Communication Lower Bounds via Critical Block Sensitivity

Size: px
Start display at page:

Download "Communication Lower Bounds via Critical Block Sensitivity"

Transcription

1 Communication Lower Bounds via Critical Block Sensitivity Mika Göös & Toniann Pitassi University of Toronto Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

2 Communication complexity? [Yao, STOC 79] Alice Bob Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

3 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

4 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Goal is to compute f (x, y) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

5 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Goal is to compute f (x, y) Example: f (x, y) = 1 iff x = y Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

6 Communication complexity? [Yao, STOC 79] Alice x {0, 1} n Bob y {0, 1} n Comm. complexity of f is the least amount of communication required to compute f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

7 Resources % % % Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

8 Applications 1 Distributed computations (duh) 2 Combinatorics 3 Circuit complexity (KW games) 4 Proof complexity (+ SAT algorithms) 5 Time space tradeoffs for Turing machines 6 Extended formulations for LPs 7 Streaming algorithms 8 Property testing 9 Privacy 10 etc... Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

9 Applications 1 Distributed computations (duh) 2 Combinatorics 3 Circuit complexity (KW games) 4 Proof complexity (+ SAT algorithms) 5 Time space tradeoffs for Turing machines 6 Extended formulations for LPs 7 Streaming algorithms 8 Property testing 9 Privacy 10 etc... Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

10 Our results: Applications 1 Monotone circuit depth. We exhibit an explicit (i.e., in NP) monotone function on n variables whose monotone circuits require depth Ω(n/ log n); previous best Ω( n) by Raz & Wigderson (JACM 92) AND OR OR AND AND x 1 x 2 x 3 x 4 x 5 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

11 Our results: Applications 1 Monotone circuit depth. We exhibit an explicit (i.e., in NP) monotone function on n variables whose monotone circuits require depth Ω(n/ log n); previous best Ω( n) by Raz & Wigderson (JACM 92) We exhibit a function in monotone P with monotone depth Θ( n) These lower bounds hold even if the circuits are allowed to err = average-case hierarchy theorem of Filmus et al. (FOCS 13) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

12 Our results: Applications 1 Monotone circuit depth. We exhibit an explicit (i.e., in NP) monotone function on n variables whose monotone circuits require depth Ω(n/ log n); previous best Ω( n) by Raz & Wigderson (JACM 92) We exhibit a function in monotone P with monotone depth Θ( n) These lower bounds hold even if the circuits are allowed to err = average-case hierarchy theorem of Filmus et al. (FOCS 13) 2 Proof complexity. Rank and length space lower bounds for semi-algebraic proof systems, including Lovász Schrijver and Lasserre systems. This extends and simplifies Beame et al. (SICOMP 07) and Huynh and Nordström (STOC 12) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

13 Our results: Communication complexity 1 Starting point: Simple proof of the following theorem Huynh & Nordström (STOC 12) Let S be a search problem. The communication complexity of a certain two-party lift of S is at least the critical block sensitivity (cbs) of S. 2 New cbs lower bounds: Tseitin and Pebbling problems Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

14 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

15 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Critical block sensitivity (cbs) Let f S be a function solving S Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

16 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Critical block sensitivity (cbs) Let f S be a function solving S Let bs( f, α) be the block sensitivity of f at α bs( f, α) = max k such that there are disjoint blocks B 1,..., B k [n] with f (α) = f (α (B i) ) for all i [k] Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

17 Critical block sensitivity [Huynh & Nordström, STOC 12] Let S {0, 1} n Q be a search problem: On input α {0, 1} n the goal is to find a q Q s.t. (α, q) S Input α is critical if there is a unique feasible solution for α Critical block sensitivity (cbs) Let f S be a function solving S Let bs( f, α) be the block sensitivity of f at α cbs(s) := min f S max critical α bs( f, α) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

18 Lifted problems S α 1 α 2 α 3 α 4 α 5 How do we turn S {0, 1} n Q into a two-party communication problem? Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

19 Lifted problems S Compose with gn S α 1 α 2 α 3 α 4 α 5 g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Lifting: We consider a composed problem S g n where g : X Y {0, 1} is some small two-party function (called gadget ) Alice holds x X n Bob holds y Y n Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

20 Lower bounds via cbs S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

21 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

22 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

23 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Comparison with [Huynh & Nordström, 2012]: Slightly different gadgets We reduce from set-disjointness; [HN 12] use information theory Our proof generalises to multi-party models (NIH, NOF) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

24 Lower bounds via cbs Let g = S g g g g g x 1 y 1 x 2 y 2 x 3 y 3 x 4 y 4 x 5 y 5 Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Proof... Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

25 Proof strategy Proof is by a reduction from set-disjointness: DISJ cbs S g n where DISJ m is defined as follows: Alice holds A [m] Bob holds B [m] Goal is to decide whether A B = It is known that DISJ m requires Θ(m) bits of communication (even randomised protocols) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

26 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

27 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

28 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = AND g (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

29 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g Suppose S is a function with 2-sensitive input α = (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

30 Reduction DISJ cbs S g n [Zhang, ISAAC 09] S g g g g g g g (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Suppose S is a function with 2-sensitive input α = Flippability: g g Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

31 Reduction DISJ cbs S g n S What if S is a search problem? g g g g g g g How do we define f S? (0,0) (0,0) AND g AND g Protocol s output can depend on the encoding (x, y) of α = g n (x, y)! (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

32 Reduction DISJ cbs S g n S g g g g g g g (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Solution: Consider random encodings! Define f (α) to be the most likely solution output by the protocol on a random encoding of α Apply a random-selfreduction to map any particular encoding (x, y) of α = g n (x, y) into a random one Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

33 Reduction DISJ cbs S g n S g g g g g g g Random-self-reduction: (x, y) g 1 (z) (X, Y) R g 1 (z) (0,0) (0,0) AND g AND g (a 1, b 1 ) (a 2, b 2 ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

34 Proof complete! Theorem (Lower bounds via cbs) Randomised comm. complexity of S g n is Ω(cbs(S)) Note: Extension to multi-party setting uses random-selfreducible multi-party gadgets Next up: We need cbs lower bounds for interesting search problems Focus of this talk: Tseitin search problems Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

35 Tseitin contradictions Let G be a bounded-degree graph with an odd number of nodes Tseitin contradiction F G Variables: x e for each edge e Clauses: For each node v, x e 1 (mod 2) e:v e Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

36 Tseitin contradictions Let G be a bounded-degree graph with an odd number of nodes Tseitin contradiction F G Variables: x e for each edge e Clauses: For each node v, x e 1 (mod 2) e:v e Canonical search problem Input: Assignment to the variables of F G Output: Violated clause Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

37 Tseitin contradictions Let G be a bounded-degree graph with an odd number of nodes Tseitin contradiction F G Variables: x e for each edge e Clauses: For each node v, x e 1 (mod 2) e:v e Canonical search problem Input: Assignment to the variables of F G Output: Violated clause If G is an expander... Known: Deterministic query complexity Θ(n) [Urq 87] Randomised query complexity Ω(n 1/3 ) [LNNW 95] We prove: Critical block sensitivity Ω(n/ log n) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

38 Tseitin sensitivity κ-routability G is κ-routable iff there is a set of terminals T V(G), T = κ, such that for every pairing of the nodes of T there are edge-disjoint paths in G connecting every pair Example: κ = Θ(n/ log n) on an expander Theorem (Tseitin sensitivity) cbs(tseitin) = Ω(κ) Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

39 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem κ = 7 Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

40 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Output of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

41 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Output of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

42 Tseitin sensitivity: Proof Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Output of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

43 Tseitin sensitivity: Proof Output of f Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

44 Tseitin sensitivity: Proof Output of f Let f be a function solving the Tseitin problem Consider a configuration: Unique violation at a terminal Blocks are edge-disjoint paths pairing the remaining terminals Show that a random config is sensitive to Ω(κ) blocks in expectation! Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

45 Putting everything together Unsatisfiable CNF formula (Tseitin or Pebbling) Canonical search problem Thm: High critical block sensitivity Thm: High communication complexity for lifted problem High monotone circuit depth [KW 88], [RM 99], [FPRC 13] High proof complexity (rank & length space) [IPU 94], [BPS 07], [HN 12] Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

46 Open problem Conjecture There exists a two-party gadget g such that for all f : {0, 1} n {0, 1} Deterministic comm. complexity of f g n deterministic query complexity of f Randomised comm. complexity of f g n randomised query complexity of f Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

47 Open problem Conjecture There exists a two-party gadget g such that for all S {0, 1} n Q Deterministic comm. complexity of S g n deterministic query complexity of S Randomised comm. complexity of S g n randomised query complexity of S Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

48 Questions? Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January / 18

Monotone Circuit Lower Bounds from Resolution

Monotone Circuit Lower Bounds from Resolution Monotone Circuit Lower Bounds from Resolution Ankit Garg Mika Göös Pritish Kamath Dmitry Sokolov MSR Harvard MIT KTH Mika Göös Monotone Circuits & Resolution 25th October 2017 1 / 22 Background: Query-to-communication

More information

Clique vs. Independent Set

Clique vs. Independent Set Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4 On page 6... Mika Göös (Univ. of Toronto) Clique vs.

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Dag-like Communication and Its Applications

Dag-like Communication and Its Applications Electronic Colloquium on Computational Complexity, Report No. 202 (2016) Dag-like Communication and Its Applications Dmitry Sokolov December 19, 2016 Abstract In 1990 Karchmer and Widgerson considered

More information

MINI-TUTORIAL ON SEMI-ALGEBRAIC PROOF SYSTEMS. Albert Atserias Universitat Politècnica de Catalunya Barcelona

MINI-TUTORIAL ON SEMI-ALGEBRAIC PROOF SYSTEMS. Albert Atserias Universitat Politècnica de Catalunya Barcelona MINI-TUTORIAL ON SEMI-ALGEBRAIC PROOF SYSTEMS Albert Atserias Universitat Politècnica de Catalunya Barcelona Part I CONVEX POLYTOPES Convex polytopes as linear inequalities Polytope: P = {x R n : Ax b}

More information

Lifting Nullstellensatz to Monotone Span Programs over Any Field

Lifting Nullstellensatz to Monotone Span Programs over Any Field Lifting Nullstellensatz to Monotone Span Programs over Any Field Toniann Pitassi University of Toronto and the Institute for Advanced Study Toronto, Canada and Princeton, U.S.A. toni@cs.toronto.edu ABSTRACT

More information

Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity

Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity (Extended Abstract) Paul Beame 1,, Matei David 2,, Toniann Pitassi 2,, and Philipp Woelfel 2, 1 University of Washington

More information

Monotone Circuits for Matching Require. Linear Depth

Monotone Circuits for Matching Require. Linear Depth Monotone Circuits for Matching Require Linear Depth Ran Raz Avi Wigderson The Hebrew University February 11, 2003 Abstract We prove that monotone circuits computing the perfect matching function on n-vertex

More information

Algebraic Problems in Computational Complexity

Algebraic Problems in Computational Complexity Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.

More information

AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS. Robert Robere

AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS. Robert Robere AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS by Robert Robere A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Computer Science

More information

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels

More information

Time to learn about NP-completeness!

Time to learn about NP-completeness! Time to learn about NP-completeness! Harvey Mudd College March 19, 2007 Languages A language is a set of strings Examples The language of strings of all zeros with odd length The language of strings with

More information

On the Automatizability of Resolution and Related Propositional Proof Systems

On the Automatizability of Resolution and Related Propositional Proof Systems On the Automatizability of Resolution and Related Propositional Proof Systems Albert Atserias and María Luisa Bonet Departament de Llenguatges i Sistemes Informàtics Universitat Politècnica de Catalunya

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

Regular Resolution Lower Bounds for the Weak Pigeonhole Principle

Regular Resolution Lower Bounds for the Weak Pigeonhole Principle Regular Resolution Lower Bounds for the Weak Pigeonhole Principle Toniann Pitassi Department of Computer Science University of Toronto toni@cs.toronto.edu Ran Raz Department of Computer Science Weizmann

More information

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.

More information

There are no zero-hard problems in multiparty communication complexity

There are no zero-hard problems in multiparty communication complexity There are no zero-hard problems in multiparty communication complexity László Babai and Denis Pankratov University of Chicago DRAFT: 2015-04-29 7:00pm Abstract We study the feasibility of generalizing

More information

Upper and Lower Bounds for Tree-like. Cutting Planes Proofs. Abstract. In this paper we study the complexity of Cutting Planes (CP) refutations, and

Upper and Lower Bounds for Tree-like. Cutting Planes Proofs. Abstract. In this paper we study the complexity of Cutting Planes (CP) refutations, and Upper and Lower Bounds for Tree-like Cutting Planes Proofs Russell Impagliazzo Toniann Pitassi y Alasdair Urquhart z UCSD UCSD and U. of Pittsburgh University of Toronto Abstract In this paper we study

More information

Approximation norms and duality for communication complexity lower bounds

Approximation norms and duality for communication complexity lower bounds Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased

More information

Hardness of MST Construction

Hardness of MST Construction Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what

More information

Lower Bound Techniques for Multiparty Communication Complexity

Lower Bound Techniques for Multiparty Communication Complexity Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1 The multiparty number-in-hand

More information

Nonnegative Rank vs. Binary Rank

Nonnegative Rank vs. Binary Rank CHICAGO JOURNAL OF THEORETICAL COMPUTER SCIENCE 06, Article, pages 3 http://cjtcs.cs.uchicago.edu/ Nonnegative Rank vs. Binary Rank Thomas Watson Received February 3, 04; Revised August 5, 05, and on February

More information

Notes on Complexity Theory Last updated: October, Lecture 6

Notes on Complexity Theory Last updated: October, Lecture 6 Notes on Complexity Theory Last updated: October, 2015 Lecture 6 Notes by Jonathan Katz, lightly edited by Dov Gordon 1 PSPACE and PSPACE-Completeness As in our previous study of N P, it is useful to identify

More information

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On

More information

2 P vs. NP and Diagonalization

2 P vs. NP and Diagonalization 2 P vs NP and Diagonalization CS 6810 Theory of Computing, Fall 2012 Instructor: David Steurer (sc2392) Date: 08/28/2012 In this lecture, we cover the following topics: 1 3SAT is NP hard; 2 Time hierarchies;

More information

Complexity Classes V. More PCPs. Eric Rachlin

Complexity Classes V. More PCPs. Eric Rachlin Complexity Classes V More PCPs Eric Rachlin 1 Recall from last time Nondeterminism is equivalent to having access to a certificate. If a valid certificate exists, the machine accepts. We see that problems

More information

Complexity. Complexity Theory Lecture 3. Decidability and Complexity. Complexity Classes

Complexity. Complexity Theory Lecture 3. Decidability and Complexity. Complexity Classes Complexity Theory 1 Complexity Theory 2 Complexity Theory Lecture 3 Complexity For any function f : IN IN, we say that a language L is in TIME(f(n)) if there is a machine M = (Q, Σ, s, δ), such that: L

More information

Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity

Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity László Babai Peter G. Kimmel Department of Computer Science The University of Chicago 1100 East 58th Street Chicago,

More information

RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS

RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS RAN RAZ AND IDDO TZAMERET Abstract. We develop and study the complexity of propositional proof systems of varying strength extending resolution by

More information

Tight Bounds for Distributed Streaming

Tight Bounds for Distributed Streaming Tight Bounds for Distributed Streaming (a.k.a., Distributed Functional Monitoring) David Woodruff IBM Research Almaden Qin Zhang MADALGO, Aarhus Univ. STOC 12 May 22, 2012 1-1 The distributed streaming

More information

Monotone Submodular Maximization over a Matroid

Monotone Submodular Maximization over a Matroid Monotone Submodular Maximization over a Matroid Yuval Filmus January 31, 2013 Abstract In this talk, we survey some recent results on monotone submodular maximization over a matroid. The survey does not

More information

Average Case Lower Bounds for Monotone Switching Networks

Average Case Lower Bounds for Monotone Switching Networks Average Case Lower Bounds for Monotone Switching Networks Yuval Filmus, Toniann Pitassi, Robert Robere and Stephen A. Cook Department of Computer Science University of Toronto Toronto, Canada {yuvalf,

More information

Complexity of Finding a Duplicate in a Stream: Simple Open Problems

Complexity of Finding a Duplicate in a Stream: Simple Open Problems Complexity of Finding a Duplicate in a Stream: Simple Open Problems Jun Tarui Univ of Electro-Comm, Tokyo Shonan, Jan 2012 1 Duplicate Finding Problem Given: Stream a 1,,a m a i {1,,n} Assuming m > n,

More information

Organization. Informal introduction and Overview Informal introductions to P,NP,co-NP and themes from and relationships with Proof complexity

Organization. Informal introduction and Overview Informal introductions to P,NP,co-NP and themes from and relationships with Proof complexity 15-16/08/2009 Nicola Galesi 1 Organization Informal introduction and Overview Informal introductions to P,NP,co-NP and themes from and relationships with Proof complexity First Steps in Proof Complexity

More information

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction U.C. Berkeley Handout N2 CS294: PCP and Hardness of Approximation January 23, 2006 Professor Luca Trevisan Scribe: Luca Trevisan Notes for Lecture 2 These notes are based on my survey paper [5]. L.T. Statement

More information

Communication Lower Bounds via Query Complexity

Communication Lower Bounds via Query Complexity Communication Lower Bounds via Query Complexity by Mika Göös A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy, Graduate Department of Computer Science, University

More information

Resolution Lower Bounds for the Weak Pigeonhole Principle

Resolution Lower Bounds for the Weak Pigeonhole Principle Electronic Colloquium on Computational Complexity, Report No. 21 (2001) Resolution Lower Bounds for the Weak Pigeonhole Principle Ran Raz Weizmann Institute, and The Institute for Advanced Study ranraz@wisdom.weizmann.ac.il

More information

INSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES. A trade-off between length and width in resolution. Neil Thapen

INSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES. A trade-off between length and width in resolution. Neil Thapen INSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES A trade-off between length and width in resolution Neil Thapen Preprint No. 59-2015 PRAHA 2015 A trade-off between length and width in resolution

More information

MTAT Complexity Theory October 20th-21st, Lecture 7

MTAT Complexity Theory October 20th-21st, Lecture 7 MTAT.07.004 Complexity Theory October 20th-21st, 2011 Lecturer: Peeter Laud Lecture 7 Scribe(s): Riivo Talviste Polynomial hierarchy 1 Turing reducibility From the algorithmics course, we know the notion

More information

Asymmetric Communication Complexity and Data Structure Lower Bounds

Asymmetric Communication Complexity and Data Structure Lower Bounds Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey

More information

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single

More information

SAT, Coloring, Hamiltonian Cycle, TSP

SAT, Coloring, Hamiltonian Cycle, TSP 1 SAT, Coloring, Hamiltonian Cycle, TSP Slides by Carl Kingsford Apr. 28, 2014 Sects. 8.2, 8.7, 8.5 2 Boolean Formulas Boolean Formulas: Variables: x 1, x 2, x 3 (can be either true or false) Terms: t

More information

COMP Analysis of Algorithms & Data Structures

COMP Analysis of Algorithms & Data Structures COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Computational Complexity CLRS 34.1-34.4 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 50 Polynomial

More information

The Strength of Multilinear Proofs

The Strength of Multilinear Proofs The Strength of Multilinear Proofs Ran Raz Iddo Tzameret December 19, 2006 Abstract We introduce an algebraic proof system that manipulates multilinear arithmetic formulas. We show that this proof system

More information

Polynomial Identity Testing and Circuit Lower Bounds

Polynomial Identity Testing and Circuit Lower Bounds Polynomial Identity Testing and Circuit Lower Bounds Robert Špalek, CWI based on papers by Nisan & Wigderson, 1994 Kabanets & Impagliazzo, 2003 1 Randomised algorithms For some problems (polynomial identity

More information

Notes for Lecture Notes 2

Notes for Lecture Notes 2 Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

An Introduction to Proof Complexity, Part II.

An Introduction to Proof Complexity, Part II. An Introduction to Proof Complexity, Part II. Pavel Pudlák Mathematical Institute, Academy of Sciences, Prague and Charles University, Prague Computability in Europe 2009, Heidelberg 2 Overview Part I.

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Towards an Understanding of Polynomial Calculus: New Separations and Lower Bounds

Towards an Understanding of Polynomial Calculus: New Separations and Lower Bounds Towards an Understanding of Polynomial Calculus: New Separations and Lower Bounds Yuval Filmus University of Toronto Mladen Mikša KTH Royal Institute of Technology Massimo Lauria KTH Royal Institute of

More information

SOLUTION: SOLUTION: SOLUTION:

SOLUTION: SOLUTION: SOLUTION: Convert R and S into nondeterministic finite automata N1 and N2. Given a string s, if we know the states N1 and N2 may reach when s[1...i] has been read, we are able to derive the states N1 and N2 may

More information

Edinburgh Research Explorer

Edinburgh Research Explorer Edinburgh Research Explorer On the power of the congested clique model Citation for published version: Drucker, A, Kuhn, F & Oshman, R 2014, On the power of the congested clique model. in ACM Symposium

More information

A Composition Theorem for Conical Juntas

A Composition Theorem for Conical Juntas A Composition Theorem for Conical Juntas Mika Göös T.S. Jayram University of Toronto IBM Almaden Göös and Jayram A composition theorem for conical juntas 29th May 2016 1 / 12 Motivation Randomised communication

More information

A.Antonopoulos 18/1/2010

A.Antonopoulos 18/1/2010 Class DP Basic orems 18/1/2010 Class DP Basic orems 1 Class DP 2 Basic orems Class DP Basic orems TSP Versions 1 TSP (D) 2 EXACT TSP 3 TSP COST 4 TSP (1) P (2) P (3) P (4) DP Class Class DP Basic orems

More information

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is, Lower Bounds for Cutting Planes Proofs with Small Coecients Maria Bonet y Toniann Pitassi z Ran Raz x Abstract We consider small-weight Cutting Planes (CP ) proofs; that is, Cutting Planes (CP ) proofs

More information

Communication Complexity

Communication Complexity Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the

More information

Solution of Exercise Sheet 12

Solution of Exercise Sheet 12 Complexity Theory (fall 2016) Solution of Exercise Sheet 12 Dominique Unruh Problem 1: Deterministic PCPs PCP stands for probabilistically checkable proofs. We will now show that the probabilistic part

More information

1 Distributional problems

1 Distributional problems CSCI 5170: Computational Complexity Lecture 6 The Chinese University of Hong Kong, Spring 2016 23 February 2016 The theory of NP-completeness has been applied to explain why brute-force search is essentially

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

CS151 Complexity Theory. Lecture 13 May 15, 2017

CS151 Complexity Theory. Lecture 13 May 15, 2017 CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P

More information

DD2446 Complexity Theory: Problem Set 4

DD2446 Complexity Theory: Problem Set 4 DD2446 Complexity Theory: Problem Set 4 Due: Friday November 8, 2013, at 23:59. Submit your solutions as a PDF le by e-mail to jakobn at kth dot se with the subject line Problem set 4: your full name.

More information

Time to learn about NP-completeness!

Time to learn about NP-completeness! Time to learn about NP-completeness! Harvey Mudd College March 19, 2007 Languages A language is a set of strings Examples The language of strings of all a s with odd length The language of strings with

More information

Proof Complexity Meets Algebra

Proof Complexity Meets Algebra ICALP 17, Warsaw 11th July 2017 (CSP problem) P 3-COL S resolution (proof system) Proofs in S of the fact that an instance of P is unsatisfiable. Resolution proofs of a graph being not 3-colorable. Standard

More information

CS21 Decidability and Tractability

CS21 Decidability and Tractability CS21 Decidability and Tractability Lecture 20 February 23, 2018 February 23, 2018 CS21 Lecture 20 1 Outline the complexity class NP NP-complete probelems: Subset Sum NP-complete problems: NAE-3-SAT, max

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q

More information

Distributed Statistical Estimation of Matrix Products with Applications

Distributed Statistical Estimation of Matrix Products with Applications Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m

More information

Algorithms as Lower Bounds

Algorithms as Lower Bounds Algorithms as Lower Bounds Lecture 3 Part 1: Solving QBF and NC1 Lower Bounds (Joint work with Rahul Santhanam, U. Edinburgh) Part 2: Time-Space Tradeoffs for SAT Ryan Williams Stanford University Quantified

More information

1 From previous lectures

1 From previous lectures CS 810: Introduction to Complexity Theory 9/18/2003 Lecture 11: P/poly, Sparse Sets, and Mahaney s Theorem Instructor: Jin-Yi Cai Scribe: Aparna Das, Scott Diehl, Giordano Fusco 1 From previous lectures

More information

Intro to Theory of Computation

Intro to Theory of Computation Intro to Theory of Computation LECTURE 25 Last time Class NP Today Polynomial-time reductions Adam Smith; Sofya Raskhodnikova 4/18/2016 L25.1 The classes P and NP P is the class of languages decidable

More information

Information Complexity vs. Communication Complexity: Hidden Layers Game

Information Complexity vs. Communication Complexity: Hidden Layers Game Information Complexity vs. Communication Complexity: Hidden Layers Game Jiahui Liu Final Project Presentation for Information Theory in TCS Introduction Review of IC vs CC Hidden Layers Game Upper Bound

More information

Tight Size-Degree Lower Bounds for Sums-of-Squares Proofs

Tight Size-Degree Lower Bounds for Sums-of-Squares Proofs Tight Size-Degree Lower Bounds for Sums-of-Squares Proofs Massimo Lauria KTH Royal Institute of Technology (Stockholm) 1 st Computational Complexity Conference, 015 Portland! Joint work with Jakob Nordström

More information

6.080 / Great Ideas in Theoretical Computer Science Spring 2008

6.080 / Great Ideas in Theoretical Computer Science Spring 2008 MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Robert Špalek Google Direct product theorems: Why is Google interested? Direct product theorems: Why should Google be interested? Direct

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

Proof Complexity of Quantified Boolean Formulas

Proof Complexity of Quantified Boolean Formulas Proof Complexity of Quantified Boolean Formulas Olaf Beyersdorff School of Computing, University of Leeds Olaf Beyersdorff Proof Complexity of Quantified Boolean Formulas 1 / 39 Proof complexity (in one

More information

Theory of Computation Chapter 9

Theory of Computation Chapter 9 0-0 Theory of Computation Chapter 9 Guan-Shieng Huang May 12, 2003 NP-completeness Problems NP: the class of languages decided by nondeterministic Turing machine in polynomial time NP-completeness: Cook

More information

NP-Completeness. Algorithmique Fall semester 2011/12

NP-Completeness. Algorithmique Fall semester 2011/12 NP-Completeness Algorithmique Fall semester 2011/12 1 What is an Algorithm? We haven t really answered this question in this course. Informally, an algorithm is a step-by-step procedure for computing a

More information

On the correlation of parity and small-depth circuits

On the correlation of parity and small-depth circuits Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract

More information

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we

More information

arxiv: v3 [cs.cc] 28 Jun 2015

arxiv: v3 [cs.cc] 28 Jun 2015 Parity Decision Tree Complexity and 4-Party Communication Complexity of XOR-functions Are Polynomially Equivalent arxiv:156.2936v3 [cs.cc] 28 Jun 215 Penghui Yao CWI, Amsterdam phyao1985@gmail.com September

More information

The Polynomial Hierarchy

The Polynomial Hierarchy The Polynomial Hierarchy Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Motivation..synthesizing circuits is exceedingly difficulty. It is even

More information

Hardness of Function Composition for Semantic Read once Branching Programs

Hardness of Function Composition for Semantic Read once Branching Programs Hardness of Function Composition for Semantic Read once Branching Programs Jeff Edmonds York University, 4700 Keele Street, Toronto, CANADA jeff@cse.yorku.ca http://www.cs.yorku.ca/ jeff/ Venkatesh Medabalimi

More information

Lecture 16: Time Complexity and P vs NP

Lecture 16: Time Complexity and P vs NP 6.045 Lecture 16: Time Complexity and P vs NP 1 Time-Bounded Complexity Classes Definition: TIME(t(n)) = { L there is a Turing machine M with time complexity O(t(n)) so that L = L(M) } = { L L is a language

More information

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover Grant Schoenebeck Luca Trevisan Madhur Tulsiani Abstract We study semidefinite programming relaxations of Vertex Cover arising

More information

Lecture 9: Polynomial-Time Hierarchy, Time-Space Tradeoffs

Lecture 9: Polynomial-Time Hierarchy, Time-Space Tradeoffs CSE 531: Computational Complexity I Winter 2016 Lecture 9: Polynomial-Time Hierarchy, Time-Space Tradeoffs Feb 3, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 The Polynomial-Time Hierarchy Last time

More information

arxiv: v1 [cs.cc] 26 Feb 2008

arxiv: v1 [cs.cc] 26 Feb 2008 Separating NOF communication complexity classes RP and NP arxiv:08023860v1 cscc] 26 Feb 2008 Matei David Computer Science Department University of Toronto matei at cs toronto edu December 13, 2017 Abstract

More information

Challenge to L is not P Hypothesis by Analysing BP Lower Bounds

Challenge to L is not P Hypothesis by Analysing BP Lower Bounds Challenge to L is not P Hypothesis by Analysing BP Lower Bounds Atsuki Nagao (The University of Electro-Communications) Joint work with Kazuo Iwama (Kyoto University) Self Introduction -2010 : Under graduate

More information

Curriculum Vitae of Mikhail Alekhnovich. Objective Faculty position in Theoretical Computer Science for Fall 2005

Curriculum Vitae of Mikhail Alekhnovich. Objective Faculty position in Theoretical Computer Science for Fall 2005 Curriculum Vitae of Mikhail Alekhnovich Citizenship: Russian Address: School of Mathematics Institute for Advanced Study Princeton, NJ 08540, US e-mail: misha@ias.edu For the up to date version visit http://www.math.ias.edu/~misha

More information

A Practical Universal Circuit Construction and Secure Evaluation of Private Functions

A Practical Universal Circuit Construction and Secure Evaluation of Private Functions A Practical Universal Circuit Construction and, Bell Labs, Murray Hill, NJ, USA http://www.cs.toronto.edu/~vlad/, University of Erlangen-Nuremberg, Germany http://thomaschneider.de Financial Cryptography

More information

Introduction to Advanced Results

Introduction to Advanced Results Introduction to Advanced Results Master Informatique Université Paris 5 René Descartes 2016 Master Info. Complexity Advanced Results 1/26 Outline Boolean Hierarchy Probabilistic Complexity Parameterized

More information

Chebyshev Polynomials, Approximate Degree, and Their Applications

Chebyshev Polynomials, Approximate Degree, and Their Applications Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can

More information

Multiparty Communication Complexity of Disjointness

Multiparty Communication Complexity of Disjointness Multiparty Communication Complexity of Disjointness Aradev Chattopadhyay and Anil Ada School of Computer Science McGill University, Montreal, Canada achatt3,aada@cs.mcgill.ca We obtain a lower bound of

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for

More information

arxiv: v1 [cs.cc] 10 Aug 2007

arxiv: v1 [cs.cc] 10 Aug 2007 RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS RAN RAZ AND IDDO TZAMERET arxiv:0708.1529v1 [cs.cc] 10 Aug 2007 Abstract. We develop and study the complexity of propositional proof systems of varying

More information