in [8]. A class F is closed under f if the composition of f with any function in F is again a function in F. Of highest importance are (non-constructi
|
|
- Octavia Nicholson
- 6 years ago
- Views:
Transcription
1 A Note on Unambiguous Function Classes Sven Kosub Theoretische Informatik, Julius-Maximilians-Universitat Wurzburg, Am Hubland, D Wurzburg, Germany Key words: Computational complexity, unambiguous computation, function classes 1 Introduction Unambiguous computation according to UP has become a classical notion in computational complexity theory. Unambiguity is also used in a theorem of Wagner [14]. A set L is in P NP i there are a set A 2 NP and a polynomial p such that for all x and y with jyj p(jxj), if (x; y) 2 A then (x; y? 1) 2 A, and x 2 L i the maximal y with (x; y) 2 A is odd. Here, essentially for each x all positive y's must be neighbored, they form a cluster, where 0 is always in the cluster if one exists. Unambiguity is reected in the existence of at most one such cluster. This construction is crucially relevant for parallel access to NP (see [14]). The same idea occurs in the denition of the complexity-theoretic operator F [13]: FK is the class of all functions f for which there exist an A 2 K and polynomial p as above with f(x) = supfyjjyj p(jxj) ^ (x; y) 2 Ag. This operator plays a key role as part of an operator pair to compare function classes and set classes. Note that maximization can be replaced with cardinality whenever K is closed under P m-reductions. Above, all clusters contain 0 as minimal element. In this note, we drop this requirement. Let us consider (polynomially time-bounded) nondeterministic machines where the set of accepting paths is always a cluster. As we will see, such cluster machines can be easily transformed into UP-machines. The point why it is nevertheless sensible to study these machines is that cluster machines capture UP-machines that actually can count. This feature is expressed in the unambiguous counting class c#p{the #P-version for cluster machines. The class c#p shows astonishing behavior with respect to closure properties. A theory of closure properties for complexity classes of functions was established Preprint submitted to Elsevier Preprint 22 November 1999
2 in [8]. A class F is closed under f if the composition of f with any function in F is again a function in F. Of highest importance are (non-constructively) hard closure properties{a function f is hard for F if the case that F is closed under f is equivalent to F being closed under every function from F. Using the structural assumption PP = UP, it was proved that, e.g., division is a hard closure property for #P [8]. First, we prove that c#p also possesses hard closure properties. This is surprising insofar as c#p is a promise class, i.e., a class without an obvious enumeration of its underlying machines. Even so, we identify operations (expressed by c#p-functions) being able to simulate any other operation (expressible as a c#p-function) over cluster machines. A second remarkable property is the following: It was observed that #P has intermediate closure properties (e.g., minimization [8]), i.e., functions that are neither hard nor is #P closed under them. Provably, c#p does not have (unary) intermediate closure properties. We give a criterion for deciding if a function is c#p-hard or c#p is closed under it. From [8,2,3], hard closure properties are expected to reduce the number of witnesses, e.g., division for #P. Here, however, the situation is completely dierent. We show that incrementation is c#p-hard, while c#p is closed under division. Hence, this is an instructive example where the term \witness reduction" is not to be taken literally, but rather in the sense of simplifying the witness set (see the discussion in [2, pp ]). Unambiguous clustering is furthermore studied in a more general setting for counting and optimization. Remember that for \xed" clusters (as in the denition of the operator F), maximization and counting coincide. For \free" clusters, this is not to be expected. We consider three unambiguous operators corresponding to those in [11,4]: counting (c#), maximization (cmax), and minimization (cmin) within clusters. These operators are compared to each other{giving a taxonomy of classes similar to [4]{and to the related ambiguous operators in the context of classes of the polynomial hierarchy. Mostly, proofs are straightforward, but they show in an intuitive way how strong clustering and unambiguity are connected. 2 Preliminaries We use the nite alphabet = f0; 1g. The cardinality of a set L is denoted by #L. Let c L denote the characteristic function of L. Usually we interpret a word x as the binary encoding of a natural number. For closure properties, we need a bijection between and N. We suppose the standard 2
3 lexicographical ordering of. For a function f :!, the notation x:f(x) stands for the mapping x 7! f(x). The function sgn : N! N is dened as sgn x = 1, if x > 0, and sgn x = 0, if x = 0. Our computational model is the standard nondeterministic Turing machine [9]. M(x) denotes the computation tree of a machine M on input x. In case of polynomial time resources we suppose complete binary computation trees. For computation trees M(x), we dene acc M (x) as the set of all accepting paths of M(x), and out + M(x) (out? M(x)) as the set of all outputs on accepting (rejecting, resp.) paths of M(x). We use some shorthands for machine types: NTM stands for nondeterministic Turing machine, and NPTM for polynomial-time NTM. We deal with the standard complexity classes P; UP; coup; NP; conp; PP; C = P; PH; CH, and their relativizations [5,9]. To describe function classes, we use the modern operator notation provided in [11,13,4]. A function f is in #K if there exist a set A 2 K and a polynomial p such that f(x) = #fyjjyj = p(jxj) and (x; y) 2 Ag for every x [11]. We abbreviate such witness sets as A p x. A function f is in max K if there is an A 2 K and a polynomial p such that f(x) = max A p for every x [4]. Replacing max by min gives the class x min K. To consider total functions we dene maximum and minimum of the empty set to be 0, what is in the second case a little dierent from the original denition [4] but is more compatible with the partial case. FP = F P [13] denotes the class of functions computable in deterministic polynomial time. 3 Clusters, Unambiguous Counting, and Closure Properties We formalize the concept of clusters by introducing certain equivalence relations. Let M be an NTM, and let y and z be paths of M(x) for input x 2. We write y M(x) z i jy? zj = 1 (i.e., y and z are neighboring paths) and M(x) accepts on path y if and only if M(x) accepts on path z. The relation M(x) (the reexive and transitive closure of M(x)) is an equivalence relation partitioning M(x) in equivalence classes. A cluster is an equivalence class whose representatives are accepting paths of M(x). Denition 1 An NTM M is a cluster machine if and only if for every x 2, there is a path y of M(x) such that fzjz M(x) y ^ y 2 acc M(x)g = acc M (x). An NTM M computes a function f uniquely i out + M(x) = ff(x)g and #acc M (x) = 1 for every x, and M computes f almost-uniquely i f(x) > 0 implies out + M(x) = ff(x)g ^ #acc M (x) = 1 and f(x) = 0 implies out + M(x) =?, both 3
4 for every x. Theorem 2 (1) If an NPTM M computes f uniquely, then there is a polynomialtime cluster machine (PCM) N such that #acc N (x) = f(x) for all x 2. (2) For every PCM N fullling #acc N (x) > 0 for every x 2, there is an NPTM M that computes the function #acc N uniquely. (3) There is an NPTM M that computes the function f almost-uniquely if and only if there exists a PCM N fullling #acc N (x) = f(x) for every x 2. PROOF. (1) is obvious. For (2), let N be a PCM such that smallest and largest computation paths of N are rejecting, and N is time-bounded by polynomial p. Dene K to be the machine that, on input x, (a) guesses paths y 1 and y 2 with y 1 < y 2 ; jy 1 j = jy 2 j = p(jxj), (b) simulates successively N(x) on y 1 (result 1 ) and on y (result 1 ), (c) simulates successively N(x) on y 2 (result 2 ) and on y mod 2 p(jxj) (result 2 ), and (d) outputs y 2? y 1 and accepts i ( 1 1 ) ^ ( 2 2 ) is true. Clearly, K is an NPTM, and since #acc N (x) > 0 we get #acc K (x) = 1 and out + K(x) = ff(x)g. (3) combines (1) and (2). 2 Corollary 3 For every set A 2 NP there is a PCM accepting A in the sense of NP if and only if NP = UP. The following results concern the class of counting functions computed by PCM's. Denition 4 c#p = f#acc M jm is a PCMg: The class UPSV [1] consists of all partial functions f such that there is an NPTM M with at most one accepting path, #acc M (x) = 1 i f(x) is dened, and #acc M (x) = 1 implies out + M(x) = ff(x)g. UPSV t is the class of all total functions in UPSV. Theorem 5 (1) UPSV t c#p. (2) UPSV t = c#p if and only if UP = coup. (3) A function f is in UPSV t if and only if its incremented version f 0, dened as f 0 (x) = f(x) + 1, is in c#p. PROOF. (1) and (3) are immediate from Theorem 2. For (2), rst, suppose UPSV t = c#p. Let A 2 UP, then c A 2 c#p UPSV t (the latter via NPTM M). Modifying M so that on unique accepting paths it is accepted i output is 0, yields A 2 coup. Conversely, suppose UP = coup. Let f 2 c#p. Dene A = fxjf(x) 1g. Then A; A 2 UP. Consider an NPTM M that, on input x, 4
5 on paths beginning with 0 decides x 2 A, on paths beginning with 1 decides x 2 A, if the accepting path gives x 2 A then outputs f(x), and if the accepting path gives x 2 A then outputs 0. Thus, f 2 UPSV t. 2 Closure properties for complexity-theoretic function classes were rst studied in [8]: A closure property is a function f : N n! N for n 2 N, an f 2 F is called an F-closure property. A class F is closed under f i for all g 1 ; : : : ; g n 2 F the function h is in F where h(x) = f(g 1 (x); : : : ; g n (x)). F is called G-closed i F is closed under all G-closure properties. A function f 2 F is F-hard whenever F is closed under f i F is F-closed. Theorem 6 The following statements are equivalent. (1) UP = coup. (2) c#p is closed under incrementation. (3) c#p is FP-closed. (4) c#p is c#p-closed. PROOF. Use Theorem 5 and note that UPSV t is UPSV t -closed. 2 It is well known that strong collapses of complexity classes such as PP = UP, PP = NP, or P PP = NP, can be characterized by closure properties of some function classes (see [8,3]). The preceding theorem shows that, surprisingly, the very weak collapse UP = coup has such a characterization, too. Corollary 7 There is relativized world in which c#p is not c#p-closed. PROOF. Observe that relativizably, UP = coup implies NP UP = NP. However in [10], an oracle was given which contradicts this equality. Note that all our proofs relativize. 2 A function f : N n! N is said to be 0-reproducing in its k-th component i m k = 0 implies f(m 1 ; : : : ; m n ) = 0 for all m 1 ; : : : ; m k?1 ; m k+1 ; : : : ; m n 2 N. Moreover, f is 0-reproducing i f is 0-reproducing in every component. Theorem 8 Let f be an n-ary c#p-closure property. (1) If f is constant or 0-reproducing, then c#p is closed under f. (2) Let h 1 ; : : : ; h k?1 ; h k+1 ; : : : ; h n 2 FP. If f is 0-reproducing in its k-th component, then c#p is closed under x:f(h 1 (x); : : : ; h k?1 (x); x; h k+1 (x); : : : ; h n (x)): 5
6 PROOF. (1): The case if f is constant is trivial. So, let f be 0-reproducing, let g 1 ; : : : ; g n 2 c#p be almost-uniquely computed by NPTM's M 1 ; : : : ; M n, and let D be a PCM with f = #acc D. Dene h(x) = f(hg 1 (x); : : : ; g n (x)i), and consider a machine N that, on x, (a) simulates M i (x) successively for all i in increasing order, (b) computes hz 1 ; : : : ; z n i if all simulations in (a) accept, where z i is the output of M i (x) on the accepting path, and (c) simulates D on hz 1 ; : : : ; z n i. Since there is always at most one path where all simulations of M i accept, N is a PCM with h(x) = #acc N (x). Thus h 2 c#p. (2) is similar to (1). 2 As an example, Theorem 8 immediately gives that c#p is closed under division. This should be contrasted to the results for #P in [8]. Theorem 9 Let f be an n-ary c#p-closure property. If there are k 2 N with 1 k n, and x 1 ; : : : ; x k?1 ; x k+1 ; : : : ; x n 2 N such that x:f(x 1 ; : : : ; x k?1 ; x; x k+1 ; : : : ; x n ) is neither 0-reproducing nor constant, then f is c#p-hard. PROOF. Suppose k; x 1 ; : : : ; x k?1 ; x k+1 ; : : : ; x n make the premise true. To prove that f is c#p-hard, assume c#p is closed under f. We have to show that c#p is c#p-closed. So, let '(x) = f(x 1 ; : : : ; x k?1 ; x; x k+1 ; : : : ; x n ). Thus, c#p is closed under '. Since ' is not 0-reproducing, 0 < '(0) = c 1. Since ' is not constant, there is a minimal z 0 so that c 1 6= '(z 0 ) = c 2. Dening (x) = '(min(z 0 ; z 0 x)), we have x = 0 ) (x) = c 1 and x > 0 ) (x) = c 2. Since multiplication and minimization are 0-reproducing and since c#p is closed under ', c#p is closed under. Now, there are two cases depending on c 2. If c 2 = 0, then dene t = sgn, i.e., x = 0 ) t(x) = 1 and x > 0 ) t(x) = 0. Observe that sgn is 0-reproducing. If c 2 > 0, then (x) > 0 for all x, thus is almost-uniquely computable, and there is t 2 c#p with x = 0 ) t(x) = 1 and x > 0 ) t(x) = 0. In both cases, c#p is closed under t, and t 2 c#p. Now, let A 2 UP. Then, c A (x) = 1, t(c A (x)) = 0 and c A (x) = 0, t(c A (x)) = 1. Hence, A 2 coup. Thus, UP = coup and using Theorem 6 we get that c#p is c#p-closed. 2 Though we do not know whether c#p is c#p-closed, Theorem 8 and Theorem 9 yield a criterion to decide whether a unary function f 2 c#p is hard for c#p or not: If f is neither 0-reproducing nor constant, then it is hard, otherwise c#p is closed under f. Corollary 10 For every unary c#p-closure property f, it holds that c#p is closed under f in all relativizations if and only if f is 0-reproducing or constant. 6
7 P = UP PH = UP NP = UP NP P NP = UP NP P P = UP c# P NP cmax P NP = cmin P NP FP NP cmin conp cmax conp P NP = UP NP P NP = UP NP P NP = UP NP P NP = UP NP c# conp cmax NP = c# NP cmin NP PH = UP PH = UP c# P cmax P = cmin P FP Key: a bold line means the inclusion of the lower in the upper class F F F G G G means F G =) means F G () means F G () and F G () Fig. 1. A taxonomy of clustering. 4 A Taxonomy of Clustering in Counting and Optimization In this section we generalize our denitions to arbitrary sets. For that, let A, and let A x = fyjhx; yi 2 Ag. For x; y; z 2, we write y x z i jy? zj = 1 and hx; yi 2 A, hx; zi 2 A. The relation is dened as the x equivalence relation generated by x. A is said to be a cluster set i for every 7
8 x there is an y such that A x = fzjz x y ^ hx; yi 2 Ag. The unambiguous cluster versions of the ordinary operators are obtained if we allow the operators to vary only over cluster sets in a class K. A function f is in c# K i there are a cluster set A 2 K and a polynomial p so that f(x) = #A p for every x. Evidently, c# P = c#p: The denitions of cmax x and cmin are similar. Note that, though the value f(x) above depends on A p x, we require that A is a cluster set, not only the set A p dened as fhx; yijjyj p(jxj) ^ hx; yi 2 Ag. Generally, to require that only A p is a cluster set leads to larger classes. However, for classes K closed under P m-reductions or closed under intersection with P-sets, both approaches are equivalent. Theorem 11 All inclusions, equivalences, and implications presented in Fig. 3 hold. PROOF. The techniques are straightforward. Thus we only prove one result for each type of statement as examples. The remaining claims are left to the reader. Observe from [4] that for complexity classes C; K closed under P m- reductions, it holds cmin C cmax K, cmax C cmin K. (I) Inclusions. c#np cmaxnp: Let f 2 c#np by A 2 NP and polynomial p. Consider B = fhx; yijjyj = p(jxj) ^ (9z 1 ; z 2 ; jz 1 j = jz 2 j = p(jxj))(hx; z 1 i 2 A ^ hx; z 2 i 2 A ^ y = jz 1? z 2 j + 1)g. Then B 2 NP and B = fhx; yijjyj = p(jxj) ^ y f(x)g. Thus, B is a cluster set and f(x) = max B p x. Hence, f 2 cmax NP. (II) Equivalences. PH = UP, cmaxnp = c#p: For [)] suppose PH = UP. Then conclude: c# P cmax NP cmax P NP = cmin P NP (cmax UP \ cmin UP). An easy analysis shows that the latter class is equal to c# P. For [(] suppose cmax NP = c# P. We show conp UP. Let A 2 NP accepted by NPTM M. Dene N to be the machine that, on input x, simulating M(x) outputs 1 on rejecting paths, outputs 2 on accepting paths, and always accepts. Note that out + N(x) f1; 2g and fhx; yijy 2 out + N(x)g 2 NP. Set f(x) = max out + N(x). Then, f 2 cmax NP and x 2 A ) f(x) = 1 and x =2 A ) f(x) = 2. Since cmax NP = c# P, there is an NPTM K that computes f uniquely. Thus K can be modied to accept A in the sense of UP. (III) Implications. Use the monotonic operator technique (see [12,4]). For a function class F, say A 2 U F i there is an f 2 F so that for every x, x 2 A, f(x) = 1 and x =2 A, f(x) = 0. Say A 2 9 F i an f 2 F exists satisfying x 2 A, f(x) 1. With #P NP = #conp [6], it is easily seen that UP NP = U#P NP = U#coNP (9cmaxcoNP\9cmincoNP\9c#coNP). Further, 9 FP NP = 9 cmaxp NP = P NP. 2 8
9 Main open problems concern the position of c# conp in the taxonomy of the gure. Especially, it is not known whether c# P NP = c# conp. As already mentioned this is true for the usual counting operator [6]. A partial answer gives the next theorem. Theorem 12 The following statements are equivalent. (1) c# P NP = c# conp. (2) cmax P NP c# conp. (3) FP NP c# conp. PROOF. [(1) ) (2)] and [(2) ) (3)] are trivial. For [(3) ) (1)] suppose FP NP c# conp. Let f 2 c# P NP. From relativized Theorem 2 we obtain an NPTM M having oracle access and A 2 NP, such that #acc M (A)(x) 1 and #acc M (A)(x) = 1 ) f(x) = out + (x). Dene g(x; y) = out + (x) if M (A) M (A) y 2 acc M (A)(x) and g(x; y) = 0 otherwise. Then g 2 FP NP c# conp. Consequently, there are a cluster set C 2 conp and polynomials p and r with g(x; y) = #fzjjzj = r(jxj) ^ jyj = p(jxj) ^ hx; y; zi 2 Cg. Note that for at most one y it holds g(x; y) > 0, when x is given. Dene C 0 = fhx; yzijjyzj = r(jxj)+p(jxj)^hx; y; zi 2 Cg. Then, C 0 2 conp, and C 0 is a cluster set. Dene g 0 (x) = #fwjjwj = r(jxj) + p(jxj) ^ hx; wi 2 C 0 g. Then, g 0 2 c# conp and g 0 (x) = g(x; y) = f(x) if such y exists, otherwise g 0 (x) = f(x) = 0. Hence, f 2 c# conp. 2 Next we compare cluster classes and their corresponding ambiguous classes. Trivially, the unambiguous classes are subclasses of the ambiguous one's. Theorem 13 (1) c# P = # P () PP = UP. (2) c# NP = # NP () PP = NP. (3) If c# conp = # conp then PP UP NP. PROOF. (1): For [)] suppose c# P = # P. Let A 2 PP via f 2 # P and g 2 FP with x 2 A, f(x) g(x) and f(x) > 0 for every x. Then, f 2 c# P, i.e., there is an NPTM M that computes f uniquely. Modify M such that M accepts on the only accepting path if f(x) g(x). Then A 2 UP. For [(] suppose PP = UP, equivalently C = P = UP [8]. Let f 2 # P. Dene C = fhx; yijjyj = p(jxj) ^ f(x) = yg. Then C 2 C = P UP. Dene N to be a machine that, on input x, checks hx; yi 2 C for a guessed word y; jyj = p(jxj), outputs y, and accepts i checking is successful. N computes f uniquely. Thus, f 2 c# P. (2): For [)] suppose c# NP = # NP. Let A 2 PP via f 2 # P # NP and g 2 FP with x 2 A, f(x) g(x) and f(x) > 0 for every x. Then, 9
10 f 2 c# NP = cmax NP, i.e., there exist a cluster set B 2 NP, accepted by NPTM M, and polynomial p with f(x) = maxfyjjyj = p(jxj) ^ hx; yi 2 Bg. Dene N to be a machine that, on input x, simulates M on input hx; yi with y being a guessed word, jyj = p(jxj), computes deterministically g(x), and accepts i M(hx; yi) is accepting on the simulation path and it holds y g(x). Thus, A 2 NP. For [(] suppose PP = NP and conclude c# NP # NP c# P #NP c# CH = c# NP since PP = NP, CH = NP (corollary of Toda's Theorem [11]). (3) is due to # P NP = # conp and to relativization of (1). 2 Theorem 14 (1) cmaxp = maxp () cminp = minp () NP = P. (2) cmax NP = max NP and cmin NP = min NP. (3) If cmax conp = max conp or cmin conp = min conp, then PH = NP NP. PROOF. Due to duality, we only prove the statements for the maximization parts. (1): For [)] suppose cmaxp = maxp. Let A 2 NP, accepted by NPTM M in runtime p. Dene B = fhx; 1yijjyj = p(jxj) ^ y 2 acc M (x)g [ fhx; 0 p(jxj) 1ijx 2 g. Thus, B 2 P. Dene f(x) = maxfzjjzj = p(jxj) + 1 ^ hx; zi 2 Bg. Then, f 2 max P cmax P (the latter via cluster set C 2 P and polynomial q with q(n) > p(n) for all n 2 N). Consider D = fxjhx; 0 q(jxj)?1 1i 2 C ^ hx; 0 q(jxj)?2 10i =2 Cg. Then, D 2 P and x 2 A, f(x) = 1, x 2 D. Hence, A 2 P. For [(] suppose P = NP. Let f 2 max P via A 2 P and polynomial p. Dene B = fhx; yijjyj = p(jxj) ^ (9z; jzj = p(jxj))(y z ^ hx; zi 2 A)g. Then, B 2 NP P. Binary search using B shows f 2 FP cmax P. (2) is the well-known construction for max NP # NP [6,4]. (3) follows from cmax conp cmax P NP max P NP \ min P NP and from max conp min P NP implies PH = NP NP [4]. 2 Acknowledgements I am grateful to Prof. Gerd Wechsung for supervising my diploma thesis [7] wherefrom material is taken here, and to Sanjay Gupta, Heribert Vollmer, and an anonymous referee for valuable hints. 10
11 References [1] J. Grollmann and A. L. Selman. Complexity measures for public-key cryptosystems. SIAM Journal on Computing, 17(2):309{335, [2] S. Gupta. Closure properties and witness reduction. Journal of Computer and System Sciences, 50(3):412{432, [3] U. Hertrampf, H. Vollmer, and K. W. Wagner. On the power of numbertheoretic operations with respect to counting, In Proceedings 10th Structure in Complexity Theory Conference, pages 299{314, Los Alamitos, IEEE Computer Society Press. [4] H. Hempel and G. Wechsung. The operators min and max on the polynomial hierarchy. In Proceedings 14th Symposium on Theoretical Aspects of Computer Science, volume 1200 of Lecture Notes in Computer Science, pages 93{104, Berlin, Springer-Verlag. [5] D. S. Johnson. A catalog of complexity classes. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume A, pages 67{161. Elsevier, Amsterdam, [6] J. Kobler, U. Schoning, and J. Toran. On counting and approximation. Acta Informatica, 26:363{379, [7] S. Kosub. Clustermaschinen. Diplomarbeit, Friedrich-Schiller-Universitat Jena, Fakultat fur Mathematik und Informatik, [8] M. Ogiwara and L. Hemachandra. A complexity theory of feasible closure properties. Journal of Computer and System Sciences, 46:295{325, [9] C. H. Papadimitriou. Computational Complexity. Addison-Wesley, Reading, [10] M.-J. Sheu and T. J. Long. UP and the low and high hierarchies: A relativized separation. Mathematical Systems Theory, 29:423{449, [11] S. Toda. Computational complexity of counting complexity classes. PhD thesis, Tokyo Institute of Technology, Department of Computer Science, Tokyo, [12] H. Vollmer and K. W. Wagner. The complexity of nding middle elements. International Journal of Foundations of Computer Science, 4:293{307, [13] H. Vollmer and K. W. Wagner. Complexity classes of optimization functions. Information and Computation, 120:198{219, [14] K. W. Wagner. Bounded query classes. SIAM Journal on Computing, 19:833{ 846,
Counting the number of solutions. A survey of recent inclusion results in the area of counting classes. Jacobo Toran* Departament L.S.I.
Counting the number of solutions A survey of recent inclusion results in the area of counting classes 1. Introduction Jacobo Toran* Departament L.S.I. U. Politecnica de Catalunya Pau Gargallo 5 08028 Barcelona,
More informationChapter 5 The Witness Reduction Technique
Outline Chapter 5 The Technique Luke Dalessandro Rahul Krishna December 6, 2006 Outline Part I: Background Material Part II: Chapter 5 Outline of Part I 1 Notes On Our NP Computation Model NP Machines
More informationTuring Machines With Few Accepting Computations And Low Sets For PP
Turing Machines With Few Accepting Computations And Low Sets For PP Johannes Köbler a, Uwe Schöning a, Seinosuke Toda b, Jacobo Torán c a Abteilung Theoretische Informatik, Universität Ulm, 89069 Ulm,
More informationof membership contain the same amount of information? With respect to (1), Chen and Toda [CT93] showed many functions to be complete for FP NP (see al
On Functions Computable with Nonadaptive Queries to NP Harry Buhrman Jim Kadin y Thomas Thierauf z Abstract We study FP NP, the class of functions that can be computed with nonadaptive queries to an NP
More informationLCNS, Vol 665, pp , Springer 1993
Extended Locally Denable Acceptance Types (Extend Abstract, Draft Version) Rolf Niedermeier and Peter Rossmanith Institut fur Informatik, Technische Universitat Munchen Arcisstr. 21, D-000 Munchen 2, Fed.
More informationPortland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which
Beyond P NP = NEXP Stephen A. Fenner 1? and Lance J. Fortnow 2?? 1 University of Southern Maine, Department of Computer Science 96 Falmouth St., Portland, ME 04103, USA E-mail: fenner@usm.maine.edu, Fax:
More informationin both cases, being 1? 2=k(n) and 1? O(1=k(n)) respectively; the number of repetition has no eect on this ratio. There is great simplication and conv
A Classication of the Probabilistic Polynomial Time Hierarchy under Fault Tolerant Access to Oracle Classes Jin-Yi Cai Abstract We show a simple application of Zuckerman's amplication technique to the
More informationThe Informational Content of Canonical Disjoint NP-Pairs
The Informational Content of Canonical Disjoint NP-Pairs Christian Glaßer Alan L. Selman Liyu Zhang June 17, 2009 Abstract We investigate the connection between propositional proof systems and their canonical
More informationComplexity of DNF and Isomorphism of Monotone Formulas
Complexity of DNF and Isomorphism of Monotone Formulas Judy Goldsmith 1, Matthias Hagen 2, Martin Mundhenk 2 1 University of Kentucky, Dept. of Computer Science, Lexington, KY 40506 0046, goldsmit@cs.uky.edu
More informationSparse Sets, Approximable Sets, and Parallel Queries to NP. Abstract
Sparse Sets, Approximable Sets, and Parallel Queries to NP V. Arvind Institute of Mathematical Sciences C. I. T. Campus Chennai 600 113, India Jacobo Toran Abteilung Theoretische Informatik, Universitat
More informationRelativized Worlds with an Innite Hierarchy. Lance Fortnow y. University of Chicago E. 58th. St. Chicago, IL Abstract
Relativized Worlds with an Innite Hierarchy Lance Fortnow y University of Chicago Department of Computer Science 1100 E. 58th. St. Chicago, IL 60637 Abstract We introduce the \Book Trick" as a method for
More informationThis is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes..
This is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes.. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/74777/
More informationThe Informational Content of Canonical Disjoint NP-Pairs
The Informational Content of Canonical Disjoint NP-Pairs Christian Glaßer Alan L. Selman Liyu Zhang February 21, 2007 Abstract We investigate the connection between propositional proof systems and their
More informationReductions to Graph Isomorphism
Reductions to raph Isomorphism Jacobo Torán Institut für Theoretische Informatik Universität Ulm D-89069 Ulm, ermany jacobo.toran@uni-ulm.de June 13, 2008 Keywords: Computational complexity, reducibilities,
More informationA Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies
A Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies Richard Beigel Yale University Richard Chang Cornell University Mitsunori Ogiwara University of Electro-Communications
More informationTuples of Disjoint NP-Sets
Tuples of Disjoint NP-Sets (Extended Abstract) Olaf Beyersdorff Institut für Informatik, Humboldt-Universität zu Berlin, 10099 Berlin, Germany beyersdo@informatik.hu-berlin.de Abstract. Disjoint NP-pairs
More informationNondeterministic Functions and the Existence of Optimal Proof Systems 1
Nondeterministic Functions and the Existence of Optimal Proof Systems 1 Olaf Beyersdorff a,2 Johannes Köbler b Jochen Messner c a Institut für Theoretische Informatik, Leibniz Universität Hannover, Germany
More informationonly the path M B (x), which is the path where a \yes" branch from a node is taken i the label of the node is in B, and we also consider preorder and
Monotonic oracle machines and binary search reductions Martin Mundhenk y May 7, 1996 Abstract Polynomial-time oracle machines being restricted to perform a certain search technique in the oracle are considered
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationJune 5, Abstract. We introduce the class MP of languages L which can be solved in polynomial
On the Power of One Bit of a #P Function Kenneth W. Regan SUNY/Bualo regan@cs.bualo.edu Thomas Schwentick University of Mainz tick@uaimzti.mathematik.uni-mainz.de June 5, 1992 Abstract We introduce the
More informationNondeterministic Functions and the Existence of Optimal Proof Systems
Nondeterministic Functions and the Existence of Optimal Proof Systems Olaf Beyersdorff 1, Johannes Köbler 2, and Jochen Messner 3 1 Institut für Theoretische Informatik, Leibniz-Universität Hannover, Germany
More informationTheoretical Computer Science. Nondeterministic functions and the existence of optimal proof systems
Theoretical Computer Science 410 (2009) 3839 3855 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Nondeterministic functions and the
More informationOne Bit of Advice.
One Bit of Advice Harry Buhrman 1, Richard Chang 2, and Lance Fortnow 3 1 CWI & University of Amsterdam. Address: CWI, INS4, P.O. Box 94709, Amsterdam, The Netherlands. buhrman@cwi.nl. 2 Department of
More informationMathematik / Informatik
UNIVERSITAT TRIER Mathematik / Informatik Forschungsbericht Nr 95{02 Monotonous oracle machines Martin Mundhenk Universitat Trier, Fachbereich IV{Informatik, D-54286 Trier, Germany Electronic copies of
More informationOn the Power of Unambiguity in Alternating Machines
On the Power of Unambiguity in Alternating Machines Holger Spaowsi 1 and Rahul Tripathi 2 1 Institut für Informati, Heinrich-Heine-Universität, 40225 Düsseldorf, Germany. spaows@cs.uni-duesseldorf.de.
More informationThis is a repository copy of Nondeterministic Instance Complexity and Proof Systems with Advice.
This is a repository copy of Nondeterministic Instance Complexity and Proof Systems with Advice. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/74796/ Proceedings Paper:
More informationThe Complexity of the Descriptiveness of Boolean Circuits over Different Sets of Gates
The Complexity of the Descriptiveness of Boolean Circuits over Different Sets of Gates Elmar Böhler 1 and Henning Schnoor 2 1 Theoretische Informatik, Universität Würzburg, Am Hubland, 97072 Würzburg,
More informationThe Complexity of Post s Classes
Institut für Informationssysteme Universität Hannover Diplomarbeit The Complexity of Post s Classes Henning Schnoor 7. Juli 2004 Prüfer: Prof. Dr. Heribert Vollmer Prof. Dr. Rainer Parchmann ii Erklärung
More informationGraph Isomorphism is in SPP
Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur Institute of Mathematical Sciences, C.I.T Campus Chennai 600113, India email: {arvind,ppk}@imsc.ernet.in Abstract We show that Graph Isomorphism
More informationSeparating NE from Some Nonuniform Nondeterministic Complexity Classes
Separating NE from Some Nonuniform Nondeterministic Complexity Classes Bin Fu 1, Angsheng Li 2, and Liyu Zhang 3 1 Dept. of Computer Science, University of Texas - Pan American TX 78539, USA. binfu@cs.panam.edu
More informationLimitations of Efficient Reducibility to the Kolmogorov Random Strings
Limitations of Efficient Reducibility to the Kolmogorov Random Strings John M. HITCHCOCK 1 Department of Computer Science, University of Wyoming Abstract. We show the following results for polynomial-time
More informationCanonical Disjoint NP-Pairs of Propositional Proof Systems
Canonical Disjoint NP-Pairs of Propositional Proof Systems Christian Glaßer Alan L. Selman Liyu Zhang November 19, 2004 Abstract We prove that every disjoint NP-pair is polynomial-time, many-one equivalent
More informationi ) and L(NM O 2 i ), L(NM O 2 L(NM Z i ) L(NM Z j ) =. j )) to (A, B) requires
Disjoint NP-Pairs Christian Glaßer 1 Alan L. Selman Samik Sengupta Liyu Zhang Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY 14260 Email: {cglasser,selman,samik,lzhang7}@cse.buffalo.edu
More informationThe Complexity of Computing the Size of an Interval
Rochester Institute of Technology RIT Scholar Works Articles 12-21-2006 The Complexity of Computing the Size of an Interval Lane A. Hemaspaandra University of Rochester Christopher M. Homan Rochester Institute
More informationGraph Isomorphism is in SPP
Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur 1 Institute of Mathematical Sciences, Chennai 600113, India Abstract We show that Graph Isomorphism is in the complexity class SPP, and hence it
More informationA Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle
A Note on the Complexity of Network Reliability Problems Hans L. Bodlaender Thomas Wolle institute of information and computing sciences, utrecht university technical report UU-CS-2004-001 www.cs.uu.nl
More informationIS VALIANT VAZIRANI S ISOLATION PROBABILITY IMPROVABLE? Holger Dell, Valentine Kabanets, Dieter van Melkebeek, and Osamu Watanabe December 31, 2012
IS VALIANT VAZIRANI S ISOLATION PROBABILITY IMPROVABLE? Holger Dell, Valentine Kabanets, Dieter van Melkebeek, and Osamu Watanabe December 31, 2012 Abstract. The Isolation Lemma of Valiant & Vazirani (1986)
More informationGRAPH ISOMORPHISM IS LOW FOR PP
GRAPH ISOMORPHISM IS LOW FOR PP Johannes Köbler, Uwe Schöning and Jacobo Torán Abstract. We show that the graph isomorphism problem is low for PP and for C = P, i.e., it does not provide a PP or C = P
More informationThe Complexity of Computing Minimal Unidirectional Covering Sets
The Complexity of Computing Minimal Unidirectional Covering Sets Dorothea Baumeister a, Felix Brandt b, Felix Fischer c, Jan Hoffmann d, Jörg Rothe a a Institut für Informatik, Heinrich-Heine-Universität
More informationCluster Computing and the Power of Edge Recognition
Cluster Computing and the Power of Edge Recognition Lane A. Hemaspaandra Department of Computer Science University of Rochester Rochester, NY 14627 USA Sven Kosub Institut für Informatik Technische Universität
More informationThen RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since
A Note on Independent Random Oracles Jack H. Lutz Department of Computer Science Iowa State University Ames, IA 50011 Abstract It is shown that P(A) \ P(B) = BPP holds for every A B. algorithmically random
More informationInverse HAMILTONIAN CYCLE and Inverse 3-D MATCHING Are conp-complete
Inverse HAMILTONIAN CYCLE and Inverse 3-D MATCHING Are conp-complete Michael Krüger and Harald Hempel Institut für Informatik, Friedrich-Schiller-Universität Jena {krueger, hempel}@minet.uni-jena.de Abstract.
More informationA Note on Quadratic Residuosity and UP
A Note on Quadratic Residuosity and UP Jin-Yi Cai a, Robert A. Threlfall b a Computer Sciences Department, University of Wisconsin, 1210 West Dayton St, Madison, WI 53706, USA b B & C Group International,
More informationA Note on the Karp-Lipton Collapse for the Exponential Hierarchy
A Note on the Karp-Lipton Collapse for the Exponential Hierarchy Chris Bourke Department of Computer Science & Engineering University of Nebraska Lincoln, NE 68503, USA Email: cbourke@cse.unl.edu January
More information, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan
SIAM J. COMPUT. Vol. 13, No. 4, November 1984 (C) 1984 Society for Industrial and Applied Mathematics 002 EQUIVALENCE RELATIONS, INVARIANTS, AND NORMAL FORMS* ANDREAS BLASS" AND YURI GUREVICH* Abstract.
More informationThe Complexity of Unions of Disjoint Sets
Electronic Colloquium on Computational Complexity, Report No. 69 (2006) The Complexity of Unions of Disjoint Sets Christian Glaßer, Alan L. Selman, Stephen Travers, and Klaus W. Wagner Abstract This paper
More informationLecture 22: Counting
CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.
More informationU.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1
U.C. Berkeley CS278: Computational Complexity Handout N1 Professor Luca Trevisan August 30, 2004 Notes for Lecture 1 This course assumes CS170, or equivalent, as a prerequisite. We will assume that the
More informationThe Complexity of Computing Minimal Unidirectional Covering Sets
The Complexity of Computing Minimal Unidirectional Covering Sets Dorothea Baumeister 1, Felix Brandt 2, Felix Fischer 3, Jan Hoffmann 2, and Jörg Rothe 1 1 Institut für Informatik, Heinrich-Heine-Universität
More informationOn Unique Satisfiability and Randomized Reductions. Department of Computer Science, Cornell University Ithaca, New York 14853, USA
On Unique Satisfiability and Randomized Reductions Richard Chang Pankaj Rohatgi Department of Computer Science, Cornell University Ithaca, New York 14853, USA Abstract Ever since Valiant and Vazirani [VV86]
More information: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007
80240233: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall 2007 16 October 2007 Instructor: Andrej Bogdanov Notes by: Jialin Zhang and Pinyan Lu In this lecture, we introduce the complexity
More informationStructure in Approximation Classes 2 able to come back from \good" solutions for B to \good" solutions for A. Surprisingly, the rst denition of this k
Submitted to SIAM Journal on Computing Structure in Approximation Classes? P. Crescenzi 1, V. Kann 2, R. Silvestri 1, and L. Trevisan 1 1 Dipartimento di Scienze dell'informazione Universita degli Studi
More information258 Handbook of Discrete and Combinatorial Mathematics
258 Handbook of Discrete and Combinatorial Mathematics 16.3 COMPUTABILITY Most of the material presented here is presented in far more detail in the texts of Rogers [R], Odifreddi [O], and Soare [S]. In
More informationAbstract. We consider uniform subclasses of the nonuniform complexity classes de-
COMPLEXITY-RESTRICTED ADVICE FUNCTIONS Johannes Kobler y AND Thomas Thierauf yz Abstract. We consider uniform subclasses of the nonuniform complexity classes de- ned by Karp and Lipton [23] via the notion
More information4. The Isolation Technique
4. The Isolation Technique Brother: And the Lord spake, saying, First shalt thou take out the Holy Pin. Then, shalt thou count to three, no more, no less. Three shalt be the number thou shalt count, and
More informationLogical Closure Properties of Propositional Proof Systems
Logical Closure Properties of Propositional Proof Systems (Extended Abstract) Olaf Beyersdorff Institut für Theoretische Informatik, Leibniz Universität Hannover, Germany beyersdorff@thi.uni-hannover.de
More informationCharacterising FS domains by means of power domains
Theoretical Computer Science 264 (2001) 195 203 www.elsevier.com/locate/tcs Characterising FS domains by means of power domains Reinhold Heckmann FB 14 Informatik, Universitat des Saarlandes, Postfach
More informationSimultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes
Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes David Eppstein Lane A. Hemachandra James Tisdall Bülent Yener Abstract We study the relationship between probabilistic
More informationAlmost-Everywhere Complexity Hierarchies for. Nondeterministic Time 3. Eric Allender y. Department of Computer Science, Rutgers University
Almost-Everywhere Complexity Hierarchies for Nondeterministic Time 3 Eric Allender y Department of Computer Science, Rutgers University New Brunswick, NJ, USA 08903 Richard Beigel z Department of Computer
More informationMa/CS 117c Handout # 5 P vs. NP
Ma/CS 117c Handout # 5 P vs. NP We consider the possible relationships among the classes P, NP, and co-np. First we consider properties of the class of NP-complete problems, as opposed to those which are
More informationThe Deduction Theorem for Strong Propositional Proof Systems
The Deduction Theorem for Strong Propositional Proof Systems Olaf Beyersdorff Institut für Theoretische Informatik, Leibniz Universität Hannover, Germany beyersdorff@thi.uni-hannover.de Abstract. This
More informationLecture 23: Alternation vs. Counting
CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture
More informationOn the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2. December. 1987
On the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2 December. 1987 CUCS-274-87 I Department of Computer Science. Yale University, New Haven. CT 06520 1Department of Computer Science.
More informationOn the expressive power of existential quantification in polynomial-time computability (Extended abstract)
On the expressive power of existential quantification in polynomial-time computability (Extended abstract) Dieter Spreen Fachbereich Mathematik, Theoretische Informatik Universität Siegen, 57068 Siegen,
More informationBi-Immunity Separates Strong NP-Completeness Notions
Bi-Immunity Separates Strong NP-Completeness Notions A. Pavan 1 and Alan L Selman 2 1 NEC Research Institute, 4 Independence way, Princeton, NJ 08540. apavan@research.nj.nec.com 2 Department of Computer
More informationPreface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques
Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists
More informationAutoreducibility of NP-Complete Sets under Strong Hypotheses
Autoreducibility of NP-Complete Sets under Strong Hypotheses John M. Hitchcock and Hadi Shafei Department of Computer Science University of Wyoming Abstract We study the polynomial-time autoreducibility
More informationCSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010
CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes
More informationApplied Mathematics &Optimization
Appl Math Optim 29: 211-222 (1994) Applied Mathematics &Optimization c 1994 Springer-Verlag New Yor Inc. An Algorithm for Finding the Chebyshev Center of a Convex Polyhedron 1 N.D.Botin and V.L.Turova-Botina
More informationTableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Uni
Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Universiteit Amsterdam, De Boelelaan 1081a, 1081 HV Amsterdam,
More informationIntroduction to Complexity Theory. Bernhard Häupler. May 2, 2006
Introduction to Complexity Theory Bernhard Häupler May 2, 2006 Abstract This paper is a short repetition of the basic topics in complexity theory. It is not intended to be a complete step by step introduction
More informationLecture 4. 1 Circuit Complexity. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz
Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 4 1 Circuit Complexity Circuits are directed, acyclic graphs where nodes are called gates and edges are called
More informationThe Complexity of Solving Multiobjective Optimization Problems and its Relation to Multivalued Functions
Electronic Colloquium on Computational Complexity, Report No. 53 (2011) The Complexity of Solving Multiobjective Optimization Problems and its Relation to Multivalued Functions Krzysztof Fleszar * Christian
More informationTuples of Disjoint NP-Sets
Tuples of Disjoint NP-Sets Olaf Beyersdorff Institut für Informatik, Humboldt-Universität zu Berlin, Germany beyersdo@informatik.hu-berlin.de Abstract. Disjoint NP-pairs are a well studied complexity-theoretic
More informationProving SAT does not have Small Circuits with an Application to the Two Queries Problem
Proving SAT does not have Small Circuits with an Application to the Two Queries Problem Lance Fortnow A. Pavan Samik Sengupta Abstract We show that if SAT does not have small circuits, then there must
More informationThe Tournament Divide and Conquer Technique. Daniel Rubery Georgiy Platonov Mohammad Rafayet Ali Xiong Zhang
The Tournament Divide and Conquer Technique Daniel Rubery Georgiy Platonov Mohammad Rafayet Ali Xiong Zhang 1 K-tournaments Consider the set of k people playing a game with the following properties: 1)
More informationAcceptance of!-languages by Communicating Deterministic Turing Machines
Acceptance of!-languages by Communicating Deterministic Turing Machines Rudolf Freund Institut für Computersprachen, Technische Universität Wien, Karlsplatz 13 A-1040 Wien, Austria Ludwig Staiger y Institut
More informationIs Valiant Vazirani s Isolation Probability Improvable?
Is Valiant Vazirani s Isolation Probability Improvable? Holger Dell Valentine Kabanets Dieter van Melkebeek Osamu Watanabe Department of Computer Sciences University of Wisconsin Madison, WI 53711, USA
More informationOn the Power of Multi-Prover Interactive Protocols. Lance Fortnow. John Rompel y. Michael Sipser z. Massachusetts Institute of Technology
On the Power of Multi-Prover Interactive Protocols Lance Fortnow John Rompel y Michael Sipser z { Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 1 Introduction
More informationSolvability of Word Equations Modulo Finite Special And. Conuent String-Rewriting Systems Is Undecidable In General.
Solvability of Word Equations Modulo Finite Special And Conuent String-Rewriting Systems Is Undecidable In General Friedrich Otto Fachbereich Mathematik/Informatik, Universitat GH Kassel 34109 Kassel,
More information1 Computational Problems
Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS
ON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS RICHARD CHANG Abstract. Kadin [6] showed that if the Polynomial Hierarchy (PH) has infinitely many levels, then for all k, P SAT[k] P SAT[k+1].
More informationOne Quantier Will Do in Existential Monadic. Second-Order Logic over Pictures. Oliver Matz. Institut fur Informatik und Praktische Mathematik
One Quantier Will Do in Existential Monadic Second-Order Logic over Pictures Oliver Matz Institut fur Informatik und Praktische Mathematik Christian-Albrechts-Universitat Kiel, 24098 Kiel, Germany e-mail:
More informationNotes for Lecture Notes 2
Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationMTAT Complexity Theory October 20th-21st, Lecture 7
MTAT.07.004 Complexity Theory October 20th-21st, 2011 Lecturer: Peeter Laud Lecture 7 Scribe(s): Riivo Talviste Polynomial hierarchy 1 Turing reducibility From the algorithmics course, we know the notion
More informationRecognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing. Toshio Suzuki
Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing Toshio Suzui Osaa Prefecture University Saai, Osaa 599-8531, Japan suzui@mi.cias.osaafu-u.ac.jp
More informationOn NP-Completeness for Linear Machines
JOURNAL OF COMPLEXITY 13, 259 271 (1997) ARTICLE NO. CM970444 On NP-Completeness for Linear Machines Christine Gaßner* Institut für Mathematik und Informatik, Ernst-Moritz-Arndt-Universität, F.-L.-Jahn-Strasse
More informationA Study on Monotone Self-Dual Boolean Functions
A Study on Monotone Self-Dual Boolean Functions Mustafa Altun a and Marc D Riedel b a Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey 34469 b Electrical and Computer
More informationLecture 2 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;
Topics in Theoretical Computer Science February 29, 2016 Lecturer: Ola Svensson Lecture 2 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More information1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori
Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de
More informationCS154, Lecture 17: conp, Oracles again, Space Complexity
CS154, Lecture 17: conp, Oracles again, Space Complexity Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode: Guess string
More informationMitosis in Computational Complexity
Mitosis in Computational Complexity Christian Glaßer 1, A. Pavan 2, Alan L. Selman 3, and Liyu Zhang 4 1 Universität Würzburg, glasser@informatik.uni-wuerzburg.de 2 Iowa State University, pavan@cs.iastate.edu
More informationLecture 2. 1 More N P-Compete Languages. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz
Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 2 1 More N P-Compete Languages It will be nice to find more natural N P-complete languages. To that end, we ine
More informationDRAFT. Diagonalization. Chapter 4
Chapter 4 Diagonalization..the relativized P =?NP question has a positive answer for some oracles and a negative answer for other oracles. We feel that this is further evidence of the difficulty of the
More informationA version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd
CDMTCS Research Report Series A Version of for which ZFC can not Predict a Single Bit Robert M. Solovay University of California at Berkeley CDMTCS-104 May 1999 Centre for Discrete Mathematics and Theoretical
More informationDoes the Polynomial Hierarchy Collapse if Onto Functions are Invertible?
Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Harry Buhrman Lance Fortnow Michal Koucký John D. Rogers Nikolay Vereshchagin December 23, 2008 Abstract The class TFNP, defined
More informationLecture Notes 4. Issued 8 March 2018
CM30073 Advanced Algorithms and Complexity 1. Structure of the class NP Lecture Notes 4 Issued 8 March 2018 Recall that it is not known whether or not P = NP, the widely accepted hypothesis being that
More informationDetermining Acceptance Possibility for a Quantum. Computation is Hard for the Polynomial Hierarchy. Frederic Green y. Randall Pruim x.
Determining Acceptance Possibility for a Quantum Computation is Hard for the Polynomial Hierarchy Stephen Fenner University of South Carolina Steven Homer z Boston University Frederic Green y Clark University
More informationcase in mathematics and Science, disposing of an auxiliary condition that is not well-understood (i.e., uniformity) may turn out fruitful. In particul
Texts in Computational Complexity: P/poly and PH Oded Goldreich Department of Computer Science and Applied Mathematics Weizmann Institute of Science, Rehovot, Israel. November 28, 2005 Summary: We consider
More information