Communication Lower Bounds via Critical Block Sensitivity
|
|
- Merilyn Payne
- 5 years ago
- Views:
Transcription
1 Communication Lower Bounds via Critical Block Sensitivity Mika Göös & Toniann Pitassi University of Toronto Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
2 Communication complexity? [Yao, STOC 79] Alice Bob Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
3 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
4 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Goal is to compute f (x, y) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
5 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Goal is to compute f (x, y) Example: f (x, y) = 1 iff x = y Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
6 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Comm. complexity of f is the least amount of communication required to compute f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
7 Resources % % % Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
8 Applications 1 Distributed computations (duh) 2 Combinatorics 3 Circuit complexity (KW games) 4 Proof complexity (+ SAT algorithms) 5 Time space tradeoffs for Turing machines 6 Extended formulations for LPs 7 Streaming algorithms 8 Property testing 9 Privacy 10 etc... Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
9 Applications 1 Distributed computations (duh) 2 Combinatorics 3 Circuit complexity (KW games) 4 Proof complexity (+ SAT algorithms) 5 Time space tradeoffs for Turing machines 6 Extended formulations for LPs 7 Streaming algorithms 8 Property testing 9 Privacy 10 etc... Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
10 Our results: Applications 1 Monotone circuit depth. We exhibit an explicit (i.e., in NP) monotone function on n variables whose monotone circuits require depth Ω(n/ log n); previous best Ω( n) by Raz & Wigderson (JACM 92) AND OR OR AND AND x 1 x 2 x 3 x 4 x 5 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
11 Our results: Applications 1 Monotone circuit depth. We exhibit an explicit (i.e., in NP) monotone function on n variables whose monotone circuits require depth Ω(n/ log n); previous best Ω( n) by Raz & Wigderson (JACM 92) We exhibit a function in monotone P with monotone depth Θ( n) These lower bounds hold even if the circuits are allowed to err = average-case hierarchy theorem of Filmus et al. (FOCS 13) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
12 Our results: Applications 1 Monotone circuit depth. We exhibit an explicit (i.e., in NP) monotone function on n variables whose monotone circuits require depth Ω(n/ log n); previous best Ω( n) by Raz & Wigderson (JACM 92) We exhibit a function in monotone P with monotone depth Θ( n) These lower bounds hold even if the circuits are allowed to err = average-case hierarchy theorem of Filmus et al. (FOCS 13) 2 Proof complexity. Rank and length space lower bounds for semi-algebraic proof systems, including Lovász Schrijver and Lasserre systems. This extends and simplifies Beame et al. (SICOMP 07) and Huynh and Nordström (STOC 12) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
13 Our results: Communication complexity 1 Starting point: Simple proof of the following theorem Huynh & Nordström (STOC 12) Let S be a search problem. The communication complexity of a certain two-party lift of S is at least the critical block sensitivity (cbs) of S. 2 New cbs lower bounds: Tseitin and Pebbling problems Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
14 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
15 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Critical block sensitivity (cbs) Let f S be a function solving S Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
16 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Critical block sensitivity (cbs) Let f S be a function solving S Let bs( f, α) be the block sensitivity of f at α bs( f, α) = max k such that there are disjoint blocks B 1,..., B k [n] with f (α) = f (α (B i) ) for all i [k] Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
17 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Critical block sensitivity (cbs) Let f S be a function solving S Let bs( f, α) be the block sensitivity of f at α cbs(s) := min f S max critical α bs( f, α) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
18 Lifted problems S α 1 α 2 α 3 α 4 α 5 How do we turn S {0, 1} n Q into a two-party communication problem? Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
19 Lifted problems S Compose with gn S α 1 α 2 α 3 α 4 α 5 g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Lifting: We consider a composed problem S g n where g : X Y {0, 1} is some small two-party function (called gadget ) Alice holds x X n Bob holds y Y n Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
20 Lower bounds via cbs S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
21 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
22 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
23 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Comparison with [Huynh & Nordström, 2012]: Slightly different gadgets We reduce from set-disjointness; [HN 12] use information theory Our proof generalises to multi-party models (NIH, NOF) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
24 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Proof... Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
25 Proof strategy Proof is by a reduction from set-disjointness: DISJ cbs S g n where DISJ m is defined as follows: Alice holds A [m] Bob holds B [m] Goal is to decide whether A B = It is known that DISJ m requires Θ(m) bits of communication (even randomised protocols) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
26 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
27 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
28 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = AND g (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
29 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
30 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Suppose S is a function with 2-sensitive input α = Flippability: g g Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
31 Reduction DISJ cbs S g n S What if S is a search problem? g g g g g g g How do we define f S? (0,0) (0,0) AND g AND g Protocol s output can depend on the encoding (x, y) of α = g n (x, y)! (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
32 Reduction DISJ cbs S g n S g g g g g g g (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Solution: Consider random encodings! Define f (α) to be the most likely solution output by the protocol on a random encoding of α Apply a random-selfreduction to map any particular encoding (x, y) of α = g n (x, y) into a random one Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
33 Reduction DISJ cbs S g n S g g g g g g g Random-self-reduction: (x, y) g 1 (z) (X, Y) R g 1 (z) (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
34 Proof complete! Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Note: Extension to multi-party setting uses random-selfreducible multi-party gadgets Next up: We need cbs lower bounds for interesting search problems Focus of this talk: Tseitin search problems Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
35 Tseitin contradictions Let G be a bounded-degree graph with an odd number of nodes Tseitin contradiction F G Variables: x e for each edge e Clauses: For each node v, x e 1 (mod 2) e:v e Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
36 Tseitin contradictions Let G be a bounded-degree graph with an odd number of nodes Tseitin contradiction F G Variables: x e for each edge e Clauses: For each node v, x e 1 (mod 2) e:v e Canonical search problem Input: Assignment to the variables of F G Output: Violated clause Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
37 Tseitin contradictions Let G be a bounded-degree graph with an odd number of nodes Tseitin contradiction F G Variables: x e for each edge e Clauses: For each node v, x e 1 (mod 2) e:v e Canonical search problem Input: Assignment to the variables of F G Output: Violated clause If G is an expander... Known: Deterministic query complexity Θ(n) [Urq 87] Randomised query complexity Ω(n 1/3 ) [LNNW 95] We prove: Critical block sensitivity Ω(n/ log n) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
38 Tseitin sensitivity κ-routability G is κ-routable iff there is a set of terminals T V(G), T = κ, such that for every pairing of the nodes of T there are edge-disjoint paths in G connecting every pair Example: κ = Θ(n/ log n) on an expander Theorem (Tseitin sensitivity) cbs(tseitin) = Ω(κ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
39 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem κ = 7 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
40 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Output of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
41 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Output of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
42 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Output of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
43 Tseitin sensitivity: Proof Output of f Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
44 Tseitin sensitivity: Proof Output of f Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Show that a random config is sensitive to Ω(κ) blocks in expectation! Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
45 Putting everything together Unsatisfiable CNF formula (Tseitin or Pebbling) Canonical search problem Thm: High critical block sensitivity Thm: High communication complexity for lifted problem High monotone circuit depth [KW 88], [RM 99], [FPRC 13] High proof complexity (rank & length space) [IPU 94], [BPS 07], [HN 12] Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
46 Open problem Conjecture There exists a two-party gadget g such that for all f : {0, 1} n {0, 1} Deterministic comm. complexity of f g n deterministic query complexity of f Randomised comm. complexity of f g n randomised query complexity of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
47 Open problem Conjecture There exists a two-party gadget g such that for all S {0, 1} n Q Deterministic comm. complexity of S g n deterministic query complexity of S Randomised comm. complexity of S g n randomised query complexity of S Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
48 Questions? Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18
Monotone Circuit Lower Bounds from Resolution
Monotone Circuit Lower Bounds from Resolution Ankit Garg Mika Göös Pritish Kamath Dmitry Sokolov MSR Harvard MIT KTH Mika Göös Monotone Circuits & Resolution 25th October 2017 1 / 22 Background: Query-to-communication
More informationClique vs. Independent Set
Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4 On page 6... Mika Göös (Univ. of Toronto) Clique vs.
More informationCS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015
CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many
More informationCS Communication Complexity: Applications and New Directions
CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the
More informationLecture 16: Communication Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity
More informationDag-like Communication and Its Applications
Electronic Colloquium on Computational Complexity, Report No. 202 (2016) Dag-like Communication and Its Applications Dmitry Sokolov December 19, 2016 Abstract In 1990 Karchmer and Widgerson considered
More informationMINI-TUTORIAL ON SEMI-ALGEBRAIC PROOF SYSTEMS. Albert Atserias Universitat Politècnica de Catalunya Barcelona
MINI-TUTORIAL ON SEMI-ALGEBRAIC PROOF SYSTEMS Albert Atserias Universitat Politècnica de Catalunya Barcelona Part I CONVEX POLYTOPES Convex polytopes as linear inequalities Polytope: P = {x R n : Ax b}
More informationLifting Nullstellensatz to Monotone Span Programs over Any Field
Lifting Nullstellensatz to Monotone Span Programs over Any Field Toniann Pitassi University of Toronto and the Institute for Advanced Study Toronto, Canada and Princeton, U.S.A. toni@cs.toronto.edu ABSTRACT
More informationSeparating Deterministic from Nondeterministic NOF Multiparty Communication Complexity
Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity (Extended Abstract) Paul Beame 1,, Matei David 2,, Toniann Pitassi 2,, and Philipp Woelfel 2, 1 University of Washington
More informationMonotone Circuits for Matching Require. Linear Depth
Monotone Circuits for Matching Require Linear Depth Ran Raz Avi Wigderson The Hebrew University February 11, 2003 Abstract We prove that monotone circuits computing the perfect matching function on n-vertex
More informationAlgebraic Problems in Computational Complexity
Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.
More informationAVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS. Robert Robere
AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS by Robert Robere A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Computer Science
More informationInformation Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017
Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels
More informationTime to learn about NP-completeness!
Time to learn about NP-completeness! Harvey Mudd College March 19, 2007 Languages A language is a set of strings Examples The language of strings of all zeros with odd length The language of strings with
More informationOn the Automatizability of Resolution and Related Propositional Proof Systems
On the Automatizability of Resolution and Related Propositional Proof Systems Albert Atserias and María Luisa Bonet Departament de Llenguatges i Sistemes Informàtics Universitat Politècnica de Catalunya
More informationOn the tightness of the Buhrman-Cleve-Wigderson simulation
On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,
More informationRegular Resolution Lower Bounds for the Weak Pigeonhole Principle
Regular Resolution Lower Bounds for the Weak Pigeonhole Principle Toniann Pitassi Department of Computer Science University of Toronto toni@cs.toronto.edu Ran Raz Department of Computer Science Weizmann
More informationBreaking the Rectangle Bound Barrier against Formula Size Lower Bounds
Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.
More informationThere are no zero-hard problems in multiparty communication complexity
There are no zero-hard problems in multiparty communication complexity László Babai and Denis Pankratov University of Chicago DRAFT: 2015-04-29 7:00pm Abstract We study the feasibility of generalizing
More informationUpper and Lower Bounds for Tree-like. Cutting Planes Proofs. Abstract. In this paper we study the complexity of Cutting Planes (CP) refutations, and
Upper and Lower Bounds for Tree-like Cutting Planes Proofs Russell Impagliazzo Toniann Pitassi y Alasdair Urquhart z UCSD UCSD and U. of Pittsburgh University of Toronto Abstract In this paper we study
More informationApproximation norms and duality for communication complexity lower bounds
Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased
More informationHardness of MST Construction
Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what
More informationLower Bound Techniques for Multiparty Communication Complexity
Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1 The multiparty number-in-hand
More informationNonnegative Rank vs. Binary Rank
CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 06, Article, pages 3 http://cjtcs.cs.uchicago.edu/ Nonnegative Rank vs. Binary Rank Thomas Watson Received February 3, 04; Revised August 5, 05, and on February
More informationNotes on Complexity Theory Last updated: October, Lecture 6
Notes on Complexity Theory Last updated: October, 2015 Lecture 6 Notes by Jonathan Katz, lightly edited by Dov Gordon 1 PSPACE and PSPACE-Completeness As in our previous study of N P, it is useful to identify
More informationCS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT
CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On
More information2 P vs. NP and Diagonalization
2 P vs NP and Diagonalization CS 6810 Theory of Computing, Fall 2012 Instructor: David Steurer (sc2392) Date: 08/28/2012 In this lecture, we cover the following topics: 1 3SAT is NP hard; 2 Time hierarchies;
More informationComplexity Classes V. More PCPs. Eric Rachlin
Complexity Classes V More PCPs Eric Rachlin 1 Recall from last time Nondeterminism is equivalent to having access to a certificate. If a valid certificate exists, the machine accepts. We see that problems
More informationComplexity. Complexity Theory Lecture 3. Decidability and Complexity. Complexity Classes
Complexity Theory 1 Complexity Theory 2 Complexity Theory Lecture 3 Complexity For any function f : IN IN, we say that a language L is in TIME(f(n)) if there is a machine M = (Q, Σ, s, δ), such that: L
More informationRandomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity
Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity László Babai Peter G. Kimmel Department of Computer Science The University of Chicago 1100 East 58th Street Chicago,
More informationRESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS
RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS RAN RAZ AND IDDO TZAMERET Abstract. We develop and study the complexity of propositional proof systems of varying strength extending resolution by
More informationTight Bounds for Distributed Streaming
Tight Bounds for Distributed Streaming (a.k.a., Distributed Functional Monitoring) David Woodruff IBM Research Almaden Qin Zhang MADALGO, Aarhus Univ. STOC 12 May 22, 2012 1-1 The distributed streaming
More informationMonotone Submodular Maximization over a Matroid
Monotone Submodular Maximization over a Matroid Yuval Filmus January 31, 2013 Abstract In this talk, we survey some recent results on monotone submodular maximization over a matroid. The survey does not
More informationAverage Case Lower Bounds for Monotone Switching Networks
Average Case Lower Bounds for Monotone Switching Networks Yuval Filmus, Toniann Pitassi, Robert Robere and Stephen A. Cook Department of Computer Science University of Toronto Toronto, Canada {yuvalf,
More informationComplexity of Finding a Duplicate in a Stream: Simple Open Problems
Complexity of Finding a Duplicate in a Stream: Simple Open Problems Jun Tarui Univ of Electro-Comm, Tokyo Shonan, Jan 2012 1 Duplicate Finding Problem Given: Stream a 1,,a m a i {1,,n} Assuming m > n,
More informationOrganization. Informal introduction and Overview Informal introductions to P,NP,co-NP and themes from and relationships with Proof complexity
15-16/08/2009 Nicola Galesi 1 Organization Informal introduction and Overview Informal introductions to P,NP,co-NP and themes from and relationships with Proof complexity First Steps in Proof Complexity
More informationNotes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction
U.C. Berkeley Handout N2 CS294: PCP and Hardness of Approximation January 23, 2006 Professor Luca Trevisan Scribe: Luca Trevisan Notes for Lecture 2 These notes are based on my survey paper [5]. L.T. Statement
More informationCommunication Lower Bounds via Query Complexity
Communication Lower Bounds via Query Complexity by Mika Göös A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy, Graduate Department of Computer Science, University
More informationResolution Lower Bounds for the Weak Pigeonhole Principle
Electronic Colloquium on Computational Complexity, Report No. 21 (2001) Resolution Lower Bounds for the Weak Pigeonhole Principle Ran Raz Weizmann Institute, and The Institute for Advanced Study ranraz@wisdom.weizmann.ac.il
More informationINSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES. A trade-off between length and width in resolution. Neil Thapen
INSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES A trade-off between length and width in resolution Neil Thapen Preprint No. 59-2015 PRAHA 2015 A trade-off between length and width in resolution
More informationMTAT Complexity Theory October 20th-21st, Lecture 7
MTAT.07.004 Complexity Theory October 20th-21st, 2011 Lecturer: Peeter Laud Lecture 7 Scribe(s): Riivo Talviste Polynomial hierarchy 1 Turing reducibility From the algorithmics course, we know the notion
More informationAsymmetric Communication Complexity and Data Structure Lower Bounds
Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey
More informationComplete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in
Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single
More informationSAT, Coloring, Hamiltonian Cycle, TSP
1 SAT, Coloring, Hamiltonian Cycle, TSP Slides by Carl Kingsford Apr. 28, 2014 Sects. 8.2, 8.7, 8.5 2 Boolean Formulas Boolean Formulas: Variables: x 1, x 2, x 3 (can be either true or false) Terms: t
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial
More informationThe Strength of Multilinear Proofs
The Strength of Multilinear Proofs Ran Raz Iddo Tzameret December 19, 2006 Abstract We introduce an algebraic proof system that manipulates multilinear arithmetic formulas. We show that this proof system
More informationPolynomial Identity Testing and Circuit Lower Bounds
Polynomial Identity Testing and Circuit Lower Bounds Robert Špalek, CWI based on papers by Nisan & Wigderson, 1994 Kabanets & Impagliazzo, 2003 1 Randomised algorithms For some problems (polynomial identity
More informationNotes for Lecture Notes 2
Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationAn Introduction to Proof Complexity, Part II.
An Introduction to Proof Complexity, Part II. Pavel Pudlák Mathematical Institute, Academy of Sciences, Prague and Charles University, Prague Computability in Europe 2009, Heidelberg 2 Overview Part I.
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationTowards an Understanding of Polynomial Calculus: New Separations and Lower Bounds
Towards an Understanding of Polynomial Calculus: New Separations and Lower Bounds Yuval Filmus University of Toronto Mladen Mikša KTH Royal Institute of Technology Massimo Lauria KTH Royal Institute of
More informationSOLUTION: SOLUTION: SOLUTION:
Convert R and S into nondeterministic finite automata N1 and N2. Given a string s, if we know the states N1 and N2 may reach when s[1...i] has been read, we are able to derive the states N1 and N2 may
More informationEdinburgh Research Explorer
Edinburgh Research Explorer On the power of the congested clique model Citation for published version: Drucker, A, Kuhn, F & Oshman, R 2014, On the power of the congested clique model. in ACM Symposium
More informationA Composition Theorem for Conical Juntas
A Composition Theorem for Conical Juntas Mika Göös T.S. Jayram University of Toronto IBM Almaden Göös and Jayram A composition theorem for conical juntas 29th May 2016 1 / 12 Motivation Randomised communication
More informationA.Antonopoulos 18/1/2010
Class DP Basic orems 18/1/2010 Class DP Basic orems 1 Class DP 2 Basic orems Class DP Basic orems TSP Versions 1 TSP (D) 2 EXACT TSP 3 TSP COST 4 TSP (1) P (2) P (3) P (4) DP Class Class DP Basic orems
More informationLower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,
Lower Bounds for Cutting Planes Proofs with Small Coecients Maria Bonet y Toniann Pitassi z Ran Raz x Abstract We consider small-weight Cutting Planes (CP ) proofs; that is, Cutting Planes (CP ) proofs
More informationCommunication Complexity
Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the
More informationSolution of Exercise Sheet 12
Complexity Theory (fall 2016) Solution of Exercise Sheet 12 Dominique Unruh Problem 1: Deterministic PCPs PCP stands for probabilistically checkable proofs. We will now show that the probabilistic part
More information1 Distributional problems
CSCI 5170: Computational Complexity Lecture 6 The Chinese University of Hong Kong, Spring 2016 23 February 2016 The theory of NP-completeness has been applied to explain why brute-force search is essentially
More informationNondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic
More informationCS151 Complexity Theory. Lecture 13 May 15, 2017
CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P
More informationDD2446 Complexity Theory: Problem Set 4
DD2446 Complexity Theory: Problem Set 4 Due: Friday November 8, 2013, at 23:59. Submit your solutions as a PDF le by e-mail to jakobn at kth dot se with the subject line Problem set 4: your full name.
More informationTime to learn about NP-completeness!
Time to learn about NP-completeness! Harvey Mudd College March 19, 2007 Languages A language is a set of strings Examples The language of strings of all a s with odd length The language of strings with
More informationProof Complexity Meets Algebra
ICALP 17, Warsaw 11th July 2017 (CSP problem) P 3-COL S resolution (proof system) Proofs in S of the fact that an instance of P is unsatisfiable. Resolution proofs of a graph being not 3-colorable. Standard
More informationCS21 Decidability and Tractability
CS21 Decidability and Tractability Lecture 20 February 23, 2018 February 23, 2018 CS21 Lecture 20 1 Outline the complexity class NP NP-complete probelems: Subset Sum NP-complete problems: NAE-3-SAT, max
More informationPCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation
More informationCSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds
CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching
More informationUmans Complexity Theory Lectures
Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q
More informationDistributed Statistical Estimation of Matrix Products with Applications
Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m
More informationAlgorithms as Lower Bounds
Algorithms as Lower Bounds Lecture 3 Part 1: Solving QBF and NC1 Lower Bounds (Joint work with Rahul Santhanam, U. Edinburgh) Part 2: Time-Space Tradeoffs for SAT Ryan Williams Stanford University Quantified
More information1 From previous lectures
CS 810: Introduction to Complexity Theory 9/18/2003 Lecture 11: P/poly, Sparse Sets, and Mahaney s Theorem Instructor: Jin-Yi Cai Scribe: Aparna Das, Scott Diehl, Giordano Fusco 1 From previous lectures
More informationIntro to Theory of Computation
Intro to Theory of Computation LECTURE 25 Last time Class NP Today Polynomial-time reductions Adam Smith; Sofya Raskhodnikova 4/18/2016 L25.1 The classes P and NP P is the class of languages decidable
More informationInformation Complexity vs. Communication Complexity: Hidden Layers Game
Information Complexity vs. Communication Complexity: Hidden Layers Game Jiahui Liu Final Project Presentation for Information Theory in TCS Introduction Review of IC vs CC Hidden Layers Game Upper Bound
More informationTight Size-Degree Lower Bounds for Sums-of-Squares Proofs
Tight Size-Degree Lower Bounds for Sums-of-Squares Proofs Massimo Lauria KTH Royal Institute of Technology (Stockholm) 1 st Computational Complexity Conference, 015 Portland! Joint work with Jakob Nordström
More information6.080 / Great Ideas in Theoretical Computer Science Spring 2008
MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Robert Špalek Google Direct product theorems: Why is Google interested? Direct product theorems: Why should Google be interested? Direct
More informationQuantum Communication Complexity
Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,
More informationProof Complexity of Quantified Boolean Formulas
Proof Complexity of Quantified Boolean Formulas Olaf Beyersdorff School of Computing, University of Leeds Olaf Beyersdorff Proof Complexity of Quantified Boolean Formulas 1 / 39 Proof complexity (in one
More informationTheory of Computation Chapter 9
0-0 Theory of Computation Chapter 9 Guan-Shieng Huang May 12, 2003 NP-completeness Problems NP: the class of languages decided by nondeterministic Turing machine in polynomial time NP-completeness: Cook
More informationNP-Completeness. Algorithmique Fall semester 2011/12
NP-Completeness Algorithmique Fall semester 2011/12 1 What is an Algorithm? We haven t really answered this question in this course. Informally, an algorithm is a step-by-step procedure for computing a
More informationOn the correlation of parity and small-depth circuits
Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract
More informationApproximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta
Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we
More informationarxiv: v3 [cs.cc] 28 Jun 2015
Parity Decision Tree Complexity and 4-Party Communication Complexity of XOR-functions Are Polynomially Equivalent arxiv:156.2936v3 [cs.cc] 28 Jun 215 Penghui Yao CWI, Amsterdam phyao1985@gmail.com September
More informationThe Polynomial Hierarchy
The Polynomial Hierarchy Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Motivation..synthesizing circuits is exceedingly difficulty. It is even
More informationHardness of Function Composition for Semantic Read once Branching Programs
Hardness of Function Composition for Semantic Read once Branching Programs Jeff Edmonds York University, 4700 Keele Street, Toronto, CANADA jeff@cse.yorku.ca http://www.cs.yorku.ca/ jeff/ Venkatesh Medabalimi
More informationLecture 16: Time Complexity and P vs NP
6.045 Lecture 16: Time Complexity and P vs NP 1 Time-Bounded Complexity Classes Definition: TIME(t(n)) = { L there is a Turing machine M with time complexity O(t(n)) so that L = L(M) } = { L L is a language
More informationA Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover
A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover Grant Schoenebeck Luca Trevisan Madhur Tulsiani Abstract We study semidefinite programming relaxations of Vertex Cover arising
More informationLecture 9: Polynomial-Time Hierarchy, Time-Space Tradeoffs
CSE 531: Computational Complexity I Winter 2016 Lecture 9: Polynomial-Time Hierarchy, Time-Space Tradeoffs Feb 3, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 The Polynomial-Time Hierarchy Last time
More informationarxiv: v1 [cs.cc] 26 Feb 2008
Separating NOF communication complexity classes RP and NP arxiv:08023860v1 cscc] 26 Feb 2008 Matei David Computer Science Department University of Toronto matei at cs toronto edu December 13, 2017 Abstract
More informationChallenge to L is not P Hypothesis by Analysing BP Lower Bounds
Challenge to L is not P Hypothesis by Analysing BP Lower Bounds Atsuki Nagao (The University of Electro-Communications) Joint work with Kazuo Iwama (Kyoto University) Self Introduction -2010 : Under graduate
More informationCurriculum Vitae of Mikhail Alekhnovich. Objective Faculty position in Theoretical Computer Science for Fall 2005
Curriculum Vitae of Mikhail Alekhnovich Citizenship: Russian Address: School of Mathematics Institute for Advanced Study Princeton, NJ 08540, US e-mail: misha@ias.edu For the up to date version visit http://www.math.ias.edu/~misha
More informationA Practical Universal Circuit Construction and Secure Evaluation of Private Functions
A Practical Universal Circuit Construction and, Bell Labs, Murray Hill, NJ, USA http://www.cs.toronto.edu/~vlad/, University of Erlangen-Nuremberg, Germany http://thomaschneider.de Financial Cryptography
More informationIntroduction to Advanced Results
Introduction to Advanced Results Master Informatique Université Paris 5 René Descartes 2016 Master Info. Complexity Advanced Results 1/26 Outline Boolean Hierarchy Probabilistic Complexity Parameterized
More informationChebyshev Polynomials, Approximate Degree, and Their Applications
Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can
More informationMultiparty Communication Complexity of Disjointness
Multiparty Communication Complexity of Disjointness Aradev Chattopadhyay and Anil Ada School of Computer Science McGill University, Montreal, Canada achatt3,aada@cs.mcgill.ca We obtain a lower bound of
More informationCS Foundations of Communication Complexity
CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for
More informationarxiv: v1 [cs.cc] 10 Aug 2007
RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS RAN RAZ AND IDDO TZAMERET arxiv:0708.1529v1 [cs.cc] 10 Aug 2007 Abstract. We develop and study the complexity of propositional proof systems of varying
More information