Improved FPTAS for Multi-Spin Systems

Size: px
Start display at page:

Download "Improved FPTAS for Multi-Spin Systems"

Transcription

1 Improved FPTAS for Multi-Spin Systems Pinyan Lu and Yitong Yin 2 Microsoft Research Asia, China. pinyanl@microsoft.com 2 State Key Laboratory for Novel Software Technology, Nanjing University, China. yinyt@nju.edu.cn Abstract. We design deterministic fully polynomial-time approximation scheme (FPTAS) for computing the partition function for a class of multi-spin systems, extending the known approximable regime by an exponential scale. As a consequence, we have an FPTAS for the Potts models with inverse temperature β up to a critical threshold β = O( ) where is the maximum degree, confirming a conjecture in [0]. We also give an improved FPTAS for a generalization of counting q-colorings, namely the counting list-colorings. As a consequence we have an FP- TAS for counting q-colorings in graphs with maximum degree when q α + for α greater than α This is so far the best bound achieved by deterministic approximation algorithms for counting q-colorings. All these improvements are obtained by applying a potential analysis to the correlation decay on computation trees for multi-spin systems. Introduction Spin systems in Statistical Physics are the stochastic models defined by local interactions. In Computer Science, spin systems are used as a theoretical framework for counting or inference problems arising from constraint satisfaction problems, e.g. counting independent sets or q-colorings in graphs, and probability inference in graphical models. A central problem in this framework is the computation of the partition function, which may solve both counting and inference. The problem is #P-hard for almost all nontrivial spin systems [3,4]. A classic approach for approximation of partition function is the Markov Chain Monte Carlo (MCMC) method which relies on the rapid mixing of random walks in the configuration space [5 7, 3 8, 2, 27]. A more contemporary approach is the correlation decay technique introduced by Bandyopadhyay and Gamarnik [] and Weitz [28], which leads to deterministic fully polynomial-time approximation scheme (FPTAS) for #Phard counting problems [2, 0, 9, 20, 22, 23, 29]. In these algorithms, the computation of a marginal probability (which is equivalent to the computation of partition function by self-reduction) is reduced Supported by the National Science Foundation of China under Grant No , and

2 to evaluating an exponential-size tree-structured dynamical system. The correlation decay property guarantees that the far-away variables can be disregarded without substantially affecting the marginal probability of interest, thus the true values can be efficiently approximated by evaluating truncated dynamical systems. Two such dynamical systems were proposed: () the self-avoiding-walk (SAW) tree [28] for two-state spin systems and (2) the computation tree [0] for all spin systems. For two-state spin systems, FPTAS based on SAW-trees may approach the approximability boundaries, such as [9, 20, 23, 28]. This is because a SAW-tree is a faithful construction of the original spin system on a tree, hence long-range correlations can be used as gadgets in the reduction for the inapproximability [8, 25, 26]. Very recently, the similar long-range correlations were used to prove inapproximability for multi-spin systems [9]. On the algorithmic side, due to a barrier result of Sly in [24], the original spin systems on trees are no longer capable of simulating all marginal probabilities. The computation tree introduced by Gamarnik and Katz in [0] overcomes this fundamental issue by creating a dynamical system consisting of different instances of spin systems.. Our results We design efficient computation trees for multi-spin systems: For a vertex of degree d, our computation tree expends to d branches while the previous one in [0] has exp(ω(d)) many branches. We apply a potential analysis to the decay of correlation between variables in computation trees. The potential analysis has been used in [9,20,22,23] for analyzing the correlation decay on the self-avoiding walk trees for two-state spin systems. We show for the first time that this powerful technique can be applied to computation trees for multi-spin systems. Our new construction of efficient computation trees and potential analysis greatly extend the regimes of correlation decay and deterministic FPTAS for these systems. One of the most well-studied multi-spin systems is the Potts model. Theorem. For any constant q 2, there exists an FPTAS for computing the partition function for q-state Potts models with inverse temperature β and maximum degree satisfying 3 (e β ). For large, the condition 3 (e β ) is translated ( to that β = O( ), which greatly improves the best previous bound β = O due to Gamarnik q ) and Katz [0] and also confirms a conjecture in [0]. For the anti-ferromagnetic case (β < 0), our condition is asymptotically tight due to a very recent inapproximability result of Galanis, Štefankovič, and Vigoda [9]. Theorem is a special case of a much more general theorem for the q-state spin systems, also called the Markov random fields. As suggested by [0], the regime of correlation decay for these models is described in terms of c A, the maximum ratio between edge parameters. We show that there exists an FPTAS for a family of Markov random fields if 3 (c A ). This exponentially improves the previous best known condition (c A c A ) q < proved in [0]. This general result is formally stated as Theorem 3 in Section 2.

3 We next study the problem of counting proper q-colorings in an undirected graph. For this problem, the mixing or the tractability condition is usually given in form of q α + β for some constant α and β where is the maximum degree of the graph. The previous best bound for deterministic FPTAS was achieved in [0] for an α and some sufficiently large β on triangle-free graphs. Better bounds (with α < 2) were known for randomized approximation algorithms [6, 5, 27] or correlation decay only [, 2]. We prove the following theorem for a constant α which is formally defined by (2) in Section 2. Theorem 2. There exists an FPTAS for counting q-colorings on graphs with maximum degree if q and are constants and q α + for α > α. This is a new record for the deterministic FPTAS for counting q-colorings on general graphs, and we remove the triangle-free requirement in previous correlationdecay based results such as [0, 2]. Theorem 2 is proved as a special case of a theorem for a generalization of q-colorings, called the list-colorings, which is formally stated as Theorem 4 in Section 2. All the above FPTAS require the degree of the graph and the number of states (colors) to be constant. If we remove this restriction, the algorithms compute a ( ± ɛ)-approximation of the true value for any fixed 0 < ɛ < in time n O(log n). This complexity bound was only known previously for simple models like list-colorings but was not known for general multi-spin systems since for such systems the previous computation tree proposed in [0] tries to enumerate all configurations of the local neighborhood at each step. We give a more efficient computation tree which uses exponentially less branches. 2 Definitions and Statements of Results An instance of a q-state spin system or a pair-wise Markov random field (MRF) is a tuple Ω = (G, X, A, F ), where G = (V, E) is an undirected graph called the underlying graph; X = [q] = {, 2,..., q} is a domain of spin states; A = (A e, e E) is a tuple where each A e : X X R 0 is a symmetric function specifying the activity of edge e; F = (F v, v V ) is a tuple where each F v : X R 0 specifies the external field at vertex v. The size of an MRF instance is defined as Ω = max{ V, X }. We consider only those MRF instances such that the number of bits used to encode A and F is in polynomial of n = V and q = X. This does not affect the generality of the problem since we are interested in the approximation algorithms. The partition function of an MRF instance Ω = (G, X, A, F ) is defined as Z(Ω) x X V e=uv E A e (x u, x v ) v V F v (x v ).

4 This gives rise to a probability distribution P Ω, called the Gibbs measure, over all configurations x X V, such that e=uv E P Ω (X = x) = A e(x u, x v ) v V F v(x v ). Z(Ω) Given an MRF instance Ω = (G, X, A, F ) with underlying graph G = (V, E), we denote by G the maximum degree of G and let c A max e E w,x,y,z X A e (x, y) A e (w, z). Theorem 3. Let M be a family of MRF instances with bounded degree and bounded size of domain. There exists an FPTAS for computing the partition function of MRFs in M if it holds that Ω = (G, X, A, F ) M, 3 G (c A ). () For any family M of MRFs satisfying () without any restriction on the degree or the size of domain, the algorithm computes a ( ± ɛ)-approximation of Z(Ω) for any fixed 0 < ɛ < in time n O(log n) where n = Ω. The q-state Potts model is a special class of MRFs Ω = (G, X, A, F ) with for every e E, A e = A such that A(x, y) = e β if x = y and A(x, y) = otherwise. The parameter β is called the inverse temperature. It is easy to see that Theorem is a special case of Theorem 3 on Potts models. Next we consider the proper q-colorings in an undirected graph, which can be easily seen as a special case of MRF. The problem of counting q-colorings is solved by solving its generalization called the list-colorings. A list-coloring instance is a tuple Ω = (G, X, L) with that G = (V, E) is an undirected graph; X = [q] is a domain of q colors; L = (L v, v V ) such that each L v X is a list of colors for vertex v. A proper coloring in a list-coloring instance is a proper q-coloring x X V of vertices such that x v L v for every v V. The list-coloring is a special case of MRFs (G, X, A, F ) with that for every e E, A e = A such that A(x, y) = 0 if x = y and A(x, y) = if otherwise, and for every v V, the external field F v is a Boolean function indicating the color list L v. For the list-colorings we have c A =, thus Theorem 3 does not apply, so we use different algorithm and analysis to prove the following theorem. Let α be the solution to the equation α ( ) 4α 3 3 2α + 4α 3 exp =. (2) 2α(α ) 4(α ) 3 The LHS of (2) is in fact monotonously decreasing from + to 0 for α >, so there is a unique solution α.

5 Theorem 4. There exists a deterministic FPTAS for counting proper colorings in list-coloring instances Ω = (G, X, L) with bounded degree G and bounded number of colors q = X satisfying that there is an α > α such that v V, L v α G +. (3) Obviously Theorem 2 is a special case of Theorem 4 as colorings are just listclorings with L v = X for every v V. 3 Markov Random Fields Given an MRF instance defined on the underlying graph G = (V, E), we suppose that for each vertex v V, the neighbors of v are enumerated as v, v 2,..., v deg(v) where deg(v) is the degree of v. We define operations called pinning and partial pinning on MRF instances as follows. Definition. Given an MRF instance Ω = (G, X, A, F ), a vertex v V and its neighbors v, v 2,..., v d in G, where d = deg(v), for each spin state x X and each i d +, the partial pinning of Ω, denoted as Ω i v,x, is a new MRF instance augmented from Ω as Ω i v,x = (G v, X, Ã, F ), where G v = G \ {v} is the subgraph of G induced by V \ {v}, Ã = (A e, e E \ {vv, vv 2,..., vv d }) is the restriction of A on the set of edges in G v, and F = ( F u, u V \ {v}) where y X, Fu (y) = { A uv (x, y)f u (y) if u {v,..., v i }, F u (y) otherwise. The pinning of Ω is a partial pinning by choosing i = d +, which is denoted as Ω v,x = Pin v,x (Ω) = Ω d+ v,x. The following identity can be seen as a generalization of the recursion for list-colorings derived in [0]. Compared to the recursion for MRFs in [0], it uses substantially less variables. Proposition. Let Ω = (G, X, A, F ) be an MRF instance. For every vertex v V G and its neighbors v, v 2,..., v d where d = deg(v), and every spin state x X, it holds that P Ω (X v = x) = Proof. We define that ( Fv(x) d i= A vvi (x,x) ) z x(a vvi (x,x) A vvi (x,z))p Ω i (X vi =z) v,x y X Fv(y) ( d i= A vvi (y,y) z y(a vvi (y,y) A vvi (y,z))p Ω i (X vi =z) v,y Z Ω (X v = x) x X V xv =x uw E A uw (x u, x w ) u V F u (x u ). ).

6 It can be verified that Z Ω (X v = x) = F v (x)z(ω v,x ) where Ω v,x = Pin v,x (Ω) is the pinning of Ω. Then P Ω (X v = x) = Z Ω (X v = x) y X Z Ω(X v = y) = F v (x)z(ω v,x) y X F v(y)z(ω v,y ). (4) By the Definition, it holds that Ω v,x = Ω d+ v,x, and Ω v,x is simply the MRF instance deleting vertex v, which is independent of the choice of x. Therefore, (4) = F v (x)z(ωv,x d+ )/Z(Ωv,x) y X F v(y)z(ωv,y d+ )/Z(Ωv,y) = d F v (x) i= y X F v(y) d i= The partition function of a partial pinning of Ω expands as: Z(Ω i v,x) = x X V \{v} uw E u v w v A uw (x u, x w ) u V \{v} j= Z(Ω i+ v,x ) Z(Ω i v,x ). (5) Z(Ωv,y i+ ) Z(Ωv,y i ) i F u (x u ) A vvj (x, x vj ). It can be verified that Z(Ωv,x i+ ) = z X A vv i (x, z) Z Ω i v,x (X vi = z). Therefore, (5) = F v (x) d i= z X A vv i (x, z) ZΩ i (X vi =z) v,x Z(Ωv,x i ) y X F v(y) d i= z X A vv i (y, z) ZΩ i (X vi =z) v,y Z(Ωv,y i ) F v (x) d i= = y X F v(y) d ( = Fv(x) d i= y X Fv(y) ( d i= z X A vv i (x, z) P Ω i v,x (X vi = z) z X A vv i (y, z) P Ω i v,y (X vi = z) i= A vvi (x,x) ) z x(a vvi (x,x) A vvi (x,z))p Ω i (X vi =z) v,x A vvi (y,y) z y(a vvi (y,y) A vvi (y,z))p Ω i v,y (X vi =z) where the last equation uses the fact that z X P Ω i v,y (X v i = z) =. ), 3. Algorithms based on the computation tree recursion Given an MRF instance Ω = (G, X, A, F ) on underlying graph G = (V, E), a vertex v V with d neighbors v, v 2,..., v d in G and a spin state x X, we define the following function: f Ω,v,x (p) Fv(x) d i=(a vvi (x,x) z x(a vvi (x,x) A vvi (x,z))p i,x,z) y X Fv(y) d i=(a vvi (y,y) z y(a vvi (y,y) A vvi (y,z))p i,y,z) (6) over the domain of vectors p = (p i,y,z, i d; y, z X ; y z) [0, ] dq(q ) satisfying that z y p i,y,z for every i d and y X. Due to Proposition we have P Ω (X v = x) = f Ω,v,x (p) where p i,y,z = P Ω i v,y (X vi = z) for each i d and y, z X that y z. This already gives us a procedure, called

7 the computation tree recursion, for computing the exact value of a marginal probability P Ω (X v = x). Note that it terminates since each partial pinning Ωv,y i deletes a vertex v from the current underlying graph. It is easy to verify the following closure property of the computation tree recursion: If each p i,y,z is replaced by an estimation P Ω i v,y (X vi = z) of marginal P Ω i v,y (X vi = z) such that P Ω i v,y (X vi = z) [0, ] and z y P Ω i v,y (X vi = z) then the outcome of the recursion P Ω (X v = x) = f Ω,v,x (p) as an estimation of P Ω (X v = x) still satisfies that P Ω (X v = x) [0, ] and P x X Ω (X v = x) =. The size of the computation tree can be easily of exponential in the size of the underlying graph. We can run the computation tree recursion up to t levels and use a naive estimation of marginals for the base cases. Formally, for t 0, the quantity P Ω (X v = x) is recursively defined as follows: If t = 0, let P (0) Ω (X v = x) = P F v(x) y X Fv(y). If t > 0, let Ω (X v = x) = f Ω,v,x ( p) where ˆp i,y,z = i d and y, z X that y z. (t ) P Ω (X v,y i vi = z) for each (0) The value of the base case P Ω (X v = x) is not important due to a correlation decay property we prove later. As shown in [0], on graphs of constant maximum degrees, the quantity P Ω (X v = x) can be efficiently computed by dynamic programming when t = O(log n). The partition function can be approximated from estimations of marginals by the following standard procedure. Enumerate the vertices in V as v, v 2,..., v n.. Let Ω = Ω. For k =, 2,..., n, assuming that the is well-defined, use the computation tree recursion to compute P (X vk = x) for all x X, choose x k to be the x which maximizes the P (X vk = x) and construct + = Pin vk,x k ( ) as a pinning of. 2. Compute that Ẑ(Ω) = e=uv E Ae(xu,xv) v V Fv(xv) and return Ẑ(Ω). n k= P (X vk =x vk ) This algorithm is the same as the one proposed in [0], except for using a simplified computation tree recursion, thus by the same analysis as in [0], we have the following proposition. Proposition 2. Let Ω = (G, X, A, F ) be an MRF instance such that G has maximum degree and q = X. The value of Ẑ(Ω) can be computed in time poly( Ω ) (q ) O. 3.2 Correlation decay on the computation tree The above algorithm approximates the marginal probabilities by simulating a tree-structured dynamical system for a limited number of iterations. The accuracy of this approximation relies on the following property of correlation decay.

8 Definition 2 (Correlation Decay). Let M be a family of MRFs. We say that the computation tree recursion exhibits exponential correlation decay over M if there exists a constant C > 0 such that given any MRF instance Ω M, for all t, it holds that max v V Ω x X P Ω (X v = x) P Ω (X v = x) poly( Ω ) exp( C t). A sufficient condition for the exponential correlation decay is that the error of estimation decays by a constant factor in every iteration. However, in general, the systems exhibiting correlation decay may not necessarily decay in every step. This issue has been addressed by a potential-based analysis in [9, 20, 22, 23] for self-avoiding walk trees for 2-spin systems, which is now formalized as the following condition for computation trees for multi-spin systems. Definition 3 (The Amortized Decay Condition). Let M be a family of q- state MRFs. We say that M satisfies the Amortized Decay Condition if there exists a strictly increasing differentiable function ϕ : [0, ] R satisfying the following conditions:. Let Φ(x) = d ϕ(x) d x denote the derivative of function ϕ. We call Φ( ) the potential function. The values of Φ( ) and Φ( ) are bounded by poly(q) over domain [0, ]. 2. Given an MRF instance Ω M, a vertex v V Ω with d = deg(v) and a spin state x X, let f = f Ω,v,x be the computation tree recursion defined by (6), and define the amortized decay rate as κ(p) i d y z f(p) p i,y,z Φ(f(p)) Φ(p i,y,z ). (7) There exists a constant 0 < κ <, such that for every MRF instance Ω M, vertex v V Ω and spin state x X, it holds that κ(p) κ for all p = (p i,y,z, i d y, z X y z) [0, ] dq(q ) satisfying that z y p i,y,z for all i and y. We may replace the first condition by a more sophisticated bound on the values of Φ( ) and Φ( ), which will give us more freedom to choose potential functions, although the current simple bound is sufficient for our analysis. We say a family M of MRF instances is closed under partial pinning if for every Ω = (G, X, A, F ) M, every vertex v V G with d = deg(v), spin state x X and i d, it holds for the partial pinning Ωv,x i of Ω that Ωv,x i M. Lemma. Let M be a family of MRFs which is closed under partial pinning. If M satisfies the amortized decay condition then the computation tree recursion exhibits exponential correlation decay over M.

9 Proof. Pick an MRF instance Ω M, a vertex v V Ω with d neighbors v, v 2,..., v d and a spin state x X. Let ϕ : [0, ] R be the monotone differentiable function and Φ( ) be its derivative, as required by the amortized decay condition. Consider the corresponding recursion f = f Ω,v,x. We define the following notations: Let p = P Ω (X v = x), ˆp = P Ω (X v = x), and for every i d and y, z X that y z, let p i,y,z = P Ω i v,y (X vi = z) and (t ) ˆp i,y,z = P Ω (X v,y i vi = z). Obviously, we have p = f(p) and ˆp = f( p). We also denote that ξ = ϕ(p), ˆξ = ϕ(ˆp), ξ i,y,z = ϕ(p i,y,z ) and ˆξ i,y,z = ϕ(ˆp i,y,z ), respectively. Let ɛ = p ˆp = f(p) f(ˆp), δ = ϕ(p) ϕ(ˆp) = ϕ(f(p)) ϕ(f(ˆp)), ɛ i,y,z = p i,y,z ˆp i,y,z, and δ i,y,z = ϕ(p i,y,z ) ϕ(ˆp i,y,z ) be the respective errors. We have δ = ξ ˆξ = ϕ(f(p)) ϕ(f( p)) = ( ( ϕ f ϕ (q) )) ϕ ( f ( ϕ ( q) )). Due to the Mean Value Theorem, there exist ξ i,y,z [0, ] and accordingly p i,y,z = ϕ ( ξ i,y,z ), i d, y, z X, y z, such that δ = f( p) Φ(f( p)) p i,y,z Φ( p i,y,z ) δ i,y,z κ( p) max δ i,y,z, i d y z i d y z where κ(p) is defined by (7). Since M satisfies the amortized decay condition, there exists a universal constant κ < such that κ( p) κ. And since M is closed under partial pinning, every Ωv,y i still belongs to M. Therefore, by induction we have that δ κ t δ 0, where δ 0 = ϕ(p 0 ) ϕ(ˆp 0 ) such that p 0 = P Ω (X u = w) and (0) ˆp 0 = P Ω (X u = w) for some Ω M, u V Ω and x X, where Ω is an MRF instance resulting from applying t partial pinnings on the original Ω. By the Mean Value Theorem, there exists a p 0 [0, ] such that δ 0 = ϕ(p 0 ) ϕ(ˆp 0 ) Φ( p 0 ), which is upper bounded by q c for some constant c due to the requirement of amortized decay condition, thus δ κ t δ 0 q c κ t. Recall that δ = ϕ(p) ϕ(ˆp). Also by the Mean Value Theorem there exists p [0, ] such that δ = ϕ(p) ϕ(ˆp) = Φ( p) p ˆp = Φ( p) ɛ, thus ɛ = δ Φ( p) qc δ. Altogether we have that P Ω (X v = x) P Ω (X v = x) = ɛ q c δ q c κ t δ 0 q 2c κ t. And this holds for every Ω M, v V Ω, x X and t, with the universal constants c and κ <, which implies the exponential correlation decay of computation tree recursion over M. The following lemma is proved by verifying the amortized decay condition. Lemma 2. Let M be a family of MRFs satisfying (). The computation tree recursion exhibits exponential correlation decay over M. Proof. Let M be the closure of M under partial pinning, thus every instance from M is either an instance Ω M or an outcome of successive partial pinnings

10 of it, and the family M is closed under partial pinning. We show that M satisfies the amortized decay condition. We choose a monotone function ϕ : [0, ] R ( ). so that its derivative Φ satisfies that Φ(p) = p + 00q Thus both Φ( ) and Φ( ) are bounded by polynomial of q over [0, ]. Let Ω = (G, X, A, F ) M be an MRF instance on an underlying graph G with maximum degree, v V G a vertex with d = deg(v), and x X a spin state. Let f = f Ω,v,x be the recursion defined by (6). We define some shorthand notations. For each i d and y, z X that y z, let a i,y,z = Avv i (y,z) A vvi (y,y) and b y = F v (y) d i= A vv i (y, y), and denote that s i,y = z y a d i,y,z p i,y,z, s y = b y i= s i,y, and s = y X s y. Then we have ( ) z x a i,x,z p i,x,z f(p) = d b x i= y X b d y i= ( z y a i,y,z p i,y,z ) = s x s. For p = (p i,y,z, i d; y, z X ; y z) [0, ] dq(q ) such that z y p i,y,z for all i and y, it holds that s i,y 0 for any i and y, and f(p) [0, ]. The partial derivatives satisfy: f(p) p i,x,z = a i,x,z s x (s s x ) s 2 s i,x = f(p)( f(p)) a i,x,z, s i,x f(p) p i,y,z = y x y x a i,y,z s x s y s 2 s i,y = f(p) s y s y x The amortized decay rate defined by (7) is then bounded as κ(p) = f(p) Φ(f(p)) Φ(p i,y,z ) i d y z p i,y,z = f(p)( f(p))φ(f(p)) d i= + f(p)φ(f(p)) s y d s y x i= ( a i,x,z p i,y,z + s i,x 00q i d z x 0 50 max a i,y,z. i d s z y i,y a i,x,z s i,x Φ(p i,x,z ) z x s i,y z y ) + max y x a i,y,z Φ(p i,y,z ) i d z y d i= a i,y,z s i,y. ( a i,y,z p i,y,z + ) s i,y 00q For every i d and y, z X that y z, it can be verified that s i,y = p i,y,y + A vvi (y,z) z y A vvi (y,y) p i,y,z c A, and a i,y,z = A { } vv i (y, z) A vvi (y, y) max ca, c A c A. c A

11 Note that the partial pinning does not affect the edge activity A, thus for M satisfying (), for every Ω M the c A still satisfies that 3 (c A ). Therefore, κ(p) 0 50 c A(c A ) 0 50 ( + 3 ) <. Therefore, the MRF family M satisfies the amortized decay condition. By Lemma, the computation tree recursion exhibits exponential correlation decay over M thus also over its subfamily M. Proof of Theorem 3: Let Ω = (G, X, A, F ) M be an MRF instance and G = (V, E). Enumerate the vertices in V as v, v 2,..., v n. For each k n, let P (X vk = x k ) be computed by the algorithm in Section 3., where Ω = Ω and + = Pin vk,x k ( ). It is easy to verify that still satisfies the condition () for every k since pinning increases neither nor c A. Let w(x) Ẑ(Ω) = n k= P where w(x) = Ω (X vk =x vk ) e=uv E A e(x u, x v ) v V F v(x v ). It k holds that n P Ω (X = x) = P Ω (X vk = x k i < k, X vi = x i ). k= As observed in [0], the marginal probability P Ω (X vk = x k i < k, X vi = x i ) = P Ωk (X vk = x k ). Since satisfies the condition (), by Lemma 2, there exists constant C > 0 such that PΩk (X = x vk vk ) P (X vk = x vk ) poly( Ω ) exp( C t). Thus by choosing appropriate t = O ( log ɛ + log q + log n), it holds for every k that PΩk (X = x vk vk ) P (X vk = x vk ) ɛ 4qn, and since in the algorithm we always choose the x vk maximizing the value of P (X vk = x vk ), we have P (X vk = x vk ) q thus P (X vk = x vk ) q ɛ 4qn 2q. By definition we have P Ω (X = x) = w(x) w(x) Z(Ω), thus Z(Ω) = n k= P (X vk =x vk ). Therefore, we have ɛ ( ɛ ) n Z(Ω) 2n Ẑ(Ω) = n k= P (X vk = x vk ) ( P Ωk (X vk = x vk ) + ɛ ) n + ɛ, 2n which is simplified as that ɛ Ẑ(Ω) Z(Ω) + ɛ. By Proposition 2, the total running time is bounded by poly( Ω )(q ) O. Since t = O ( log ɛ + log q + log n), the algorithm is an FPTAS if q and are constants, and in general the running time is bounded by Ω O(log Ω ) for any fixed 0 < ɛ <.

12 4 List-coloring We consider list-coloring instances Ω = (G, X, L) satisfying the condition (3). Let = G be the maximum degree of G and define that = (α ) +. The condition (3) implies the following weaker condition: v V, L v deg(v). (8) A merit of considering this weaker condition is that it is closed under partial pinning and pinning. The pinning and partial pinning can be defined on listcoloring instances as they are special cases of MRFs. Given a list-coloring instance Ω = (G, X, L) with underlying graph G = (V, E) and a vertex v V with d neighbors v, v 2,..., v d, for each color x L v, the pinning of Ω is a new list-coloring instance Ω v,x = Pin v,x (Ω) = (G v, X, L), where G v is the subgraph of G induced by V \ {v} and L = ( L u, u V \ {v}) such that L u = L u \ {x} if u is adjacent to v and L u = L u if otherwise; and for each i d +, the partial pinning of Ω is a new list-coloring instance Ω i v,x = (G v, X, L), where L = ( L u, u V \ {v}) such that L u = L u \ {x} for u = v j with j < i and L u = L u for all other u in V \ {v}. The pinning and the partial pinning does not violate the condition (8) since it never increases the maximum degree, and if L v decreases by then also deg(v) decreases by. The following identity for marginals of list-coloring is proved in [0]. Proposition 3. Let Ω = (G, X, L) be a list-coloring instance on graph G = (V, E), v V a vertex with d neighbors v, v 2,..., v d where d = deg(v), and x L v a color. It holds that P Ω (X v = x) = ( ) d i= P Ω i v,x (X vi = x) ( ). d y L v i= P Ω i v,x (X vi = y) Some simple lower and upper bounds hold for the marginals, similar to the ones proved in [0]. Lemma 3. Let Ω = (G, X, L) be a list-coloring instance with the maximum degree of G, satisfying the condition (8). For any vertex v V G and any color x L v, it holds for the marginal probability that P q e α Ω (X v = x). Proof. The upper bound is easy: conditioning on any coloring of the neighbos of v, the number of remaining colors for v is at least L v deg(v), thus marginal probability is at most. Applying the upper bound to the marginals in the numerator of the recursion in Proposition 3 and the trivial upper bound q to the denominator, we have the lower bound. q e α

13 4. The computation tree recursion with adjustment Given a list-coloring instance Ω = (G, X, L) on graph G = (V, E), a vertex v V with d neighbors v, v 2,..., v d and a color x L v, the computation tree recursion f Ω,v,x can be defined on the domain of all p = (p i,y, i d y L v ) [0, ] d Lv : d i= f Ω,v,x (p) ( p i,x) d y L v i= ( p i,y). (9) For t 0, the quantity If t = 0, let If t > 0, let that ˆp i,y = P Ω (X v = x) is recursively defined as follows: P (0) Ω (X v = x) = { P Ω (X v = x) = min L, f v d Ω,v,x( p) (t ) P Ω (X v,x i vi = y) for each i d and y L v. L v. }, where the p is taken as Note that the only difference from the MRF case is the truncation of the value of f( p) so that P Ω (X v = x) never goes beyond the naive upper bound L. We v d call this procedure the computation tree recursion with adjustment. It is the same as the procedure proposed in [0] except with a more simplified value truncation. The estimation Ẑ(Ω) of the partition function is computed from these estimations P Ω (X v = x) of marginal probabilities by the same algorithm as in Section 3.. The same complexity bound as in Proposition 2 still holds. 4.2 Correlation Decay The correlation decay of the computation tree recursion with adjustment can be defined in the same way as in Definition 2. Lemma 4. The computation tree recursion with adjustment exhibits exponential correlation decay on list-coloring instances satisfying the condition (8) with α > α where α is defined by (2) in Section 2. Proof. Let Ω = (G, X, L) be a list-coloring instance on the underlying graph G = (V, E) with the maximum degree = (G) satisfying the condition (8). It can be verified that all the list-coloring instances generated by recursively applying partial pinnings on Ω still satisfy the condition (8). Let v V be a vertex with d neighbors v, v 2,..., v d, x L v a color, and f = f Ω,v,x the recursion defined by (9). It holds that P Ω (X v = x) = f(p) where p = (p i,y, i d y L v ) and each p i,y = P Ω i v,x (X vi =y). We choose the monotone differentiable function ϕ : [0, ] R so that its derivative is Φ(p) = d ϕ(p) d p = ( p) p. We define the amortized decay rate in the same way as (7) by: κ(p) f(p) Φ(f(p)) p i,y Φ(p i,y ). i d y Lv

14 By the same analysis as in Lemma, due to the mean value theorem, we have ( P ϕ (P Ω (X v = x)) ϕ Ω (X v = x)) ( ) ( P(t ) κ(p) max ϕ P i d Ω i v,x (X vi = y) ϕ Ω (X v,x i vi = y)), y Lv for some p = (p i,y, i d y L v ) such that the value of each p i,y is between (t ) P Ω i v,x (X vi = y) and P Ω (X v,x i vi = y). By Lemma 3, we have P Ω (X vi = y) and due to the definition of the algorithm, P Ω (X v i = y) L v d, thus p i,y for any i d and y L v. By our choice of Φ( ), it can be verified that d κ(p) = f(p) Φ(f(p)) p i,x Φ(p i,x ) + f(p) Φ(f(p)) p i,y Φ(p i,y ) i= ( d f(p) pi,x + i= i d y Lv \{x} d i= ) max pi,y y x ( d d i= ( p i,x) ( ) pi,x d + (d + ) i= where the last inequality is due to that p i,x ( d ) d ) d, (0) and L v d +. Let p = i= ( p i,x). Then p since all p i,x satisfy so, and d i= ( p i,x) = ( p) d. Let l i = ln( p i,x ), thus d i= l i = d ln( p). The function g(x) = e x is concave over x 0, thus by Jensen s inequality, d pi,x = i= d g(l i ) d g i= ( d ) d l i = d p. Therefore, (0) can be bounded by its symmetrized form as follows: ( ) d ( ) 2 d p κ(p) κ( p) p + d + ( + p ) where the last inequality is due to that p Let p = i= ( ) 2 p +. and d. α(α ) exp ρ for ρ [0, ]. It holds that κ( p) ( ρ+) ( ) ρ 2(α ), whose maximum is achieved when ρ = 2 (2α 4α 3), such that ( ) 2 + 2α 4α 3 3 2α + 4α 3 κ( p) κ α exp. 2α(α ) 4(α )

15 It can be verified that κ α is is monotonously decreasing from + to 0 for α >, so κ α < if α > α where α is the unique solution to κ α =, as defined by (2). Since the condition (8) is closed under partial pinning, by induction we have ( P ϕ (P Ω (X v = x)) ϕ Ω (X v = x)) κ t ϕ ( P(0) (PΩ (X u = z)) ϕ Ω (X u = z)), where Ω = (G, X, L ) is a list-coloring instance resulting from recursively applying t partial pinnings on the original Ω. By the same mean value theorem argument as in Lemma, we have P Ω (X v = x) P Ω (X v = x) Φ( p0) Φ( p) κt α, for (0) some p [0, ] and some p 0 between P Ω (X u = w) and P Ω (X u = w) = L. u Recall that the condition (8) is closed under partial pinning. It holds that q L v χ( (G )), and by Lemma 3 it also holds that P q e /(α ) Ω (X u = [ ] w) χ( (G )). Therefore, p 0. By our choice of Φ(p), we have Φ( p0) Φ( p) q e 2(α ) χ( (G )) = O( q)., q e /(α ) χ( (G )) In conclusion, if the condition (8) is satisfied with α > α , there exists a constant κ < such that P Ω (X v = x) P Ω (X v = x) O( q)κ t. Proof of Theorem 4: We first prove the theorem under the weaker condition (8), which is closed under pinning and partial pinning. The proof is the same as the proof of Theorem 3. The theorem with the stronger condition (3) follows as a consequence. References. A. Bandyopadhyay and D. Gamarnik. Counting without sampling: Asymptotics of the log-partition function for certain statistical physics models. Random Structures & Algorithms, 33(4): , M. Bayati, D. Gamarnik, D. Katz, C. Nair, and P. Tetali. Simple deterministic approximation algorithms for counting matchings. In Proceedings of STOC, pages 22 27, J.-Y. Cai and X. Chen. A decidable dichotomy theorem on directed graph homomorphisms with non-negative weights. In Proceedings FOCS, pages , J.-Y. Cai, X. Chen, and P. Lu. Graph homomorphisms with complex values: A dichotomy theorem. In Proceedings of ICALP, pages , M. Dyer, M. Jerrum, and E. Vigoda. Rapidly mixing markov chains for dismantleable constraint graphs. In RANDOM, pages M. E. Dyer, A. M. Frieze, T. P. Hayes, and E. Vigoda. Randomly coloring constant degree graphs. In Proceedings of FOCS, pages , M. E. Dyer and C. S. Greenhill. On markov chains for independent sets. Journal of Algorithms, 35():7 49, 2000.

16 8. A. Galanis, D. Štefankovič, and E. Vigoda. Inapproximability of the partition function for the antiferromagnetic ising and hard-core models. Arxiv preprint arxiv: , A. Galanis, D. Štefankovič, and E. Vigoda. Inapproximability for antiferromagnetic spin systems in the tree non-uniqueness region. arxiv preprint arxiv: , D. Gamarnik and D. Katz. Correlation decay and deterministic FPTAS for counting colorings of a graph. Journal of Discrete Algorithms, 2:29 47, D. Gamarnik, D. Katz, and S. Misra. Strong spatial mixing for list coloring of graphs. arxiv preprint arxiv: , L. Goldberg, R. Martin, and M. Paterson. Strong spatial mixing with fewer colors for lattice graphs. SIAM Journal on Computing, 35(2):486, L. A. Goldberg and M. Jerrum. A polynomial-time algorithm for estimating the partition function of the ferromagnetic ising model on a regular matroid. In Proceedings of ICALP, pages , L. A. Goldberg, M. Jerrum, and M. Paterson. The computational complexity of two-state spin systems. Random Structures & Algorithms, 23(2):33 54, T. P. Hayes. Randomly coloring graphs of girth at least five. In Proceedings of STOC, pages , M. Jerrum. A very simple algorithm for estimating the number of k-colorings of a low-degree graph. Random Structures & Algorithms, 7(2):57 66, M. Jerrum and A. Sinclair. Polynomial-time approximation algorithms for the ising model. SIAM Journal on Computing, 22(5):087 6, M. Jerrum, A. Sinclair, and E. Vigoda. A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries. Journal of the ACM, 5:67 697, July L. Li, P. Lu, and Y. Yin. Approximate counting via correlation decay in spin systems. In Proceedings of SODA, pages , L. Li, P. Lu, and Y. Yin. Correlation decay up to uniqueness in spin systems. In Proceedings of SODA, pages 67 84, M. Luby and E. Vigoda. Approximately counting up to four (extended abstract). In Proceedings of STOC, pages , R. Restrepo, J. Shin, P. Tetali, E. Vigoda, and L. Yang. Improved mixing condition on the grid for counting and sampling independent sets. In Proceedings of FOCS, pages 40 49, A. Sinclair, P. Srivastava, and M. Thurley. Approximation algorithms for twostate anti-ferromagnetic spin systems on bounded degree graphs. In Proceedings of SODA, pages , A. Sly. Uniqueness thresholds on trees versus graphs. The Annals of Applied Probability, 8(5): , A. Sly. Computational transition at the uniqueness threshold. In Proceedings of FOCS, pages , A. Sly and N. Sun. The computational hardness of counting in two-spin models on d-regular graphs. In Proceedings of FOCS, pages , E. Vigoda. Improved bounds for sampling coloring. In Proceedings of FOCS, pages 5 59, D. Weitz. Counting independent sets up to the tree threshold. In Proceedings of STOC, pages 40 49, Y. Yin and C. Zhang. Approximate counting via correlation decay on planar graphs. In Proceedings of SODA, pages 47 66, 203.

Decay of Correlation in Spin Systems

Decay of Correlation in Spin Systems (An algorithmic perspective to the) Decay of Correlation in Spin Systems Yitong Yin Nanjing University Decay of Correlation hardcore model: random independent set I v Pr[v 2 I ] (d+)-regular tree `! σ:

More information

Lecture 17: D-Stable Polynomials and Lee-Yang Theorems

Lecture 17: D-Stable Polynomials and Lee-Yang Theorems Counting and Sampling Fall 2017 Lecture 17: D-Stable Polynomials and Lee-Yang Theorems Lecturer: Shayan Oveis Gharan November 29th Disclaimer: These notes have not been subjected to the usual scrutiny

More information

Inapproximability After Uniqueness Phase Transition in Two-Spin Systems

Inapproximability After Uniqueness Phase Transition in Two-Spin Systems Inapproximability After Uniqueness Phase Transition in Two-Spin Systems Jin-Yi Cai Xi Chen Heng Guo Pinyan Lu Abstract A two-state spin system is specified by a matrix [ A0,0 A A = 0,1 = A 1,0 A 1,1 [

More information

Lecture 5: Counting independent sets up to the tree threshold

Lecture 5: Counting independent sets up to the tree threshold CS 7535: Markov Chain Monte Carlo Algorithms Fall 2014 Lecture 5: Counting independent sets up to the tree threshold Lecturer: Richard Brooks and Rakshit Trivedi Date: December 02 In this lecture, we will

More information

Lecture 6: September 22

Lecture 6: September 22 CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 6: September 22 Lecturer: Prof. Alistair Sinclair Scribes: Alistair Sinclair Disclaimer: These notes have not been subjected

More information

What can be sampled locally?

What can be sampled locally? What can be sampled locally? Yitong Yin Nanjing University Joint work with: Weiming Feng, Yuxin Sun Local Computation Locality in distributed graph algorithms. [Linial, FOCS 87, SICOMP 92] the LOCAL model:

More information

SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS

SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS SPIN SYSTEMS: HARDNESS OF APPROXIMATE COUNTING VIA PHASE TRANSITIONS Andreas Galanis Joint work with: Jin-Yi Cai Leslie Ann Goldberg Heng Guo Mark Jerrum Daniel Štefankovič Eric Vigoda The Power of Randomness

More information

The Ising Partition Function: Zeros and Deterministic Approximation

The Ising Partition Function: Zeros and Deterministic Approximation The Ising Partition Function: Zeros and Deterministic Approximation Jingcheng Liu Alistair Sinclair Piyush Srivastava University of California, Berkeley Summer 2017 Jingcheng Liu (UC Berkeley) The Ising

More information

The Complexity of Approximating Small Degree Boolean #CSP

The Complexity of Approximating Small Degree Boolean #CSP The Complexity of Approximating Small Degree Boolean #CSP Pinyan Lu, ITCS@SUFE Institute for Theoretical Computer Science Shanghai University of Finance and Economics Counting CSP F (Γ) is a family of

More information

Lecture 28: April 26

Lecture 28: April 26 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 28: April 26 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

arxiv: v1 [cs.ds] 13 Nov 2016

arxiv: v1 [cs.ds] 13 Nov 2016 An FPTAS for Counting Proper Four-Colorings on Cubic Graphs Pinyan Lu Kuan Yang Chihao Zhang Minshen Zhu arxiv:6.0400v [cs.ds] Nov 06 Abstract Graph coloring is arguably the most exhaustively studied problem

More information

The complexity of approximate counting Part 1

The complexity of approximate counting Part 1 The complexity of approximate counting Part 1 Leslie Ann Goldberg, University of Oxford Counting Complexity and Phase Transitions Boot Camp Simons Institute for the Theory of Computing January 2016 The

More information

Simple deterministic approximation algorithms for counting matchings

Simple deterministic approximation algorithms for counting matchings Simple deterministic approximation algorithms for counting matchings Mohsen Bayati David Gamarnik Dmitriy Katz Chandra Nair Prasad Tetali Abstract We construct a deterministic fully polynomial time approximation

More information

Counting Colorings on Cubic Graphs

Counting Colorings on Cubic Graphs Counting Colorings on Cubic Graphs Chihao Zhang The Chinese University of Hong Kong Joint work with Pinyan Lu (Shanghai U of Finance and Economics) Kuan Yang (Oxford University) Minshen Zhu (Purdue University)

More information

arxiv:math/ v2 [math.co] 25 Feb 2007

arxiv:math/ v2 [math.co] 25 Feb 2007 Correlation decay and deterministic FPTAS for counting list-colorings of a graph David Gamarnik Dmitriy Katz arxiv:math/060643v2 [math.co] 25 Feb 2007 February 2, 2008 Abstract We propose a deterministic

More information

Simons Workshop on Approximate Counting, Markov Chains and Phase Transitions: Open Problem Session

Simons Workshop on Approximate Counting, Markov Chains and Phase Transitions: Open Problem Session Simons Workshop on Approximate Counting, Markov Chains and Phase Transitions: Open Problem Session Scribes: Antonio Blanca, Sarah Cannon, Yumeng Zhang February 4th, 06 Yuval Peres: Simple Random Walk on

More information

Dichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia

Dichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia Dichotomy Theorems for Counting Problems Jin-Yi Cai University of Wisconsin, Madison Xi Chen Columbia University Pinyan Lu Microsoft Research Asia 1 Counting Problems Valiant defined the class #P, and

More information

Lecture 19: November 10

Lecture 19: November 10 CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 19: November 10 Lecturer: Prof. Alistair Sinclair Scribes: Kevin Dick and Tanya Gordeeva Disclaimer: These notes have not been

More information

A simple condition implying rapid mixing of single-site dynamics on spin systems

A simple condition implying rapid mixing of single-site dynamics on spin systems A simple condition implying rapid mixing of single-site dynamics on spin systems Thomas P. Hayes University of California Berkeley Computer Science Division hayest@cs.berkeley.edu Abstract Spin systems

More information

UNIQUENESS, SPATIAL MIXING, AND APPROXIMATION FOR FERROMAGNETIC 2-SPIN SYSTEMS

UNIQUENESS, SPATIAL MIXING, AND APPROXIMATION FOR FERROMAGNETIC 2-SPIN SYSTEMS UNIQUENESS, SPAIAL MIXING, AND APPROXIMAION FOR FERROMAGNEIC 2-SPIN SYSEMS HENG GUO AND PINYAN LU Abstract We give fully polynomial-time approximation schemes FPAS) for the partition function of ferromagnetic

More information

Approximate Counting and Markov Chain Monte Carlo

Approximate Counting and Markov Chain Monte Carlo Approximate Counting and Markov Chain Monte Carlo A Randomized Approach Arindam Pal Department of Computer Science and Engineering Indian Institute of Technology Delhi March 18, 2011 April 8, 2011 Arindam

More information

Lecture 5: January 30

Lecture 5: January 30 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

A Decidable Dichotomy Theorem on Directed Graph Homomorphisms with Non-negative Weights

A Decidable Dichotomy Theorem on Directed Graph Homomorphisms with Non-negative Weights A Decidable Dichotomy Theorem on Directed Graph Homomorphisms with Non-negative Weights Jin-Yi Cai Xi Chen April 7, 2010 Abstract The compleity of graph homomorphism problems has been the subject of intense

More information

A Deterministic Fully Polynomial Time Approximation Scheme For Counting Integer Knapsack Solutions Made Easy

A Deterministic Fully Polynomial Time Approximation Scheme For Counting Integer Knapsack Solutions Made Easy A Deterministic Fully Polynomial Time Approximation Scheme For Counting Integer Knapsack Solutions Made Easy Nir Halman Hebrew University of Jerusalem halman@huji.ac.il July 3, 2016 Abstract Given n elements

More information

Lower Bounds for Testing Bipartiteness in Dense Graphs

Lower Bounds for Testing Bipartiteness in Dense Graphs Lower Bounds for Testing Bipartiteness in Dense Graphs Andrej Bogdanov Luca Trevisan Abstract We consider the problem of testing bipartiteness in the adjacency matrix model. The best known algorithm, due

More information

Lecture 16: Roots of the Matching Polynomial

Lecture 16: Roots of the Matching Polynomial Counting and Sampling Fall 2017 Lecture 16: Roots of the Matching Polynomial Lecturer: Shayan Oveis Gharan November 22nd Disclaimer: These notes have not been subjected to the usual scrutiny reserved for

More information

Randomly coloring constant degree graphs

Randomly coloring constant degree graphs Randomly coloring constant degree graphs Martin Dyer Alan Frieze Thomas P. Hayes Eric Vigoda April 6, 2011 Abstract We study a simple Markov chain, known as the Glauber dynamics, for generating a random

More information

Counting independent sets up to the tree threshold

Counting independent sets up to the tree threshold Counting independent sets up to the tree threshold Dror Weitz March 16, 2006 Abstract We consider the problem of approximately counting/sampling weighted independent sets of a graph G with activity λ,

More information

Not all counting problems are efficiently approximable. We open with a simple example.

Not all counting problems are efficiently approximable. We open with a simple example. Chapter 7 Inapproximability Not all counting problems are efficiently approximable. We open with a simple example. Fact 7.1. Unless RP = NP there can be no FPRAS for the number of Hamilton cycles in a

More information

Strongly chordal and chordal bipartite graphs are sandwich monotone

Strongly chordal and chordal bipartite graphs are sandwich monotone Strongly chordal and chordal bipartite graphs are sandwich monotone Pinar Heggernes Federico Mancini Charis Papadopoulos R. Sritharan Abstract A graph class is sandwich monotone if, for every pair of its

More information

PHASE TRANSITIONS IN THE COMPLEXITY OF COUNTING

PHASE TRANSITIONS IN THE COMPLEXITY OF COUNTING PHASE TRANSITIONS IN THE COMPLEXITY OF COUNTING A Thesis Presented to The Academic Faculty by Andreas Galanis In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in Algorithms,

More information

Lecture 6: Random Walks versus Independent Sampling

Lecture 6: Random Walks versus Independent Sampling Spectral Graph Theory and Applications WS 011/01 Lecture 6: Random Walks versus Independent Sampling Lecturer: Thomas Sauerwald & He Sun For many problems it is necessary to draw samples from some distribution

More information

7.1 Coupling from the Past

7.1 Coupling from the Past Georgia Tech Fall 2006 Markov Chain Monte Carlo Methods Lecture 7: September 12, 2006 Coupling from the Past Eric Vigoda 7.1 Coupling from the Past 7.1.1 Introduction We saw in the last lecture how Markov

More information

Siegel s theorem, edge coloring, and a holant dichotomy

Siegel s theorem, edge coloring, and a holant dichotomy Siegel s theorem, edge coloring, and a holant dichotomy Tyson Williams (University of Wisconsin-Madison) Joint with: Jin-Yi Cai and Heng Guo (University of Wisconsin-Madison) Appeared at FOCS 2014 1 /

More information

Computing the Independence Polynomial: from the Tree Threshold Down to the Roots

Computing the Independence Polynomial: from the Tree Threshold Down to the Roots 1 / 16 Computing the Independence Polynomial: from the Tree Threshold Down to the Roots Nick Harvey 1 Piyush Srivastava 2 Jan Vondrák 3 1 UBC 2 Tata Institute 3 Stanford SODA 2018 The Lovász Local Lemma

More information

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness

More information

Lecture 24: April 12

Lecture 24: April 12 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 24: April 12 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Copyright 2013 Springer Science+Business Media New York

Copyright 2013 Springer Science+Business Media New York Meeks, K., and Scott, A. (2014) Spanning trees and the complexity of floodfilling games. Theory of Computing Systems, 54 (4). pp. 731-753. ISSN 1432-4350 Copyright 2013 Springer Science+Business Media

More information

Approximate Counting of Matchings in Sparse Uniform Hypergraphs

Approximate Counting of Matchings in Sparse Uniform Hypergraphs Approximate Counting of Matchings in Sparse Uniform Hypergraphs Marek Karpiński Andrzej Ruciński Edyta Szymańska Abstract In this paper we give a fully polynomial randomized approximation scheme (FPRAS)

More information

XVI International Congress on Mathematical Physics

XVI International Congress on Mathematical Physics Aug 2009 XVI International Congress on Mathematical Physics Underlying geometry: finite graph G=(V,E ). Set of possible configurations: V (assignments of +/- spins to the vertices). Probability of a configuration

More information

The coupling method - Simons Counting Complexity Bootcamp, 2016

The coupling method - Simons Counting Complexity Bootcamp, 2016 The coupling method - Simons Counting Complexity Bootcamp, 2016 Nayantara Bhatnagar (University of Delaware) Ivona Bezáková (Rochester Institute of Technology) January 26, 2016 Techniques for bounding

More information

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods. Lecture 7: November 11, 2003 Estimating the permanent Eric Vigoda

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods. Lecture 7: November 11, 2003 Estimating the permanent Eric Vigoda University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 7: November 11, 2003 Estimating the permanent Eric Vigoda We refer the reader to Jerrum s book [1] for the analysis

More information

From Holant To #CSP And Back: Dichotomy For Holant c Problems

From Holant To #CSP And Back: Dichotomy For Holant c Problems From Holant To #CSP And Back: Dichotomy For Holant c Problems Jin-Yi Cai Sangxia Huang Pinyan Lu Abstract We explore the intricate interdependent relationship among counting problems considered from three

More information

Lecture 9: Counting Matchings

Lecture 9: Counting Matchings Counting and Sampling Fall 207 Lecture 9: Counting Matchings Lecturer: Shayan Oveis Gharan October 20 Disclaimer: These notes have not been subjected to the usual scrutiny reserved for formal publications.

More information

Conjectures and Questions in Graph Reconfiguration

Conjectures and Questions in Graph Reconfiguration Conjectures and Questions in Graph Reconfiguration Ruth Haas, Smith College Joint Mathematics Meetings January 2014 The Reconfiguration Problem Can one feasible solution to a problem can be transformed

More information

Statistical Physics on Sparse Random Graphs: Mathematical Perspective

Statistical Physics on Sparse Random Graphs: Mathematical Perspective Statistical Physics on Sparse Random Graphs: Mathematical Perspective Amir Dembo Stanford University Northwestern, July 19, 2016 x 5 x 6 Factor model [DM10, Eqn. (1.4)] x 1 x 2 x 3 x 4 x 9 x8 x 7 x 10

More information

Kernelization by matroids: Odd Cycle Transversal

Kernelization by matroids: Odd Cycle Transversal Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the

More information

Accelerating Simulated Annealing for the Permanent and Combinatorial Counting Problems

Accelerating Simulated Annealing for the Permanent and Combinatorial Counting Problems Accelerating Simulated Annealing for the Permanent and Combinatorial Counting Problems Ivona Bezáková Daniel Štefankovič Vijay V. Vazirani Eric Vigoda Abstract We present an improved cooling schedule for

More information

Notes on Graph Theory

Notes on Graph Theory Notes on Graph Theory Maris Ozols June 8, 2010 Contents 0.1 Berge s Lemma............................................ 2 0.2 König s Theorem........................................... 3 0.3 Hall s Theorem............................................

More information

arxiv: v2 [cs.ds] 11 Nov 2017

arxiv: v2 [cs.ds] 11 Nov 2017 Computing the Independence Polynomial: from the Tree Threshold down to the Roots Nicholas J. A. Harvey Piyush Srivastava Jan Vondrák arxiv:1608.02282v2 [cs.ds] 11 Nov 2017 Abstract We study an algorithm

More information

Model Counting for Logical Theories

Model Counting for Logical Theories Model Counting for Logical Theories Wednesday Dmitry Chistikov Rayna Dimitrova Department of Computer Science University of Oxford, UK Max Planck Institute for Software Systems (MPI-SWS) Kaiserslautern

More information

Undirected Graphical Models

Undirected Graphical Models Undirected Graphical Models 1 Conditional Independence Graphs Let G = (V, E) be an undirected graph with vertex set V and edge set E, and let A, B, and C be subsets of vertices. We say that C separates

More information

Notes on MapReduce Algorithms

Notes on MapReduce Algorithms Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our

More information

An FPTAS for the Volume of Some V-polytopes It is Hard to Compute the Volume of the Intersection of Two Cross-Polytopes

An FPTAS for the Volume of Some V-polytopes It is Hard to Compute the Volume of the Intersection of Two Cross-Polytopes An FPTAS for the Volume of Some V-polytopes It is Hard to Compute the Volume of the Intersection of Two Cross-Polytopes Ei Ando 1(B) and Shuji Kijima 2,3 1 Sojo University, 4-22-1, Ikeda, Nishi-Ku, Kumamoto

More information

On the complexity of approximate multivariate integration

On the complexity of approximate multivariate integration On the complexity of approximate multivariate integration Ioannis Koutis Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 USA ioannis.koutis@cs.cmu.edu January 11, 2005 Abstract

More information

Oberwolfach workshop on Combinatorics and Probability

Oberwolfach workshop on Combinatorics and Probability Apr 2009 Oberwolfach workshop on Combinatorics and Probability 1 Describes a sharp transition in the convergence of finite ergodic Markov chains to stationarity. Steady convergence it takes a while to

More information

Counting with Bounded Treewidth

Counting with Bounded Treewidth Counting with Bounded Treewidth Yitong Yin Nanjing University Joint work with Chihao Zhang (SJTU?) Spin Systems graph G=(V,E) A (u,v) vertices are variables (domain [q]) edge are constraints: e=(u,v) E

More information

Directed and Undirected Graphical Models

Directed and Undirected Graphical Models Directed and Undirected Davide Bacciu Dipartimento di Informatica Università di Pisa bacciu@di.unipi.it Machine Learning: Neural Networks and Advanced Models (AA2) Last Lecture Refresher Lecture Plan Directed

More information

Lecture 1: Introduction: Equivalence of Counting and Sampling

Lecture 1: Introduction: Equivalence of Counting and Sampling Counting and Sampling Fall 2017 Lecture 1: Introduction: Equivalence of Counting and Sampling Lecturer: Shayan Oveis Gharan Sept 27 Disclaimer: These notes have not been subjected to the usual scrutiny

More information

k-degenerate Graphs Allan Bickle Date Western Michigan University

k-degenerate Graphs Allan Bickle Date Western Michigan University k-degenerate Graphs Western Michigan University Date Basics Denition The k-core of a graph G is the maximal induced subgraph H G such that δ (H) k. The core number of a vertex, C (v), is the largest value

More information

An asymptotically tight bound on the adaptable chromatic number

An asymptotically tight bound on the adaptable chromatic number An asymptotically tight bound on the adaptable chromatic number Michael Molloy and Giovanna Thron University of Toronto Department of Computer Science 0 King s College Road Toronto, ON, Canada, M5S 3G

More information

The Classification Program II: Tractable Classes and Hardness Proof

The Classification Program II: Tractable Classes and Hardness Proof The Classification Program II: Tractable Classes and Hardness Proof Jin-Yi Cai (University of Wisconsin-Madison) January 27, 2016 1 / 104 Kasteleyn s Algorithm and Matchgates Previously... By a Pfaffian

More information

A reverse Sidorenko inequality Independent sets, colorings, and graph homomorphisms

A reverse Sidorenko inequality Independent sets, colorings, and graph homomorphisms A reverse Sidorenko inequality Independent sets, colorings, and graph homomorphisms Yufei Zhao (MIT) Joint work with Ashwin Sah (MIT) Mehtaab Sawhney (MIT) David Stoner (Harvard) Question Fix d. Which

More information

arxiv: v2 [math.co] 6 Sep 2016

arxiv: v2 [math.co] 6 Sep 2016 Acyclic chromatic index of triangle-free -planar graphs Jijuan Chen Tao Wang Huiqin Zhang Institute of Applied Mathematics Henan University, Kaifeng, 475004, P. R. China arxiv:504.06234v2 [math.co] 6 Sep

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

Decomposition Methods and Sampling Circuits in the Cartesian Lattice

Decomposition Methods and Sampling Circuits in the Cartesian Lattice Decomposition Methods and Sampling Circuits in the Cartesian Lattice Dana Randall College of Computing and School of Mathematics Georgia Institute of Technology Atlanta, GA 30332-0280 randall@math.gatech.edu

More information

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided

More information

Coupling. 2/3/2010 and 2/5/2010

Coupling. 2/3/2010 and 2/5/2010 Coupling 2/3/2010 and 2/5/2010 1 Introduction Consider the move to middle shuffle where a card from the top is placed uniformly at random at a position in the deck. It is easy to see that this Markov Chain

More information

arxiv: v3 [math.co] 18 Jul 2017

arxiv: v3 [math.co] 18 Jul 2017 Deterministic polynomial-time approximation algorithms for partition functions and graph polynomials Viresh Patel Guus Regts. arxiv:1607.01167v3 [math.co] 18 Jul 2017 July 19, 2017 Abstract In this paper

More information

Polynomial-time classical simulation of quantum ferromagnets

Polynomial-time classical simulation of quantum ferromagnets Polynomial-time classical simulation of quantum ferromagnets Sergey Bravyi David Gosset IBM PRL 119, 100503 (2017) arxiv:1612.05602 Quantum Monte Carlo: a powerful suite of probabilistic classical simulation

More information

CONSTRAINED PERCOLATION ON Z 2

CONSTRAINED PERCOLATION ON Z 2 CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

Probabilistic Graphical Models Lecture Notes Fall 2009

Probabilistic Graphical Models Lecture Notes Fall 2009 Probabilistic Graphical Models Lecture Notes Fall 2009 October 28, 2009 Byoung-Tak Zhang School of omputer Science and Engineering & ognitive Science, Brain Science, and Bioinformatics Seoul National University

More information

A Min-Max Theorem for k-submodular Functions and Extreme Points of the Associated Polyhedra. Satoru FUJISHIGE and Shin-ichi TANIGAWA.

A Min-Max Theorem for k-submodular Functions and Extreme Points of the Associated Polyhedra. Satoru FUJISHIGE and Shin-ichi TANIGAWA. RIMS-1787 A Min-Max Theorem for k-submodular Functions and Extreme Points of the Associated Polyhedra By Satoru FUJISHIGE and Shin-ichi TANIGAWA September 2013 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES

More information

Dynamics for the critical 2D Potts/FK model: many questions and a few answers

Dynamics for the critical 2D Potts/FK model: many questions and a few answers Dynamics for the critical 2D Potts/FK model: many questions and a few answers Eyal Lubetzky May 2018 Courant Institute, New York University Outline The models: static and dynamical Dynamical phase transitions

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

Approximability of Packing Disjoint Cycles

Approximability of Packing Disjoint Cycles Approximability of Packing Disjoint Cycles Zachary Friggstad Mohammad R. Salavatipour Department of Computing Science University of Alberta Edmonton, Alberta T6G 2E8, Canada zacharyf,mreza@cs.ualberta.ca

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Extremal Graphs Having No Stable Cutsets

Extremal Graphs Having No Stable Cutsets Extremal Graphs Having No Stable Cutsets Van Bang Le Institut für Informatik Universität Rostock Rostock, Germany le@informatik.uni-rostock.de Florian Pfender Department of Mathematics and Statistics University

More information

A multivariate interlace polynomial

A multivariate interlace polynomial A multivariate interlace polynomial Bruno Courcelle LaBRI, Université Bordeaux 1 and CNRS General objectives : Logical descriptions of graph polynomials Application to their computations Systematic construction

More information

Classification for Counting Problems

Classification for Counting Problems Classification for Counting Problems Jin-Yi Cai (University of Wisconsin-Madison) Thanks to many collaborators: Xi Chen, Zhiguo Fu, Kurt Girstmair, Heng Guo, Mike Kowalczyk, Pinyan Lu, Tyson Williams...

More information

Propp-Wilson Algorithm (and sampling the Ising model)

Propp-Wilson Algorithm (and sampling the Ising model) Propp-Wilson Algorithm (and sampling the Ising model) Danny Leshem, Nov 2009 References: Haggstrom, O. (2002) Finite Markov Chains and Algorithmic Applications, ch. 10-11 Propp, J. & Wilson, D. (1996)

More information

Testing Equality in Communication Graphs

Testing Equality in Communication Graphs Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected

More information

Hard-Core Model on Random Graphs

Hard-Core Model on Random Graphs Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,

More information

arxiv: v2 [cs.ds] 28 Jun 2018

arxiv: v2 [cs.ds] 28 Jun 2018 THE ISING PARTITION FUNCTION: ZEROS AND DETERMINISTIC APPROXIMATION JINGCHENG LIU, ALISTAIR SINCLAIR, AND PIYUSH SRIVASTAVA arxiv:704.06493v2 [cs.ds] 28 Jun 208 Abstract. We study the problem of approximating

More information

Hardness of Embedding Metric Spaces of Equal Size

Hardness of Embedding Metric Spaces of Equal Size Hardness of Embedding Metric Spaces of Equal Size Subhash Khot and Rishi Saket Georgia Institute of Technology {khot,saket}@cc.gatech.edu Abstract. We study the problem embedding an n-point metric space

More information

Some hard families of parameterised counting problems

Some hard families of parameterised counting problems Some hard families of parameterised counting problems Mark Jerrum and Kitty Meeks School of Mathematical Sciences, Queen Mary University of London {m.jerrum,k.meeks}@qmul.ac.uk September 2014 Abstract

More information

arxiv: v2 [math.pr] 26 Aug 2017

arxiv: v2 [math.pr] 26 Aug 2017 CONSTRAINED PERCOLATION, ISING MODEL AND XOR ISING MODEL ON PLANAR LATTICES ZHONGYANG LI arxiv:1707.04183v2 [math.pr] 26 Aug 2017 Abstract. We study constrained percolation models on planar lattices including

More information

Can extra updates delay mixing?

Can extra updates delay mixing? Can extra updates delay mixing? Yuval Peres Peter Winkler July 7, 2010 Abstract We consider Glauber dynamics (starting from an extremal configuration) in a monotone spin system, and show that interjecting

More information

Rapid Introduction to Machine Learning/ Deep Learning

Rapid Introduction to Machine Learning/ Deep Learning Rapid Introduction to Machine Learning/ Deep Learning Hyeong In Choi Seoul National University 1/24 Lecture 5b Markov random field (MRF) November 13, 2015 2/24 Table of contents 1 1. Objectives of Lecture

More information

Lecture 3: Lower Bounds for Bandit Algorithms

Lecture 3: Lower Bounds for Bandit Algorithms CMSC 858G: Bandits, Experts and Games 09/19/16 Lecture 3: Lower Bounds for Bandit Algorithms Instructor: Alex Slivkins Scribed by: Soham De & Karthik A Sankararaman 1 Lower Bounds In this lecture (and

More information

On Markov chains for independent sets

On Markov chains for independent sets On Markov chains for independent sets Martin Dyer and Catherine Greenhill School of Computer Studies University of Leeds Leeds LS2 9JT United Kingdom Submitted: 8 December 1997. Revised: 16 February 1999

More information

Dichotomy Theorems in Counting Complexity and Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Supported by NSF CCF

Dichotomy Theorems in Counting Complexity and Holographic Algorithms. Jin-Yi Cai University of Wisconsin, Madison. Supported by NSF CCF Dichotomy Theorems in Counting Complexity and Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison September 7th, 204 Supported by NSF CCF-27549. The P vs. NP Question It is generally conjectured

More information

Balanced Allocation Through Random Walk

Balanced Allocation Through Random Walk Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.

More information

The Ising Partition Function: Zeros and Deterministic Approximation

The Ising Partition Function: Zeros and Deterministic Approximation 58th Annual IEEE Symposium on Foundations of Computer Science The Ising Partition Function: Zeros and Deterministic Approximation Jingcheng Liu University of California, Berkeley Email: liuexp@berkeley.edu

More information

Dominating Set Counting in Graph Classes

Dominating Set Counting in Graph Classes Dominating Set Counting in Graph Classes Shuji Kijima 1, Yoshio Okamoto 2, and Takeaki Uno 3 1 Graduate School of Information Science and Electrical Engineering, Kyushu University, Japan kijima@inf.kyushu-u.ac.jp

More information

Lecture 3: September 10

Lecture 3: September 10 CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 3: September 10 Lecturer: Prof. Alistair Sinclair Scribes: Andrew H. Chan, Piyush Srivastava Disclaimer: These notes have not

More information

Computing bounds for entropy of stationary Z d -Markov random fields. Brian Marcus (University of British Columbia)

Computing bounds for entropy of stationary Z d -Markov random fields. Brian Marcus (University of British Columbia) Computing bounds for entropy of stationary Z d -Markov random fields Brian Marcus (University of British Columbia) Ronnie Pavlov (University of Denver) WCI 2013 Hong Kong University Dec. 11, 2013 1 Outline

More information

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms Part a: You are given a graph G = (V,E) with edge weights w(e) > 0 for e E. You are also given a minimum cost spanning tree (MST) T. For one particular edge

More information

An Algorithmist s Toolkit September 24, Lecture 5

An Algorithmist s Toolkit September 24, Lecture 5 8.49 An Algorithmist s Toolkit September 24, 29 Lecture 5 Lecturer: Jonathan Kelner Scribe: Shaunak Kishore Administrivia Two additional resources on approximating the permanent Jerrum and Sinclair s original

More information