Lecture 8: Pesudorandom Generators (II) 1 Pseudorandom Generators for Bounded Computation
|
|
- Valerie Wheeler
- 5 years ago
- Views:
Transcription
1 Expander Graphs in Computer Science WS 2010/2011 Lecture 8: Pesudorandom Generators (II) Lecturer: He Sun 1 Pseudorandom Generators for Bounded Computation Definition 8.1 Let M be a randomized TM that on input w requires l( w ) random bits. The family { n } n=1 of functions ( n : {0, 1} s(n) {0, 1} l(n) ) is an ε enerator for M if for any w {0, 1}, it holds that ( Pr M(w, r) = 1] Pr M w, w (z) ) = 1 ] < ε r {0,1} l( w ) z {0,1} s( w ) Instead of a family of functions, it is more convenient to view, the ε enerator for M as a TM that on input a strin of lenth s(n) outputs a strin of lenth l(n). We call w the seed of the PG. 2 andomized Lospace TM In this lecture, we present a PG that fools all randomized lospace TMs. Before proceedin any further, we have to clarify a point reardin how the random bits are accessed in a randomized space bounded computation (lospace in our case). There are two varyin definitions of randomized space bounded TMs based on the manner the random bits are accessed: The TM obtains the random bits as and when required by it. The strin of random bits is fed as an auxiliary off-line input (on a separate tape) in addition to the reular input to the TM. In this case, the head accessin the random bits on this tape can move back and forth on the tape. It is to be noted that in the case of randomized time bounded computation it is immaterial which convention we observe. For randomized space bounded computation, we consider only TMs of the first kind or equivalently consider TMs of the second kind in which the head on the random tape is restricted in the sense that it can only move riht alon the tape (i. e., the random tape is one-way read-only tape). We also assume that all randomized space S TMs halt in time less than 2 S. 3 Nisan s Generators The main task of this lecture is to construct the followin PG. 1
2 2 Lecture 8: Pesudorandom Generators (II) 2 Lecture 8: Pesudorandom Generators (II) 3 Nisan s Generators Theorem 8.2 There exists an n-space-bounded TM G : {0, 1} O(lo2 m) {0, 1} m such that for Theorem all randomized 8.2 There S-space-bounded exists a SPACE(n) TM M, TM G is G, ag 2 S : {0, -enerator 1} O(lo2 m) for M, {0, 1} where m such m that = 2 S forand n = all O(lo randomized 2 m). lospace TM M, G is a 1 n enerator for M.1 Before discussin the space-bounded PGs, let us look at the structure of computation tableaubefore of a randomized discussin the TM. space-bounded For an S space-bounded PGs, we studytm them, structure the of computation tableau of M consists of a randomized of at most TM. 2 S rows For aand space each S-bounded row corresponds TM M, the tocomputation a confiuration tableau of M, of Masconsists shown in Fiure of at 1. most 2 S rows and each row corresponds to a confiuration of M, as shown in 1. S 2 S andom bits Fiure 1: The computation tableau of a space S-bounded TM Fiure 1: The computation tableau of a space S-bounded TM By the definition of randomized TM, each step of M s processin requires one random By the definition of randomized TMs, each step of M s processin bit and the number of random bits required for is at most 2 S requires one random. For simplicity we assume bit and that the M requires number 2 S of random random bits. bits Consider required the for tableau M is at divided most into 2 S. two For simplicity with each we assume half thatrequirin the runnin random time strins of Mr 1 isand 2 S. r 2 Consider respectively theeach tableau of lenth divided r = into 2 S /2. two If rhalves 1 and r 2 with are chosen each half requirin independently, random then strins by rdefinition 1 and r 2 the respectively randomized each TMofcan lenth output r = the 2 S correct /2. If ranswer. 1 and r 2 However, are chosen independently, we would like then to choose by definition r 1 and Mr 2 in cansuch output a manner the correct that their answer. behavior However, is not sinificantly we would like to choose different r 1 from and the r 2 incase such when a manner they arethat chosen their independently. behavior is not sinificantly different from the case when To put theythins are chosen more formally, independently. we have 2 alorithms A 1 and such that Formally, we assume that A 1 and are the upper and lower halves respectively of the computation tableau of M and x 1 We shall infact prove a more eneral 1 and x result 2 are independently chosen random strins, see Fiure 2. that for all randomized space S TM M, G is a 1 enerator for 2 Moreover, S M. alorithms A 1 and are of the followin form: Alorithm A 1 takes an input x 1 of lenth r and outputs a strin b 1 of lenth c. Alorithm takes as input the output b 1 of A 1 and another strin x 2 of lenth r and outputs a strin b 2 of lenth c.
3 Lecture 8: Pesudorandom Generators (II) 3 A 1 x 1 b 1 x 2 b 2 Fiure 2: A 1, with random inputs What we are in search of is a enerator that supplies strins x 1 and x 2 in a fashion better than choosin them independently. For notational brevity, iven a function, we use l (z) and r (z) to express the left half and the riht half of the strin (z), i. e., (z) = l (z) r (z) and l (z) = r (z). See Fiure 3. A 1 l (z) b 1 r (z) b 2 Fiure 3: A 1, with inputs from enerator Definition 8.3 A function : {0, 1} t {0, 1} r {0, 1} r is defined to be a ε-enerator for communication c if for all functions A 1 : {0, 1} r {0, 1} c and : {0, 1} c {0, 1} r {0, 1} c, we have that b Pr (A 1 (x 1 ), x 2 ) = b] Pr (A 1 ( l (z)), r (z)) = b] < ε. x 1,x 2 {0,1} r z {0,1} t For simplicity, we call a 2 c -enerator for communication c a c-enerator. For the present we shall assume the followin lemma hold and use expanders to prove this lemma in the end of the lecture. Lemma 8.4 There exists a constant k > 0 such that for all r, c, there exists a polynomial time computable c-enerator of the form : {0, 1} r+kc {0, 1} r {0, 1} r. Now we break the tableau into several components, called A 1,,, S, and let the output of be the random strins for every pair of consecutive components (i 1 and i ) such that their behavior is not sinificantly different from usin pure random bits, see Fiure 4. Moreover, we hope that every application of causes error at most 1/2 2S. Because we invoke at most 2 S 1 times, so the total error is at most 2 S 1 1/2 2S. Notice that in the above framework there are 2 S 1 components each of which require +ks random bits. We use the same approach to reduce the number of random bits required by every
4 4 Lecture 8: Pesudorandom Generators (II) A 1 + ks A 3 + ks A 4 S 1 + ks S Fiure 4: The first level of the recursive construction A ks 2 A ks A 4 S + S 2 + ks 2 S ks S Fiure 5: ecursive construction of G S pair of components from + ks each to + 2kS total. We perform this operation recursively till there is only one component left. See Fiure 5. Formally let i : {0, 1} +iks {0, 1} +(i 1)kS {0, 1} +(i 1)kS be an S-enerator for i = 1,, S. Define G i : {0, 1} +iks {0, 1} 2i inductively as follows: G i (z) = { z i = 0 G i 1 ( l i (z) ) G i 1 ( r i (z)) i > 0 Lemma 8.5 The PG G S runs in space O ( + ks 2). Lemma 8.6 For all space S-bounded TM M, G S is a 2 S -enerator for M. Proof: Since each application of i incurs an error of at most 1/2 2S, and there are 2 S S = 2 S 1 applications of i, therefore by the union bound the error probability is at most (2 S 1)/2 2S 1/2 S.
5 Lecture 8: Pesudorandom Generators (II) 5 4 Proof of Lemma 8.4 Lemma 8.7 Let G = (V, E) be a d-reular raph with spectral expansion λ. subsets S, T V we have E(S, T ) S E V T V λ S V T V. Then for any Proof: Apply the Expander Mixin Lemma on the double coverin of G. Now we prove Lemma 8.4. Proof: Let G = (V, E) be a d = 2 6c -reular amanujan expander on V = 2 r vertices. The enerator : {0, 1} r+6c {0, 1} r {0, 1} r works as follows: On input z = (x, i) {0, 1} r {0, 1} d, output ( l (z), r (z) ) = (x, y) where y is the vertex reached by takin the i-th ede out of x. Let b be any output of the alorithms (A 1, ). Fix b. For any b {0, 1} c, define S b = { x {0, 1} r A 1 (x) = b }, T b = { x {0, 1} r (b, x) = b }. Thus for truly random strins x 1 and x 2, the probability that alorithms (A 1, ) outputs b is expressed by Pr (A 1 (x 1 ), x 2 ) = b] = Prx 1 S b x 2 T b ] x 1,x 2 = S b V T b V. On the other hand, when usin the output of to instead truly random bits, the probability that (A 1, ) outputs b becomes ] Pr (A 1 ( l (z)), r (z)) = b = Pr x S b z {0,1} r+d x,i ith ede out of x leads to T b ] Therefore = E(S b, T b ). E Pr (A 1 (x 1 ), x 2 ) = b] Pr (A 1 ( l (z)), r (z)) = b] x 1,x 2 z {0,1} r+d ( = Sb V T b V E(S b, T b ) ) E b {0,1} c S b V T b V E(S b, T b ) E. Because S b and T b are subsets of V, by Lemma 8.7 we know that S b V T b V E(S b, T b ) E λ S b V T b λ, V
6 6 Lecture 8: Pesudorandom Generators (II) where λ is the spectral expansion of G and satisfies λ 2 d 1/d. Therefore Pr (A 1 (x 1 ), x 2 ) = b] Pr (A 1 ( l (z)), r (z)) = b] x 1,x 2 z {0,1} r+d λ 2 d 1 d <2 c 1 2 c c
Pseudorandom Generators
8 Pseudorandom Generators Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 andomness is one of the fundamental computational resources and appears everywhere. In computer science,
More informationNotes on Complexity Theory Last updated: December, Lecture 27
Notes on Complexity Theory Last updated: December, 2011 Jonathan Katz Lecture 27 1 Space-Bounded Derandomization We now discuss derandomization of space-bounded algorithms. Here non-trivial results can
More informationPRGs for space-bounded computation: INW, Nisan
0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,
More informationCS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5
UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look
More informationLecture 3: Randomness in Computation
Great Ideas in Theoretical Computer Science Summer 2013 Lecture 3: Randomness in Computation Lecturer: Kurt Mehlhorn & He Sun Randomness is one of basic resources and appears everywhere. In computer science,
More information198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007
198:538 Complexity of Computation Lecture 16 Rutgers University, Spring 2007 8 March 2007 In this lecture we discuss Shamir s theorem that PSPACE is the set of languages that have interactive proofs with
More informationHandout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.
Notes on Complexity Theory Last updated: October, 2005 Jonathan Katz Handout 5 1 An Improved Upper-Bound on Circuit Size Here we show the result promised in the previous lecture regarding an upper-bound
More informationCSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits
CSE 200 Lecture Notes Turing machine vs. RAM machine vs. circuits Chris Calabro January 13, 2016 1 RAM model There are many possible, roughly equivalent RAM models. Below we will define one in the fashion
More informationMatrix multiplication: a group-theoretic approach
CSG399: Gems of Theoretical Computer Science. Lec. 21-23. Mar. 27-Apr. 3, 2009. Instructor: Emanuele Viola Scribe: Ravi Sundaram Matrix multiplication: a roup-theoretic approach Given two n n matrices
More informationPSRGs via Random Walks on Graphs
Spectral Graph Theory Lecture 9 PSRGs via Random Walks on Graphs Daniel A. Spielman September 30, 2009 9.1 Overview There has been a lot of work on the design of Pseudo-Random Number Generators (PSRGs)
More informationLecture 14: Recursive Languages
Lecture 14: Recursive Languages Instructor: Ketan Mulmuley Scriber: Yuan Li February 24, 2015 1 Recursive Languages Definition 1.1. A language L Σ is called recursively enumerable (r. e.) or computably
More informationPHY 133 Lab 1 - The Pendulum
3/20/2017 PHY 133 Lab 1 The Pendulum [Stony Brook Physics Laboratory Manuals] Stony Brook Physics Laboratory Manuals PHY 133 Lab 1 - The Pendulum The purpose of this lab is to measure the period of a simple
More informationLP Rounding and Combinatorial Algorithms for Minimizing Active and Busy Time
LP Roundin and Combinatorial Alorithms for Minimizin Active and Busy Time Jessica Chan, Samir Khuller, and Koyel Mukherjee University of Maryland, Collee Park {jschan,samir,koyelm}@cs.umd.edu Abstract.
More informationLecture 7: ɛ-biased and almost k-wise independent spaces
Lecture 7: ɛ-biased and almost k-wise independent spaces Topics in Complexity Theory and Pseudorandomness (pring 203) Rutgers University wastik Kopparty cribes: Ben Lund, Tim Naumovitz Today we will see
More information15-855: Intensive Intro to Complexity Theory Spring Lecture 16: Nisan s PRG for small space
15-855: Intensive Intro to Complexity Theory Spring 2009 Lecture 16: Nisan s PRG for small space For the next few lectures we will study derandomization. In algorithms classes one often sees clever randomized
More informationRandomized Time Space Tradeoffs for Directed Graph Connectivity
Randomized Time Space Tradeoffs for Directed Graph Connectivity Parikshit Gopalan, Richard Lipton, and Aranyak Mehta College of Computing, Georgia Institute of Technology, Atlanta GA 30309, USA. Email:
More informationJournal of Inequalities in Pure and Applied Mathematics
Journal of Inequalities in Pure and Applied Mathematics L HOSPITAL TYPE RULES FOR OSCILLATION, WITH APPLICATIONS IOSIF PINELIS Department of Mathematical Sciences, Michian Technoloical University, Houhton,
More informationCSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010
CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes
More information6.841/18.405J: Advanced Complexity Wednesday, February 12, Lecture Lecture 3
6.841/18.405J: Advanced Complexity Wednesday, February 12, 2003 Lecture Lecture 3 Instructor: Madhu Sudan Scribe: Bobby Kleinberg 1 The language MinDNF At the end of the last lecture, we introduced the
More informationCSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds
CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching
More informationCS151 Complexity Theory. Lecture 9 May 1, 2017
CS151 Complexity Theory Lecture 9 Hardness vs. randomness We have shown: If one-way permutations exist then BPP δ>0 TIME(2 nδ ) ( EXP simulation is better than brute force, but just barely stronger assumptions
More informationCSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010
CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 Recall the definition of probabilistically checkable proofs (PCP) from last time. We say L has
More informationLecture 22: PSPACE
6.045 Lecture 22: PSPACE 1 VOTE VOTE VOTE For your favorite course on automata and complexity Please complete the online subject evaluation for 6.045 2 Final Exam Information Who: You On What: Everything
More informationLecture 3 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;
Topics in Theoretical Computer Science March 7, 2016 Lecturer: Ola Svensson Lecture 3 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationLecture 6: Oracle TMs, Diagonalization Limits, Space Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 6: Oracle TMs, Diagonalization Limits, Space Complexity January 22, 2016 Lecturer: Paul Beame Scribe: Paul Beame Diagonalization enabled us to separate
More informationLecture 24: Randomized Complexity, Course Summary
6.045 Lecture 24: Randomized Complexity, Course Summary 1 1/4 1/16 1/4 1/4 1/32 1/16 1/32 Probabilistic TMs 1/16 A probabilistic TM M is a nondeterministic TM where: Each nondeterministic step is called
More information1 CHAPTER 7 PROJECTILES. 7.1 No Air Resistance
CHAPTER 7 PROJECTILES 7 No Air Resistance We suppose that a particle is projected from a point O at the oriin of a coordinate system, the y-axis bein vertical and the x-axis directed alon the round The
More informationIITM-CS6845: Theory Toolkit February 3, 2012
IITM-CS6845: Theory Toolkit February 3, 2012 Lecture 4 : Derandomizing the logspace algorithm for s-t connectivity Lecturer: N S Narayanaswamy Scribe: Mrinal Kumar Lecture Plan:In this lecture, we will
More informationCSCI3390-Lecture 16: NP-completeness
CSCI3390-Lecture 16: NP-completeness 1 Summary We recall the notion of polynomial-time reducibility. This is just like the reducibility we studied earlier, except that we require that the function mapping
More informationPSRGs via Random Walks on Graphs
Spectral Graph Theory Lecture 11 PSRGs via Random Walks on Graphs Daniel A. Spielman October 3, 2012 11.1 Overview There has been a lot of work on the design of Pseudo-Random Number Generators (PSRGs)
More informationEnergy-preserving affine connections
Enery-preservin affine connections Andrew D. Lewis 1997/07/28 Abstract A Riemannian affine connection on a Riemannian manifold has the property that is preserves the kinetic enery associated with the metric.
More informationPhysics 20 Lesson 24 Simple Harmonic Motion Pendulums
Physics 0 esson 4 Simple Harmonic Motion Pendulums Refer to Chapter 7 in Pearson for a discussion of simple harmonic motion. I. Simple Harmonic Motion A study of simple harmonic motion (SHM) will take
More information11.1 Set Cover ILP formulation of set cover Deterministic rounding
CS787: Advanced Algorithms Lecture 11: Randomized Rounding, Concentration Bounds In this lecture we will see some more examples of approximation algorithms based on LP relaxations. This time we will use
More informationOn the Chromatic Art Gallery Problem
CCCG 2014, Halifax, Nova Scotia, Auust 11 13, 2014 On the Chromatic Art Gallery Problem Sándor P. Fekete Stephan Friedrichs Michael Hemmer Joseph B. M. Mitchell Christiane Schmidt Abstract For a polyonal
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170
UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, 2003 Notes 22 for CS 170 1 NP-completeness of Circuit-SAT We will prove that the circuit satisfiability
More informationUndirected ST-Connectivity in Log-Space. Omer Reingold. Presented by: Thang N. Dinh CISE, University of Florida, Fall, 2010
Undirected ST-Connectivity in Log-Space Omer Reingold Presented by: Thang N. Dinh CISE, University of Florida, Fall, 2010 Undirected s-t connectivity(ustcon) Is t reachable from s in a undirected graph
More informationExperiment 1: Simple Pendulum
COMSATS Institute of Information Technoloy, Islamabad Campus PHY-108 : Physics Lab 1 (Mechanics of Particles) Experiment 1: Simple Pendulum A simple pendulum consists of a small object (known as the bob)
More information6.842 Randomness and Computation Lecture 5
6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its
More informationLecture 04: Balls and Bins: Birthday Paradox. Birthday Paradox
Lecture 04: Balls and Bins: Overview In today s lecture we will start our study of balls-and-bins problems We shall consider a fundamental problem known as the Recall: Inequalities I Lemma Before we begin,
More informationLecture 20: PSPACE. November 15, 2016 CS 1010 Theory of Computation
Lecture 20: PSPACE November 15, 2016 CS 1010 Theory of Computation Recall that PSPACE = k=1 SPACE(nk ). We will see that a relationship between time and space complexity is given by: P NP PSPACE = NPSPACE
More informationU.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 9/6/2004. Notes for Lecture 3
U.C. Berkeley CS278: Computational Complexity Handout N3 Professor Luca Trevisan 9/6/2004 Notes for Lecture 3 Revised 10/6/04 1 Space-Bounded Complexity Classes A machine solves a problem using space s(
More informationTail Inequalities Randomized Algorithms. Sariel Har-Peled. December 20, 2002
Tail Inequalities 497 - Randomized Algorithms Sariel Har-Peled December 0, 00 Wir mssen wissen, wir werden wissen (We must know, we shall know) David Hilbert 1 Tail Inequalities 1.1 The Chernoff Bound
More informationMidterm II : Formal Languages, Automata, and Computability
Midterm II 15-453: Formal Languages, Automata, and Computability Lenore Blum, Asa Frank, Aashish Jindia, and Andrew Smith April 8, 2014 Instructions: 1. Once the exam begins, write your name on each sheet.
More informationNP-Completeness. A language B is NP-complete iff B NP. This property means B is NP hard
NP-Completeness A language B is NP-complete iff B NP A NP A P B This property means B is NP hard 1 3SAT is NP-complete 2 Result Idea: B is known to be NP complete Use it to prove NP-Completeness of C IF
More informationc 2006 Society for Industrial and Applied Mathematics
SIAM J. DISCRETE MATH. Vol. 20, No. 3, pp. 603 609 c 2006 Society for Industrial Applied Mathematics CYCLE DECOMPOSITIONS OF K n,n I JUN MA, LIQUN PU, AND HAO SHEN Abstract. Let K n,n denote the complete
More informationCSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010
CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010 Computational complexity studies the amount of resources necessary to perform given computations.
More informationCS5371 Theory of Computation. Lecture 14: Computability V (Prove by Reduction)
CS5371 Theory of Computation Lecture 14: Computability V (Prove by Reduction) Objectives This lecture shows more undecidable languages Our proof is not based on diagonalization Instead, we reduce the problem
More informationWire antenna model of the vertical grounding electrode
Boundary Elements and Other Mesh Reduction Methods XXXV 13 Wire antenna model of the vertical roundin electrode D. Poljak & S. Sesnic University of Split, FESB, Split, Croatia Abstract A straiht wire antenna
More information2.2 Differentiation and Integration of Vector-Valued Functions
.. DIFFERENTIATION AND INTEGRATION OF VECTOR-VALUED FUNCTIONS133. Differentiation and Interation of Vector-Valued Functions Simply put, we differentiate and interate vector functions by differentiatin
More informationLecture 22: Derandomization Implies Circuit Lower Bounds
Advanced Complexity Theory Spring 2016 Lecture 22: Derandomization Implies Circuit Lower Bounds Prof. Dana Moshkovitz 1 Overview In the last lecture we saw a proof presented by Madhu Sudan that E SIZE(2
More informationCSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010
CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010 So far our notion of realistic computation has been completely deterministic: The Turing Machine
More informationIN this paper we investigate a propagative impact model. A propagative model of simultaneous impact: existence, uniqueness, and design consequences
1 A propaative model of simultaneous impact: existence, uniqueness, and desin consequences Vlad Sehete, Student Member, IEEE, Todd D. Murphey, Member, IEEE Abstract This paper presents existence and uniqueness
More informationComplexity (Pre Lecture)
Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What
More informationCS5371 Theory of Computation. Lecture 23: Complexity VIII (Space Complexity)
CS5371 Theory of Computation Lecture 23: Complexity VIII (Space Complexity) Objectives Introduce Space Complexity Savitch s Theorem The class PSPACE Space Complexity Definition [for DTM]: Let M be a DTM
More informationCS154, Lecture 17: conp, Oracles again, Space Complexity
CS154, Lecture 17: conp, Oracles again, Space Complexity Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode: Guess string
More informationLecture 5: Derandomization (Part II)
CS369E: Expanders May 1, 005 Lecture 5: Derandomization (Part II) Lecturer: Prahladh Harsha Scribe: Adam Barth Today we will use expanders to derandomize the algorithm for linearity test. Before presenting
More informationLecture 6: Random Walks versus Independent Sampling
Spectral Graph Theory and Applications WS 011/01 Lecture 6: Random Walks versus Independent Sampling Lecturer: Thomas Sauerwald & He Sun For many problems it is necessary to draw samples from some distribution
More information14.1 Finding frequent elements in stream
Chapter 14 Streaming Data Model 14.1 Finding frequent elements in stream A very useful statistics for many applications is to keep track of elements that occur more frequently. It can come in many flavours
More informationCOMPLEXITY THEORY. PSPACE = SPACE(n k ) k N. NPSPACE = NSPACE(n k ) 10/30/2012. Space Complexity: Savitch's Theorem and PSPACE- Completeness
15-455 COMPLEXITY THEORY Space Complexity: Savitch's Theorem and PSPACE- Completeness October 30,2012 MEASURING SPACE COMPLEXITY FINITE STATE CONTROL I N P U T 1 2 3 4 5 6 7 8 9 10 We measure space complexity
More informationSpace and Nondeterminism
CS 221 Computational Complexity, Lecture 5 Feb 6, 2018 Space and Nondeterminism Instructor: Madhu Sudan 1 Scribe: Yong Wook Kwon Topic Overview Today we ll talk about space and non-determinism. For some
More informationRelaxed Multiplication Using the Middle Product
Relaxed Multiplication Usin the Middle Product Joris van der Hoeven Département de Mathématiques (bât. 425) Université Paris-Sud 91405 Orsay Cedex France joris@texmacs.or ABSTRACT In previous work, we
More informationTheory of Computation
Theory of Computation Lecture #6 Sarmad Abbasi Virtual University Sarmad Abbasi (Virtual University) Theory of Computation 1 / 39 Lecture 6: Overview Prove the equivalence of enumerators and TMs. Dovetailing
More informationLecture 11: Hash Functions, Merkle-Damgaard, Random Oracle
CS 7880 Graduate Cryptography October 20, 2015 Lecture 11: Hash Functions, Merkle-Damgaard, Random Oracle Lecturer: Daniel Wichs Scribe: Tanay Mehta 1 Topics Covered Review Collision-Resistant Hash Functions
More informationOn Nonpermutational Transformation Semigroups with an Application to Syntactic Complexity
Acta Cybernetica 22 (2016) 687 701. On Nonpermutational Transormation Semiroups with an Application to Syntactic Complexity Szabolcs Iván and Judit Nay-Györy Abstract We ive an upper bound o n((n 1)! (n
More informationLecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2 Prepared by, Dr. Subhendu Kumar Rath, BPUT, Odisha. UNIT 2 Structure NON-DETERMINISTIC FINITE AUTOMATA
More informationDigital Electronics Paper-EE-204-F SECTION-A
B.Tech 4 th Semester (AEIE) F Scheme, May 24 Diital Electronics Paper-EE-24-F Note : Attempt five questions. Question is compulsory and one question from each of the four sections.. What is a loic ate?
More informationParametric Equations
Parametric Equations Suppose a cricket jumps off of the round with an initial velocity v 0 at an anle θ. If we take his initial position as the oriin, his horizontal and vertical positions follow the equations:
More informationClassical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems
Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive
More informationFoundations of Machine Learning and Data Science. Lecturer: Avrim Blum Lecture 9: October 7, 2015
10-806 Foundations of Machine Learning and Data Science Lecturer: Avrim Blum Lecture 9: October 7, 2015 1 Computational Hardness of Learning Today we will talk about some computational hardness results
More informationLecture 20: conp and Friends, Oracles in Complexity Theory
6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:
More informationSOLUTION: SOLUTION: SOLUTION:
Convert R and S into nondeterministic finite automata N1 and N2. Given a string s, if we know the states N1 and N2 may reach when s[1...i] has been read, we are able to derive the states N1 and N2 may
More informationPSPACE COMPLETENESS TBQF. THURSDAY April 17
PSPACE COMPLETENESS TBQF THURSDAY April 17 Definition: Language B is PSPACE-complete if: 1. B PSPACE 2. Every A in PSPACE is poly-time reducible to B (i.e. B is PSPACE-hard) QUANTIFIED BOOLEAN FORMULAS
More informationNP-Completeness Review
CS124 NP-Completeness Review Where We Are Headed Up to this point, we have generally assumed that if we were given a problem, we could find a way to solve it. Unfortunately, as most of you know, there
More informationCS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT
CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On
More informationComparison of several polynomial and exponential time complexity functions. Size n
Comparison of several polynomial and exponential time complexity functions Time complexity function n n 2 n 3 n 5 2 n 3 n Size n 10 20 30 40 50 60.00001.00002.00003.00004.00005.00006 second second second
More informationCentral Limit Theorems and Proofs
Math/Stat 394, Winter 0 F.W. Scholz Central Limit Theorems and Proos The ollowin ives a sel-contained treatment o the central limit theorem (CLT). It is based on Lindeber s (9) method. To state the CLT
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More information1 Cryptographic hash functions
CSCI 5440: Cryptography Lecture 6 The Chinese University of Hong Kong 24 October 2012 1 Cryptographic hash functions Last time we saw a construction of message authentication codes (MACs) for fixed-length
More informationPseudorandom Generators for Regular Branching Programs
Pseudorandom Generators for Regular Branching Programs Mark Braverman Anup Rao Ran Raz Amir Yehudayoff Abstract We give new pseudorandom generators for regular read-once branching programs of small width.
More informationINAPPROX APPROX PTAS. FPTAS Knapsack P
CMPSCI 61: Recall From Last Time Lecture 22 Clique TSP INAPPROX exists P approx alg for no ε < 1 VertexCover MAX SAT APPROX TSP some but not all ε< 1 PTAS all ε < 1 ETSP FPTAS Knapsack P poly in n, 1/ε
More informationAnnouncements. Problem Set 6 due next Monday, February 25, at 12:50PM. Midterm graded, will be returned at end of lecture.
Turing Machines Hello Hello Condensed Slide Slide Readers! Readers! This This lecture lecture is is almost almost entirely entirely animations that that show show how how each each Turing Turing machine
More informationBoundary value problems - an introduction
Boundary value problems - an introduction Up till now, we ve been worryin about initial value problems in DEs. Also quite common, and enerally much more difficult, are boundary value problems. One oriin
More informationA Probabilistic Analysis of Propositional STRIPS. Planning. Tom Bylander. Division of Mathematics, Computer Science, and Statistics
A Probabilistic Analysis of Propositional STRIPS Plannin Tom Bylander Division of Mathematics, Computer Science, and Statistics The University of Texas at San Antonio San Antonio, Texas 78249 USA bylander@riner.cs.utsa.edu
More informationChapter 5: Integer Compositions and Partitions and Set Partitions
Chapter 5: Integer Compositions and Partitions and Set Partitions Prof. Tesler Math 184A Winter 2017 Prof. Tesler Ch. 5: Compositions and Partitions Math 184A / Winter 2017 1 / 32 5.1. Compositions A strict
More informationLecture 4: Two-point Sampling, Coupon Collector s problem
Randomized Algorithms Lecture 4: Two-point Sampling, Coupon Collector s problem Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized Algorithms
More informationNondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic
More informationBoolean circuits. Lecture Definitions
Lecture 20 Boolean circuits In this lecture we will discuss the Boolean circuit model of computation and its connection to the Turing machine model. Although the Boolean circuit model is fundamentally
More informationLecture 5: Random Walks and Markov Chain
Spectral Graph Theory and Applications WS 20/202 Lecture 5: Random Walks and Markov Chain Lecturer: Thomas Sauerwald & He Sun Introduction to Markov Chains Definition 5.. A sequence of random variables
More informationBalls and Bins: Smaller Hash Families and Faster Evaluation
Balls and Bins: Smaller Hash Families and Faster Evaluation L. Elisa Celis Omer Reingold Gil Segev Udi Wieder May 1, 2013 Abstract A fundamental fact in the analysis of randomized algorithms is that when
More information15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete
CS125 Lecture 15 Fall 2016 15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete Already know SAT NP, so only need to show SAT is NP-hard. Let L be any language in NP. Let M be a NTM that decides L
More informationLecture 7: The Polynomial-Time Hierarchy. 1 Nondeterministic Space is Closed under Complement
CS 710: Complexity Theory 9/29/2011 Lecture 7: The Polynomial-Time Hierarchy Instructor: Dieter van Melkebeek Scribe: Xi Wu In this lecture we first finish the discussion of space-bounded nondeterminism
More informationA Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover
A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover Grant Schoenebeck Luca Trevisan Madhur Tulsiani Abstract We study semidefinite programming relaxations of Vertex Cover arising
More information(a) 1m s -2 (b) 2 m s -2 (c) zero (d) -1 m s -2
11 th Physics - Unit 2 Kinematics Solutions for the Textbook Problems One Marks 1. Which one of the followin Cartesian coordinate system is not followed in physics? 5. If a particle has neative velocity
More informationComputable Functions
Computable Functions Part I: Non Computable Functions Computable and Partially Computable Functions Computable Function Exists a Turing Machine M -- M Halts on All Input -- M(x) = f (x) Partially Computable
More informationCS151 Complexity Theory
Introduction CS151 Complexity Theory Lecture 5 April 13, 2004 Power from an unexpected source? we know PEXP, which implies no polytime algorithm for Succinct CVAL poly-size Boolean circuits for Succinct
More informationNotes on Space-Bounded Complexity
U.C. Berkeley CS172: Automata, Computability and Complexity Handout 6 Professor Luca Trevisan 4/13/2004 Notes on Space-Bounded Complexity These are notes for CS278, Computational Complexity, scribed by
More informationChapter 5: Integer Compositions and Partitions and Set Partitions
Chapter 5: Integer Compositions and Partitions and Set Partitions Prof. Tesler Math 184A Fall 2017 Prof. Tesler Ch. 5: Compositions and Partitions Math 184A / Fall 2017 1 / 46 5.1. Compositions A strict
More informationBalls and Bins: Smaller Hash Families and Faster Evaluation
Balls and Bins: Smaller Hash Families and Faster Evaluation L. Elisa Celis Omer Reingold Gil Segev Udi Wieder April 22, 2011 Abstract A fundamental fact in the analysis of randomized algorithm is that
More informationOn Recycling the Randomness of the States in Space Bounded Computation
On Recycling the Randomness of the States in Space Bounded Computation Preliminary Version Ran Raz Omer Reingold Abstract Let M be a logarithmic space Turing machine (or a polynomial width branching program)
More information1 Adjacency matrix and eigenvalues
CSC 5170: Theory of Computational Complexity Lecture 7 The Chinese University of Hong Kong 1 March 2010 Our objective of study today is the random walk algorithm for deciding if two vertices in an undirected
More information