Mehta College of Computing, Georgia Institute of Technology, Atlanta GA 30309, USA. Email:

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Journal of Inequalities in Pure and Applied Mathematics L HOSPITAL TYPE RULES FOR OSCILLATION, WITH APPLICATIONS IOSIF PINELIS Department of Mathematical Sciences, Michian Technoloical University, Houhton,

More information

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes

More information

6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3

6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3 6.841/18.405J: Advanced Complexity Wednesday, February 12, 2003 Lecture Lecture 3 Instructor: Madhu Sudan Scribe: Bobby Kleinberg 1 The language MinDNF At the end of the last lecture, we introduced the

More information

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching

More information

CS151 Complexity Theory. Lecture 9 May 1, 2017

CS151 Complexity Theory. Lecture 9 May 1, 2017 CS151 Complexity Theory Lecture 9 Hardness vs. randomness We have shown: If one-way permutations exist then BPP δ>0 TIME(2 nδ ) ( EXP simulation is better than brute force, but just barely stronger assumptions

More information

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 Recall the definition of probabilistically checkable proofs (PCP) from last time. We say L has

More information

Lecture 22: PSPACE

Lecture 22: PSPACE 6.045 Lecture 22: PSPACE 1 VOTE VOTE VOTE For your favorite course on automata and complexity Please complete the online subject evaluation for 6.045 2 Final Exam Information Who: You On What: Everything

More information

Lecture 3 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

Lecture 3 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak; Topics in Theoretical Computer Science March 7, 2016 Lecturer: Ola Svensson Lecture 3 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent

More information

Lecture 6: Oracle TMs, Diagonalization Limits, Space Complexity

Lecture 6: Oracle TMs, Diagonalization Limits, Space Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 6: Oracle TMs, Diagonalization Limits, Space Complexity January 22, 2016 Lecturer: Paul Beame Scribe: Paul Beame Diagonalization enabled us to separate

More information

Lecture 24: Randomized Complexity, Course Summary

Lecture 24: Randomized Complexity, Course Summary 6.045 Lecture 24: Randomized Complexity, Course Summary 1 1/4 1/16 1/4 1/4 1/32 1/16 1/32 Probabilistic TMs 1/16 A probabilistic TM M is a nondeterministic TM where: Each nondeterministic step is called

More information

1 CHAPTER 7 PROJECTILES. 7.1 No Air Resistance

1 CHAPTER 7 PROJECTILES. 7.1 No Air Resistance CHAPTER 7 PROJECTILES 7 No Air Resistance We suppose that a particle is projected from a point O at the oriin of a coordinate system, the y-axis bein vertical and the x-axis directed alon the round The

More information

IITM-CS6845: Theory Toolkit February 3, 2012

IITM-CS6845: Theory Toolkit February 3, 2012 IITM-CS6845: Theory Toolkit February 3, 2012 Lecture 4 : Derandomizing the logspace algorithm for s-t connectivity Lecturer: N S Narayanaswamy Scribe: Mrinal Kumar Lecture Plan:In this lecture, we will

More information

CSCI3390-Lecture 16: NP-completeness

CSCI3390-Lecture 16: NP-completeness CSCI3390-Lecture 16: NP-completeness 1 Summary We recall the notion of polynomial-time reducibility. This is just like the reducibility we studied earlier, except that we require that the function mapping

More information

PSRGs via Random Walks on Graphs

PSRGs via Random Walks on Graphs Spectral Graph Theory Lecture 11 PSRGs via Random Walks on Graphs Daniel A. Spielman October 3, 2012 11.1 Overview There has been a lot of work on the design of Pseudo-Random Number Generators (PSRGs)

More information

Energy-preserving affine connections

Energy-preserving affine connections Enery-preservin affine connections Andrew D. Lewis 1997/07/28 Abstract A Riemannian affine connection on a Riemannian manifold has the property that is preserves the kinetic enery associated with the metric.

More information

Physics 20 Lesson 24 Simple Harmonic Motion Pendulums

Physics 20 Lesson 24 Simple Harmonic Motion Pendulums Physics 0 esson 4 Simple Harmonic Motion Pendulums Refer to Chapter 7 in Pearson for a discussion of simple harmonic motion. I. Simple Harmonic Motion A study of simple harmonic motion (SHM) will take

More information

11.1 Set Cover ILP formulation of set cover Deterministic rounding

11.1 Set Cover ILP formulation of set cover Deterministic rounding CS787: Advanced Algorithms Lecture 11: Randomized Rounding, Concentration Bounds In this lecture we will see some more examples of approximation algorithms based on LP relaxations. This time we will use

More information

On the Chromatic Art Gallery Problem

On the Chromatic Art Gallery Problem CCCG 2014, Halifax, Nova Scotia, Auust 11 13, 2014 On the Chromatic Art Gallery Problem Sándor P. Fekete Stephan Friedrichs Michael Hemmer Joseph B. M. Mitchell Christiane Schmidt Abstract For a polyonal

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170 UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability

More information

Undirected ST-Connectivity in Log-Space. Omer Reingold. Presented by: Thang N. Dinh CISE, University of Florida, Fall, 2010

Undirected ST-Connectivity in Log-Space. Omer Reingold. Presented by: Thang N. Dinh CISE, University of Florida, Fall, 2010 Undirected ST-Connectivity in Log-Space Omer Reingold Presented by: Thang N. Dinh CISE, University of Florida, Fall, 2010 Undirected s-t connectivity(ustcon) Is t reachable from s in a undirected graph

More information

Experiment 1: Simple Pendulum

Experiment 1: Simple Pendulum COMSATS Institute of Information Technoloy, Islamabad Campus PHY-108 : Physics Lab 1 (Mechanics of Particles) Experiment 1: Simple Pendulum A simple pendulum consists of a small object (known as the bob)

More information

6.842 Randomness and Computation Lecture 5

6.842 Randomness and Computation Lecture 5 6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its

More information

Lecture 04: Balls and Bins: Birthday Paradox. Birthday Paradox

Lecture 04: Balls and Bins: Birthday Paradox. Birthday Paradox Lecture 04: Balls and Bins: Overview In today s lecture we will start our study of balls-and-bins problems We shall consider a fundamental problem known as the Recall: Inequalities I Lemma Before we begin,

More information

Lecture 20: PSPACE. November 15, 2016 CS 1010 Theory of Computation

Lecture 20: PSPACE. November 15, 2016 CS 1010 Theory of Computation Lecture 20: PSPACE November 15, 2016 CS 1010 Theory of Computation Recall that PSPACE = k=1 SPACE(nk ). We will see that a relationship between time and space complexity is given by: P NP PSPACE = NPSPACE

More information

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 9/6/2004. Notes for Lecture 3

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 9/6/2004. Notes for Lecture 3 U.C. Berkeley CS278: Computational Complexity Handout N3 Professor Luca Trevisan 9/6/2004 Notes for Lecture 3 Revised 10/6/04 1 Space-Bounded Complexity Classes A machine solves a problem using space s(

More information

Tail Inequalities Randomized Algorithms. Sariel Har-Peled. December 20, 2002

Tail Inequalities Randomized Algorithms. Sariel Har-Peled. December 20, 2002 Tail Inequalities 497 - Randomized Algorithms Sariel Har-Peled December 0, 00 Wir mssen wissen, wir werden wissen (We must know, we shall know) David Hilbert 1 Tail Inequalities 1.1 The Chernoff Bound

More information

Midterm II : Formal Languages, Automata, and Computability

Midterm II : Formal Languages, Automata, and Computability Midterm II 15-453: Formal Languages, Automata, and Computability Lenore Blum, Asa Frank, Aashish Jindia, and Andrew Smith April 8, 2014 Instructions: 1. Once the exam begins, write your name on each sheet.

More information

NP-Completeness. A language B is NP-complete iff B NP. This property means B is NP hard

NP-Completeness. A language B is NP-complete iff B NP. This property means B is NP hard NP-Completeness A language B is NP-complete iff B NP A NP A P B This property means B is NP hard 1 3SAT is NP-complete 2 Result Idea: B is known to be NP complete Use it to prove NP-Completeness of C IF

More information

c 2006 Society for Industrial and Applied Mathematics

c 2006 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 20, No. 3, pp. 603 609 c 2006 Society for Industrial Applied Mathematics CYCLE DECOMPOSITIONS OF K n,n I JUN MA, LIQUN PU, AND HAO SHEN Abstract. Let K n,n denote the complete

More information

CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010

CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010 CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010 Computational complexity studies the amount of resources necessary to perform given computations.

More information

CS5371 Theory of Computation. Lecture 14: Computability V (Prove by Reduction)

CS5371 Theory of Computation. Lecture 14: Computability V (Prove by Reduction) CS5371 Theory of Computation Lecture 14: Computability V (Prove by Reduction) Objectives This lecture shows more undecidable languages Our proof is not based on diagonalization Instead, we reduce the problem

More information

Wire antenna model of the vertical grounding electrode

Wire antenna model of the vertical grounding electrode Boundary Elements and Other Mesh Reduction Methods XXXV 13 Wire antenna model of the vertical roundin electrode D. Poljak & S. Sesnic University of Split, FESB, Split, Croatia Abstract A straiht wire antenna

More information

2.2 Differentiation and Integration of Vector-Valued Functions

2.2 Differentiation and Integration of Vector-Valued Functions .. DIFFERENTIATION AND INTEGRATION OF VECTOR-VALUED FUNCTIONS133. Differentiation and Interation of Vector-Valued Functions Simply put, we differentiate and interate vector functions by differentiatin

More information

Lecture 22: Derandomization Implies Circuit Lower Bounds

Lecture 22: Derandomization Implies Circuit Lower Bounds Advanced Complexity Theory Spring 2016 Lecture 22: Derandomization Implies Circuit Lower Bounds Prof. Dana Moshkovitz 1 Overview In the last lecture we saw a proof presented by Madhu Sudan that E SIZE(2

More information

CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010

CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010 CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010 So far our notion of realistic computation has been completely deterministic: The Turing Machine

More information

IN this paper we investigate a propagative impact model. A propagative model of simultaneous impact: existence, uniqueness, and design consequences

IN this paper we investigate a propagative impact model. A propagative model of simultaneous impact: existence, uniqueness, and design consequences 1 A propaative model of simultaneous impact: existence, uniqueness, and desin consequences Vlad Sehete, Student Member, IEEE, Todd D. Murphey, Member, IEEE Abstract This paper presents existence and uniqueness

More information

Complexity (Pre Lecture)

Complexity (Pre Lecture) Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What

More information

CS5371 Theory of Computation. Lecture 23: Complexity VIII (Space Complexity)

CS5371 Theory of Computation. Lecture 23: Complexity VIII (Space Complexity) CS5371 Theory of Computation Lecture 23: Complexity VIII (Space Complexity) Objectives Introduce Space Complexity Savitch s Theorem The class PSPACE Space Complexity Definition [for DTM]: Let M be a DTM

More information

CS154, Lecture 17: conp, Oracles again, Space Complexity

CS154, Lecture 17: conp, Oracles again, Space Complexity CS154, Lecture 17: conp, Oracles again, Space Complexity Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode: Guess string

More information

Lecture 5: Derandomization (Part II)

Lecture 5: Derandomization (Part II) CS369E: Expanders May 1, 005 Lecture 5: Derandomization (Part II) Lecturer: Prahladh Harsha Scribe: Adam Barth Today we will use expanders to derandomize the algorithm for linearity test. Before presenting

More information

Lecture 6: Random Walks versus Independent Sampling

Lecture 6: Random Walks versus Independent Sampling Spectral Graph Theory and Applications WS 011/01 Lecture 6: Random Walks versus Independent Sampling Lecturer: Thomas Sauerwald & He Sun For many problems it is necessary to draw samples from some distribution

More information

14.1 Finding frequent elements in stream

14.1 Finding frequent elements in stream Chapter 14 Streaming Data Model 14.1 Finding frequent elements in stream A very useful statistics for many applications is to keep track of elements that occur more frequently. It can come in many flavours

More information

COMPLEXITY THEORY. PSPACE = SPACE(n k ) k N. NPSPACE = NSPACE(n k ) 10/30/2012. Space Complexity: Savitch's Theorem and PSPACE- Completeness

COMPLEXITY THEORY. PSPACE = SPACE(n k ) k N. NPSPACE = NSPACE(n k ) 10/30/2012. Space Complexity: Savitch's Theorem and PSPACE- Completeness 15-455 COMPLEXITY THEORY Space Complexity: Savitch's Theorem and PSPACE- Completeness October 30,2012 MEASURING SPACE COMPLEXITY FINITE STATE CONTROL I N P U T 1 2 3 4 5 6 7 8 9 10 We measure space complexity

More information

Space and Nondeterminism

Space and Nondeterminism CS 221 Computational Complexity, Lecture 5 Feb 6, 2018 Space and Nondeterminism Instructor: Madhu Sudan 1 Scribe: Yong Wook Kwon Topic Overview Today we ll talk about space and non-determinism. For some

More information

Relaxed Multiplication Using the Middle Product

Relaxed Multiplication Using the Middle Product Relaxed Multiplication Usin the Middle Product Joris van der Hoeven Département de Mathématiques (bât. 425) Université Paris-Sud 91405 Orsay Cedex France joris@texmacs.or ABSTRACT In previous work, we

More information

Theory of Computation

Theory of Computation Theory of Computation Lecture #6 Sarmad Abbasi Virtual University Sarmad Abbasi (Virtual University) Theory of Computation 1 / 39 Lecture 6: Overview Prove the equivalence of enumerators and TMs. Dovetailing

More information

Lecture 11: Hash Functions, Merkle-Damgaard, Random Oracle

Lecture 11: Hash Functions, Merkle-Damgaard, Random Oracle CS 7880 Graduate Cryptography October 20, 2015 Lecture 11: Hash Functions, Merkle-Damgaard, Random Oracle Lecturer: Daniel Wichs Scribe: Tanay Mehta 1 Topics Covered Review Collision-Resistant Hash Functions

More information

On Nonpermutational Transformation Semigroups with an Application to Syntactic Complexity

On Nonpermutational Transformation Semigroups with an Application to Syntactic Complexity Acta Cybernetica 22 (2016) 687 701. On Nonpermutational Transormation Semiroups with an Application to Syntactic Complexity Szabolcs Iván and Judit Nay-Györy Abstract We ive an upper bound o n((n 1)! (n

More information

Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2 Prepared by, Dr. Subhendu Kumar Rath, BPUT, Odisha. UNIT 2 Structure NON-DETERMINISTIC FINITE AUTOMATA

More information

Digital Electronics Paper-EE-204-F SECTION-A

Digital Electronics Paper-EE-204-F SECTION-A B.Tech 4 th Semester (AEIE) F Scheme, May 24 Diital Electronics Paper-EE-24-F Note : Attempt five questions. Question is compulsory and one question from each of the four sections.. What is a loic ate?

More information

Parametric Equations

Parametric Equations Parametric Equations Suppose a cricket jumps off of the round with an initial velocity v 0 at an anle θ. If we take his initial position as the oriin, his horizontal and vertical positions follow the equations:

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

Foundations of Machine Learning and Data Science. Lecturer: Avrim Blum Lecture 9: October 7, 2015

Foundations of Machine Learning and Data Science. Lecturer: Avrim Blum Lecture 9: October 7, 2015 10-806 Foundations of Machine Learning and Data Science Lecturer: Avrim Blum Lecture 9: October 7, 2015 1 Computational Hardness of Learning Today we will talk about some computational hardness results

More information

Lecture 20: conp and Friends, Oracles in Complexity Theory

Lecture 20: conp and Friends, Oracles in Complexity Theory 6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:

More information

SOLUTION: SOLUTION: SOLUTION:

SOLUTION: SOLUTION: SOLUTION: Convert R and S into nondeterministic finite automata N1 and N2. Given a string s, if we know the states N1 and N2 may reach when s[1...i] has been read, we are able to derive the states N1 and N2 may

More information

PSPACE COMPLETENESS TBQF. THURSDAY April 17

PSPACE COMPLETENESS TBQF. THURSDAY April 17 PSPACE COMPLETENESS TBQF THURSDAY April 17 Definition: Language B is PSPACE-complete if: 1. B PSPACE 2. Every A in PSPACE is poly-time reducible to B (i.e. B is PSPACE-hard) QUANTIFIED BOOLEAN FORMULAS

More information

NP-Completeness Review

NP-Completeness Review CS124 NP-Completeness Review Where We Are Headed Up to this point, we have generally assumed that if we were given a problem, we could find a way to solve it. Unfortunately, as most of you know, there

More information

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On

More information

Comparison of several polynomial and exponential time complexity functions. Size n

Comparison of several polynomial and exponential time complexity functions. Size n Comparison of several polynomial and exponential time complexity functions Time complexity function n n 2 n 3 n 5 2 n 3 n Size n 10 20 30 40 50 60.00001.00002.00003.00004.00005.00006 second second second

More information

Central Limit Theorems and Proofs

Central Limit Theorems and Proofs Math/Stat 394, Winter 0 F.W. Scholz Central Limit Theorems and Proos The ollowin ives a sel-contained treatment o the central limit theorem (CLT). It is based on Lindeber s (9) method. To state the CLT

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

1 Cryptographic hash functions

1 Cryptographic hash functions CSCI 5440: Cryptography Lecture 6 The Chinese University of Hong Kong 24 October 2012 1 Cryptographic hash functions Last time we saw a construction of message authentication codes (MACs) for fixed-length

More information

Pseudorandom Generators for Regular Branching Programs

Pseudorandom Generators for Regular Branching Programs Pseudorandom Generators for Regular Branching Programs Mark Braverman Anup Rao Ran Raz Amir Yehudayoff Abstract We give new pseudorandom generators for regular read-once branching programs of small width.

More information

INAPPROX APPROX PTAS. FPTAS Knapsack P

INAPPROX APPROX PTAS. FPTAS Knapsack P CMPSCI 61: Recall From Last Time Lecture 22 Clique TSP INAPPROX exists P approx alg for no ε < 1 VertexCover MAX SAT APPROX TSP some but not all ε< 1 PTAS all ε < 1 ETSP FPTAS Knapsack P poly in n, 1/ε

More information

Announcements. Problem Set 6 due next Monday, February 25, at 12:50PM. Midterm graded, will be returned at end of lecture.

Announcements. Problem Set 6 due next Monday, February 25, at 12:50PM. Midterm graded, will be returned at end of lecture. Turing Machines Hello Hello Condensed Slide Slide Readers! Readers! This This lecture lecture is is almost almost entirely entirely animations that that show show how how each each Turing Turing machine

More information

Boundary value problems - an introduction

Boundary value problems - an introduction Boundary value problems - an introduction Up till now, we ve been worryin about initial value problems in DEs. Also quite common, and enerally much more difficult, are boundary value problems. One oriin

More information

A Probabilistic Analysis of Propositional STRIPS. Planning. Tom Bylander. Division of Mathematics, Computer Science, and Statistics

A Probabilistic Analysis of Propositional STRIPS. Planning. Tom Bylander. Division of Mathematics, Computer Science, and Statistics A Probabilistic Analysis of Propositional STRIPS Plannin Tom Bylander Division of Mathematics, Computer Science, and Statistics The University of Texas at San Antonio San Antonio, Texas 78249 USA bylander@riner.cs.utsa.edu

More information

Chapter 5: Integer Compositions and Partitions and Set Partitions

Chapter 5: Integer Compositions and Partitions and Set Partitions Chapter 5: Integer Compositions and Partitions and Set Partitions Prof. Tesler Math 184A Winter 2017 Prof. Tesler Ch. 5: Compositions and Partitions Math 184A / Winter 2017 1 / 32 5.1. Compositions A strict

More information

Lecture 4: Two-point Sampling, Coupon Collector s problem

Lecture 4: Two-point Sampling, Coupon Collector s problem Randomized Algorithms Lecture 4: Two-point Sampling, Coupon Collector s problem Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized Algorithms

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

Boolean circuits. Lecture Definitions

Boolean circuits. Lecture Definitions Lecture 20 Boolean circuits In this lecture we will discuss the Boolean circuit model of computation and its connection to the Turing machine model. Although the Boolean circuit model is fundamentally

More information

Lecture 5: Random Walks and Markov Chain

Lecture 5: Random Walks and Markov Chain Spectral Graph Theory and Applications WS 20/202 Lecture 5: Random Walks and Markov Chain Lecturer: Thomas Sauerwald & He Sun Introduction to Markov Chains Definition 5.. A sequence of random variables

More information

Balls and Bins: Smaller Hash Families and Faster Evaluation

Balls and Bins: Smaller Hash Families and Faster Evaluation Balls and Bins: Smaller Hash Families and Faster Evaluation L. Elisa Celis Omer Reingold Gil Segev Udi Wieder May 1, 2013 Abstract A fundamental fact in the analysis of randomized algorithms is that when

More information

15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete

15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete CS125 Lecture 15 Fall 2016 15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete Already know SAT NP, so only need to show SAT is NP-hard. Let L be any language in NP. Let M be a NTM that decides L

More information

Lecture 7: The Polynomial-Time Hierarchy. 1 Nondeterministic Space is Closed under Complement

Lecture 7: The Polynomial-Time Hierarchy. 1 Nondeterministic Space is Closed under Complement CS 710: Complexity Theory 9/29/2011 Lecture 7: The Polynomial-Time Hierarchy Instructor: Dieter van Melkebeek Scribe: Xi Wu In this lecture we first finish the discussion of space-bounded nondeterminism

More information

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover Grant Schoenebeck Luca Trevisan Madhur Tulsiani Abstract We study semidefinite programming relaxations of Vertex Cover arising

More information

(a) 1m s -2 (b) 2 m s -2 (c) zero (d) -1 m s -2

(a) 1m s -2 (b) 2 m s -2 (c) zero (d) -1 m s -2 11 th Physics - Unit 2 Kinematics Solutions for the Textbook Problems One Marks 1. Which one of the followin Cartesian coordinate system is not followed in physics? 5. If a particle has neative velocity

More information

Computable Functions

Computable Functions Computable Functions Part I: Non Computable Functions Computable and Partially Computable Functions Computable Function Exists a Turing Machine M -- M Halts on All Input -- M(x) = f (x) Partially Computable

More information

CS151 Complexity Theory

CS151 Complexity Theory Introduction CS151 Complexity Theory Lecture 5 April 13, 2004 Power from an unexpected source? we know PEXP, which implies no polytime algorithm for Succinct CVAL poly-size Boolean circuits for Succinct

More information

Notes on Space-Bounded Complexity

Notes on Space-Bounded Complexity U.C. Berkeley CS172: Automata, Computability and Complexity Handout 6 Professor Luca Trevisan 4/13/2004 Notes on Space-Bounded Complexity These are notes for CS278, Computational Complexity, scribed by

More information

Chapter 5: Integer Compositions and Partitions and Set Partitions

Chapter 5: Integer Compositions and Partitions and Set Partitions Chapter 5: Integer Compositions and Partitions and Set Partitions Prof. Tesler Math 184A Fall 2017 Prof. Tesler Ch. 5: Compositions and Partitions Math 184A / Fall 2017 1 / 46 5.1. Compositions A strict

More information

Balls and Bins: Smaller Hash Families and Faster Evaluation

Balls and Bins: Smaller Hash Families and Faster Evaluation Balls and Bins: Smaller Hash Families and Faster Evaluation L. Elisa Celis Omer Reingold Gil Segev Udi Wieder April 22, 2011 Abstract A fundamental fact in the analysis of randomized algorithm is that

More information

On Recycling the Randomness of the States in Space Bounded Computation

On Recycling the Randomness of the States in Space Bounded Computation On Recycling the Randomness of the States in Space Bounded Computation Preliminary Version Ran Raz Omer Reingold Abstract Let M be a logarithmic space Turing machine (or a polynomial width branching program)

More information

1 Adjacency matrix and eigenvalues

1 Adjacency matrix and eigenvalues CSC 5170: Theory of Computational Complexity Lecture 7 The Chinese University of Hong Kong 1 March 2010 Our objective of study today is the random walk algorithm for deciding if two vertices in an undirected

More information