in [8]. A class F is closed under f if the composition of f with any function in F is again a function in F. Of highest importance are (non-constructi

Size: px
Start display at page:

Download "in [8]. A class F is closed under f if the composition of f with any function in F is again a function in F. Of highest importance are (non-constructi"

Transcription

1 A Note on Unambiguous Function Classes Sven Kosub Theoretische Informatik, Julius-Maximilians-Universitat Wurzburg, Am Hubland, D Wurzburg, Germany Key words: Computational complexity, unambiguous computation, function classes 1 Introduction Unambiguous computation according to UP has become a classical notion in computational complexity theory. Unambiguity is also used in a theorem of Wagner [14]. A set L is in P NP i there are a set A 2 NP and a polynomial p such that for all x and y with jyj p(jxj), if (x; y) 2 A then (x; y? 1) 2 A, and x 2 L i the maximal y with (x; y) 2 A is odd. Here, essentially for each x all positive y's must be neighbored, they form a cluster, where 0 is always in the cluster if one exists. Unambiguity is reected in the existence of at most one such cluster. This construction is crucially relevant for parallel access to NP (see [14]). The same idea occurs in the denition of the complexity-theoretic operator F [13]: FK is the class of all functions f for which there exist an A 2 K and polynomial p as above with f(x) = supfyjjyj p(jxj) ^ (x; y) 2 Ag. This operator plays a key role as part of an operator pair to compare function classes and set classes. Note that maximization can be replaced with cardinality whenever K is closed under P m-reductions. Above, all clusters contain 0 as minimal element. In this note, we drop this requirement. Let us consider (polynomially time-bounded) nondeterministic machines where the set of accepting paths is always a cluster. As we will see, such cluster machines can be easily transformed into UP-machines. The point why it is nevertheless sensible to study these machines is that cluster machines capture UP-machines that actually can count. This feature is expressed in the unambiguous counting class c#p{the #P-version for cluster machines. The class c#p shows astonishing behavior with respect to closure properties. A theory of closure properties for complexity classes of functions was established Preprint submitted to Elsevier Preprint 22 November 1999

2 in [8]. A class F is closed under f if the composition of f with any function in F is again a function in F. Of highest importance are (non-constructively) hard closure properties{a function f is hard for F if the case that F is closed under f is equivalent to F being closed under every function from F. Using the structural assumption PP = UP, it was proved that, e.g., division is a hard closure property for #P [8]. First, we prove that c#p also possesses hard closure properties. This is surprising insofar as c#p is a promise class, i.e., a class without an obvious enumeration of its underlying machines. Even so, we identify operations (expressed by c#p-functions) being able to simulate any other operation (expressible as a c#p-function) over cluster machines. A second remarkable property is the following: It was observed that #P has intermediate closure properties (e.g., minimization [8]), i.e., functions that are neither hard nor is #P closed under them. Provably, c#p does not have (unary) intermediate closure properties. We give a criterion for deciding if a function is c#p-hard or c#p is closed under it. From [8,2,3], hard closure properties are expected to reduce the number of witnesses, e.g., division for #P. Here, however, the situation is completely dierent. We show that incrementation is c#p-hard, while c#p is closed under division. Hence, this is an instructive example where the term \witness reduction" is not to be taken literally, but rather in the sense of simplifying the witness set (see the discussion in [2, pp ]). Unambiguous clustering is furthermore studied in a more general setting for counting and optimization. Remember that for \xed" clusters (as in the denition of the operator F), maximization and counting coincide. For \free" clusters, this is not to be expected. We consider three unambiguous operators corresponding to those in [11,4]: counting (c#), maximization (cmax), and minimization (cmin) within clusters. These operators are compared to each other{giving a taxonomy of classes similar to [4]{and to the related ambiguous operators in the context of classes of the polynomial hierarchy. Mostly, proofs are straightforward, but they show in an intuitive way how strong clustering and unambiguity are connected. 2 Preliminaries We use the nite alphabet = f0; 1g. The cardinality of a set L is denoted by #L. Let c L denote the characteristic function of L. Usually we interpret a word x as the binary encoding of a natural number. For closure properties, we need a bijection between and N. We suppose the standard 2

3 lexicographical ordering of. For a function f :!, the notation x:f(x) stands for the mapping x 7! f(x). The function sgn : N! N is dened as sgn x = 1, if x > 0, and sgn x = 0, if x = 0. Our computational model is the standard nondeterministic Turing machine [9]. M(x) denotes the computation tree of a machine M on input x. In case of polynomial time resources we suppose complete binary computation trees. For computation trees M(x), we dene acc M (x) as the set of all accepting paths of M(x), and out + M(x) (out? M(x)) as the set of all outputs on accepting (rejecting, resp.) paths of M(x). We use some shorthands for machine types: NTM stands for nondeterministic Turing machine, and NPTM for polynomial-time NTM. We deal with the standard complexity classes P; UP; coup; NP; conp; PP; C = P; PH; CH, and their relativizations [5,9]. To describe function classes, we use the modern operator notation provided in [11,13,4]. A function f is in #K if there exist a set A 2 K and a polynomial p such that f(x) = #fyjjyj = p(jxj) and (x; y) 2 Ag for every x [11]. We abbreviate such witness sets as A p x. A function f is in max K if there is an A 2 K and a polynomial p such that f(x) = max A p for every x [4]. Replacing max by min gives the class x min K. To consider total functions we dene maximum and minimum of the empty set to be 0, what is in the second case a little dierent from the original denition [4] but is more compatible with the partial case. FP = F P [13] denotes the class of functions computable in deterministic polynomial time. 3 Clusters, Unambiguous Counting, and Closure Properties We formalize the concept of clusters by introducing certain equivalence relations. Let M be an NTM, and let y and z be paths of M(x) for input x 2. We write y M(x) z i jy? zj = 1 (i.e., y and z are neighboring paths) and M(x) accepts on path y if and only if M(x) accepts on path z. The relation M(x) (the reexive and transitive closure of M(x)) is an equivalence relation partitioning M(x) in equivalence classes. A cluster is an equivalence class whose representatives are accepting paths of M(x). Denition 1 An NTM M is a cluster machine if and only if for every x 2, there is a path y of M(x) such that fzjz M(x) y ^ y 2 acc M(x)g = acc M (x). An NTM M computes a function f uniquely i out + M(x) = ff(x)g and #acc M (x) = 1 for every x, and M computes f almost-uniquely i f(x) > 0 implies out + M(x) = ff(x)g ^ #acc M (x) = 1 and f(x) = 0 implies out + M(x) =?, both 3

4 for every x. Theorem 2 (1) If an NPTM M computes f uniquely, then there is a polynomialtime cluster machine (PCM) N such that #acc N (x) = f(x) for all x 2. (2) For every PCM N fullling #acc N (x) > 0 for every x 2, there is an NPTM M that computes the function #acc N uniquely. (3) There is an NPTM M that computes the function f almost-uniquely if and only if there exists a PCM N fullling #acc N (x) = f(x) for every x 2. PROOF. (1) is obvious. For (2), let N be a PCM such that smallest and largest computation paths of N are rejecting, and N is time-bounded by polynomial p. Dene K to be the machine that, on input x, (a) guesses paths y 1 and y 2 with y 1 < y 2 ; jy 1 j = jy 2 j = p(jxj), (b) simulates successively N(x) on y 1 (result 1 ) and on y (result 1 ), (c) simulates successively N(x) on y 2 (result 2 ) and on y mod 2 p(jxj) (result 2 ), and (d) outputs y 2? y 1 and accepts i ( 1 1 ) ^ ( 2 2 ) is true. Clearly, K is an NPTM, and since #acc N (x) > 0 we get #acc K (x) = 1 and out + K(x) = ff(x)g. (3) combines (1) and (2). 2 Corollary 3 For every set A 2 NP there is a PCM accepting A in the sense of NP if and only if NP = UP. The following results concern the class of counting functions computed by PCM's. Denition 4 c#p = f#acc M jm is a PCMg: The class UPSV [1] consists of all partial functions f such that there is an NPTM M with at most one accepting path, #acc M (x) = 1 i f(x) is dened, and #acc M (x) = 1 implies out + M(x) = ff(x)g. UPSV t is the class of all total functions in UPSV. Theorem 5 (1) UPSV t c#p. (2) UPSV t = c#p if and only if UP = coup. (3) A function f is in UPSV t if and only if its incremented version f 0, dened as f 0 (x) = f(x) + 1, is in c#p. PROOF. (1) and (3) are immediate from Theorem 2. For (2), rst, suppose UPSV t = c#p. Let A 2 UP, then c A 2 c#p UPSV t (the latter via NPTM M). Modifying M so that on unique accepting paths it is accepted i output is 0, yields A 2 coup. Conversely, suppose UP = coup. Let f 2 c#p. Dene A = fxjf(x) 1g. Then A; A 2 UP. Consider an NPTM M that, on input x, 4

5 on paths beginning with 0 decides x 2 A, on paths beginning with 1 decides x 2 A, if the accepting path gives x 2 A then outputs f(x), and if the accepting path gives x 2 A then outputs 0. Thus, f 2 UPSV t. 2 Closure properties for complexity-theoretic function classes were rst studied in [8]: A closure property is a function f : N n! N for n 2 N, an f 2 F is called an F-closure property. A class F is closed under f i for all g 1 ; : : : ; g n 2 F the function h is in F where h(x) = f(g 1 (x); : : : ; g n (x)). F is called G-closed i F is closed under all G-closure properties. A function f 2 F is F-hard whenever F is closed under f i F is F-closed. Theorem 6 The following statements are equivalent. (1) UP = coup. (2) c#p is closed under incrementation. (3) c#p is FP-closed. (4) c#p is c#p-closed. PROOF. Use Theorem 5 and note that UPSV t is UPSV t -closed. 2 It is well known that strong collapses of complexity classes such as PP = UP, PP = NP, or P PP = NP, can be characterized by closure properties of some function classes (see [8,3]). The preceding theorem shows that, surprisingly, the very weak collapse UP = coup has such a characterization, too. Corollary 7 There is relativized world in which c#p is not c#p-closed. PROOF. Observe that relativizably, UP = coup implies NP UP = NP. However in [10], an oracle was given which contradicts this equality. Note that all our proofs relativize. 2 A function f : N n! N is said to be 0-reproducing in its k-th component i m k = 0 implies f(m 1 ; : : : ; m n ) = 0 for all m 1 ; : : : ; m k?1 ; m k+1 ; : : : ; m n 2 N. Moreover, f is 0-reproducing i f is 0-reproducing in every component. Theorem 8 Let f be an n-ary c#p-closure property. (1) If f is constant or 0-reproducing, then c#p is closed under f. (2) Let h 1 ; : : : ; h k?1 ; h k+1 ; : : : ; h n 2 FP. If f is 0-reproducing in its k-th component, then c#p is closed under x:f(h 1 (x); : : : ; h k?1 (x); x; h k+1 (x); : : : ; h n (x)): 5

6 PROOF. (1): The case if f is constant is trivial. So, let f be 0-reproducing, let g 1 ; : : : ; g n 2 c#p be almost-uniquely computed by NPTM's M 1 ; : : : ; M n, and let D be a PCM with f = #acc D. Dene h(x) = f(hg 1 (x); : : : ; g n (x)i), and consider a machine N that, on x, (a) simulates M i (x) successively for all i in increasing order, (b) computes hz 1 ; : : : ; z n i if all simulations in (a) accept, where z i is the output of M i (x) on the accepting path, and (c) simulates D on hz 1 ; : : : ; z n i. Since there is always at most one path where all simulations of M i accept, N is a PCM with h(x) = #acc N (x). Thus h 2 c#p. (2) is similar to (1). 2 As an example, Theorem 8 immediately gives that c#p is closed under division. This should be contrasted to the results for #P in [8]. Theorem 9 Let f be an n-ary c#p-closure property. If there are k 2 N with 1 k n, and x 1 ; : : : ; x k?1 ; x k+1 ; : : : ; x n 2 N such that x:f(x 1 ; : : : ; x k?1 ; x; x k+1 ; : : : ; x n ) is neither 0-reproducing nor constant, then f is c#p-hard. PROOF. Suppose k; x 1 ; : : : ; x k?1 ; x k+1 ; : : : ; x n make the premise true. To prove that f is c#p-hard, assume c#p is closed under f. We have to show that c#p is c#p-closed. So, let '(x) = f(x 1 ; : : : ; x k?1 ; x; x k+1 ; : : : ; x n ). Thus, c#p is closed under '. Since ' is not 0-reproducing, 0 < '(0) = c 1. Since ' is not constant, there is a minimal z 0 so that c 1 6= '(z 0 ) = c 2. Dening (x) = '(min(z 0 ; z 0 x)), we have x = 0 ) (x) = c 1 and x > 0 ) (x) = c 2. Since multiplication and minimization are 0-reproducing and since c#p is closed under ', c#p is closed under. Now, there are two cases depending on c 2. If c 2 = 0, then dene t = sgn, i.e., x = 0 ) t(x) = 1 and x > 0 ) t(x) = 0. Observe that sgn is 0-reproducing. If c 2 > 0, then (x) > 0 for all x, thus is almost-uniquely computable, and there is t 2 c#p with x = 0 ) t(x) = 1 and x > 0 ) t(x) = 0. In both cases, c#p is closed under t, and t 2 c#p. Now, let A 2 UP. Then, c A (x) = 1, t(c A (x)) = 0 and c A (x) = 0, t(c A (x)) = 1. Hence, A 2 coup. Thus, UP = coup and using Theorem 6 we get that c#p is c#p-closed. 2 Though we do not know whether c#p is c#p-closed, Theorem 8 and Theorem 9 yield a criterion to decide whether a unary function f 2 c#p is hard for c#p or not: If f is neither 0-reproducing nor constant, then it is hard, otherwise c#p is closed under f. Corollary 10 For every unary c#p-closure property f, it holds that c#p is closed under f in all relativizations if and only if f is 0-reproducing or constant. 6

7 P = UP PH = UP NP = UP NP P NP = UP NP P P = UP c# P NP cmax P NP = cmin P NP FP NP cmin conp cmax conp P NP = UP NP P NP = UP NP P NP = UP NP P NP = UP NP c# conp cmax NP = c# NP cmin NP PH = UP PH = UP c# P cmax P = cmin P FP Key: a bold line means the inclusion of the lower in the upper class F F F G G G means F G =) means F G () means F G () and F G () Fig. 1. A taxonomy of clustering. 4 A Taxonomy of Clustering in Counting and Optimization In this section we generalize our denitions to arbitrary sets. For that, let A, and let A x = fyjhx; yi 2 Ag. For x; y; z 2, we write y x z i jy? zj = 1 and hx; yi 2 A, hx; zi 2 A. The relation is dened as the x equivalence relation generated by x. A is said to be a cluster set i for every 7

8 x there is an y such that A x = fzjz x y ^ hx; yi 2 Ag. The unambiguous cluster versions of the ordinary operators are obtained if we allow the operators to vary only over cluster sets in a class K. A function f is in c# K i there are a cluster set A 2 K and a polynomial p so that f(x) = #A p for every x. Evidently, c# P = c#p: The denitions of cmax x and cmin are similar. Note that, though the value f(x) above depends on A p x, we require that A is a cluster set, not only the set A p dened as fhx; yijjyj p(jxj) ^ hx; yi 2 Ag. Generally, to require that only A p is a cluster set leads to larger classes. However, for classes K closed under P m-reductions or closed under intersection with P-sets, both approaches are equivalent. Theorem 11 All inclusions, equivalences, and implications presented in Fig. 3 hold. PROOF. The techniques are straightforward. Thus we only prove one result for each type of statement as examples. The remaining claims are left to the reader. Observe from [4] that for complexity classes C; K closed under P m- reductions, it holds cmin C cmax K, cmax C cmin K. (I) Inclusions. c#np cmaxnp: Let f 2 c#np by A 2 NP and polynomial p. Consider B = fhx; yijjyj = p(jxj) ^ (9z 1 ; z 2 ; jz 1 j = jz 2 j = p(jxj))(hx; z 1 i 2 A ^ hx; z 2 i 2 A ^ y = jz 1? z 2 j + 1)g. Then B 2 NP and B = fhx; yijjyj = p(jxj) ^ y f(x)g. Thus, B is a cluster set and f(x) = max B p x. Hence, f 2 cmax NP. (II) Equivalences. PH = UP, cmaxnp = c#p: For [)] suppose PH = UP. Then conclude: c# P cmax NP cmax P NP = cmin P NP (cmax UP \ cmin UP). An easy analysis shows that the latter class is equal to c# P. For [(] suppose cmax NP = c# P. We show conp UP. Let A 2 NP accepted by NPTM M. Dene N to be the machine that, on input x, simulating M(x) outputs 1 on rejecting paths, outputs 2 on accepting paths, and always accepts. Note that out + N(x) f1; 2g and fhx; yijy 2 out + N(x)g 2 NP. Set f(x) = max out + N(x). Then, f 2 cmax NP and x 2 A ) f(x) = 1 and x =2 A ) f(x) = 2. Since cmax NP = c# P, there is an NPTM K that computes f uniquely. Thus K can be modied to accept A in the sense of UP. (III) Implications. Use the monotonic operator technique (see [12,4]). For a function class F, say A 2 U F i there is an f 2 F so that for every x, x 2 A, f(x) = 1 and x =2 A, f(x) = 0. Say A 2 9 F i an f 2 F exists satisfying x 2 A, f(x) 1. With #P NP = #conp [6], it is easily seen that UP NP = U#P NP = U#coNP (9cmaxcoNP\9cmincoNP\9c#coNP). Further, 9 FP NP = 9 cmaxp NP = P NP. 2 8

9 Main open problems concern the position of c# conp in the taxonomy of the gure. Especially, it is not known whether c# P NP = c# conp. As already mentioned this is true for the usual counting operator [6]. A partial answer gives the next theorem. Theorem 12 The following statements are equivalent. (1) c# P NP = c# conp. (2) cmax P NP c# conp. (3) FP NP c# conp. PROOF. [(1) ) (2)] and [(2) ) (3)] are trivial. For [(3) ) (1)] suppose FP NP c# conp. Let f 2 c# P NP. From relativized Theorem 2 we obtain an NPTM M having oracle access and A 2 NP, such that #acc M (A)(x) 1 and #acc M (A)(x) = 1 ) f(x) = out + (x). Dene g(x; y) = out + (x) if M (A) M (A) y 2 acc M (A)(x) and g(x; y) = 0 otherwise. Then g 2 FP NP c# conp. Consequently, there are a cluster set C 2 conp and polynomials p and r with g(x; y) = #fzjjzj = r(jxj) ^ jyj = p(jxj) ^ hx; y; zi 2 Cg. Note that for at most one y it holds g(x; y) > 0, when x is given. Dene C 0 = fhx; yzijjyzj = r(jxj)+p(jxj)^hx; y; zi 2 Cg. Then, C 0 2 conp, and C 0 is a cluster set. Dene g 0 (x) = #fwjjwj = r(jxj) + p(jxj) ^ hx; wi 2 C 0 g. Then, g 0 2 c# conp and g 0 (x) = g(x; y) = f(x) if such y exists, otherwise g 0 (x) = f(x) = 0. Hence, f 2 c# conp. 2 Next we compare cluster classes and their corresponding ambiguous classes. Trivially, the unambiguous classes are subclasses of the ambiguous one's. Theorem 13 (1) c# P = # P () PP = UP. (2) c# NP = # NP () PP = NP. (3) If c# conp = # conp then PP UP NP. PROOF. (1): For [)] suppose c# P = # P. Let A 2 PP via f 2 # P and g 2 FP with x 2 A, f(x) g(x) and f(x) > 0 for every x. Then, f 2 c# P, i.e., there is an NPTM M that computes f uniquely. Modify M such that M accepts on the only accepting path if f(x) g(x). Then A 2 UP. For [(] suppose PP = UP, equivalently C = P = UP [8]. Let f 2 # P. Dene C = fhx; yijjyj = p(jxj) ^ f(x) = yg. Then C 2 C = P UP. Dene N to be a machine that, on input x, checks hx; yi 2 C for a guessed word y; jyj = p(jxj), outputs y, and accepts i checking is successful. N computes f uniquely. Thus, f 2 c# P. (2): For [)] suppose c# NP = # NP. Let A 2 PP via f 2 # P # NP and g 2 FP with x 2 A, f(x) g(x) and f(x) > 0 for every x. Then, 9

10 f 2 c# NP = cmax NP, i.e., there exist a cluster set B 2 NP, accepted by NPTM M, and polynomial p with f(x) = maxfyjjyj = p(jxj) ^ hx; yi 2 Bg. Dene N to be a machine that, on input x, simulates M on input hx; yi with y being a guessed word, jyj = p(jxj), computes deterministically g(x), and accepts i M(hx; yi) is accepting on the simulation path and it holds y g(x). Thus, A 2 NP. For [(] suppose PP = NP and conclude c# NP # NP c# P #NP c# CH = c# NP since PP = NP, CH = NP (corollary of Toda's Theorem [11]). (3) is due to # P NP = # conp and to relativization of (1). 2 Theorem 14 (1) cmaxp = maxp () cminp = minp () NP = P. (2) cmax NP = max NP and cmin NP = min NP. (3) If cmax conp = max conp or cmin conp = min conp, then PH = NP NP. PROOF. Due to duality, we only prove the statements for the maximization parts. (1): For [)] suppose cmaxp = maxp. Let A 2 NP, accepted by NPTM M in runtime p. Dene B = fhx; 1yijjyj = p(jxj) ^ y 2 acc M (x)g [ fhx; 0 p(jxj) 1ijx 2 g. Thus, B 2 P. Dene f(x) = maxfzjjzj = p(jxj) + 1 ^ hx; zi 2 Bg. Then, f 2 max P cmax P (the latter via cluster set C 2 P and polynomial q with q(n) > p(n) for all n 2 N). Consider D = fxjhx; 0 q(jxj)?1 1i 2 C ^ hx; 0 q(jxj)?2 10i =2 Cg. Then, D 2 P and x 2 A, f(x) = 1, x 2 D. Hence, A 2 P. For [(] suppose P = NP. Let f 2 max P via A 2 P and polynomial p. Dene B = fhx; yijjyj = p(jxj) ^ (9z; jzj = p(jxj))(y z ^ hx; zi 2 A)g. Then, B 2 NP P. Binary search using B shows f 2 FP cmax P. (2) is the well-known construction for max NP # NP [6,4]. (3) follows from cmax conp cmax P NP max P NP \ min P NP and from max conp min P NP implies PH = NP NP [4]. 2 Acknowledgements I am grateful to Prof. Gerd Wechsung for supervising my diploma thesis [7] wherefrom material is taken here, and to Sanjay Gupta, Heribert Vollmer, and an anonymous referee for valuable hints. 10

11 References [1] J. Grollmann and A. L. Selman. Complexity measures for public-key cryptosystems. SIAM Journal on Computing, 17(2):309{335, [2] S. Gupta. Closure properties and witness reduction. Journal of Computer and System Sciences, 50(3):412{432, [3] U. Hertrampf, H. Vollmer, and K. W. Wagner. On the power of numbertheoretic operations with respect to counting, In Proceedings 10th Structure in Complexity Theory Conference, pages 299{314, Los Alamitos, IEEE Computer Society Press. [4] H. Hempel and G. Wechsung. The operators min and max on the polynomial hierarchy. In Proceedings 14th Symposium on Theoretical Aspects of Computer Science, volume 1200 of Lecture Notes in Computer Science, pages 93{104, Berlin, Springer-Verlag. [5] D. S. Johnson. A catalog of complexity classes. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume A, pages 67{161. Elsevier, Amsterdam, [6] J. Kobler, U. Schoning, and J. Toran. On counting and approximation. Acta Informatica, 26:363{379, [7] S. Kosub. Clustermaschinen. Diplomarbeit, Friedrich-Schiller-Universitat Jena, Fakultat fur Mathematik und Informatik, [8] M. Ogiwara and L. Hemachandra. A complexity theory of feasible closure properties. Journal of Computer and System Sciences, 46:295{325, [9] C. H. Papadimitriou. Computational Complexity. Addison-Wesley, Reading, [10] M.-J. Sheu and T. J. Long. UP and the low and high hierarchies: A relativized separation. Mathematical Systems Theory, 29:423{449, [11] S. Toda. Computational complexity of counting complexity classes. PhD thesis, Tokyo Institute of Technology, Department of Computer Science, Tokyo, [12] H. Vollmer and K. W. Wagner. The complexity of nding middle elements. International Journal of Foundations of Computer Science, 4:293{307, [13] H. Vollmer and K. W. Wagner. Complexity classes of optimization functions. Information and Computation, 120:198{219, [14] K. W. Wagner. Bounded query classes. SIAM Journal on Computing, 19:833{ 846,

Counting the number of solutions. A survey of recent inclusion results in the area of counting classes. Jacobo Toran* Departament L.S.I.

Counting the number of solutions. A survey of recent inclusion results in the area of counting classes. Jacobo Toran* Departament L.S.I. Counting the number of solutions A survey of recent inclusion results in the area of counting classes 1. Introduction Jacobo Toran* Departament L.S.I. U. Politecnica de Catalunya Pau Gargallo 5 08028 Barcelona,

More information

Chapter 5 The Witness Reduction Technique

Chapter 5 The Witness Reduction Technique Outline Chapter 5 The Technique Luke Dalessandro Rahul Krishna December 6, 2006 Outline Part I: Background Material Part II: Chapter 5 Outline of Part I 1 Notes On Our NP Computation Model NP Machines

More information

Turing Machines With Few Accepting Computations And Low Sets For PP

Turing Machines With Few Accepting Computations And Low Sets For PP Turing Machines With Few Accepting Computations And Low Sets For PP Johannes Köbler a, Uwe Schöning a, Seinosuke Toda b, Jacobo Torán c a Abteilung Theoretische Informatik, Universität Ulm, 89069 Ulm,

More information

of membership contain the same amount of information? With respect to (1), Chen and Toda [CT93] showed many functions to be complete for FP NP (see al

of membership contain the same amount of information? With respect to (1), Chen and Toda [CT93] showed many functions to be complete for FP NP (see al On Functions Computable with Nonadaptive Queries to NP Harry Buhrman Jim Kadin y Thomas Thierauf z Abstract We study FP NP, the class of functions that can be computed with nonadaptive queries to an NP

More information

LCNS, Vol 665, pp , Springer 1993

LCNS, Vol 665, pp , Springer 1993 Extended Locally Denable Acceptance Types (Extend Abstract, Draft Version) Rolf Niedermeier and Peter Rossmanith Institut fur Informatik, Technische Universitat Munchen Arcisstr. 21, D-000 Munchen 2, Fed.

More information

Portland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which

Portland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which Beyond P NP = NEXP Stephen A. Fenner 1? and Lance J. Fortnow 2?? 1 University of Southern Maine, Department of Computer Science 96 Falmouth St., Portland, ME 04103, USA E-mail: fenner@usm.maine.edu, Fax:

More information

in both cases, being 1? 2=k(n) and 1? O(1=k(n)) respectively; the number of repetition has no eect on this ratio. There is great simplication and conv

in both cases, being 1? 2=k(n) and 1? O(1=k(n)) respectively; the number of repetition has no eect on this ratio. There is great simplication and conv A Classication of the Probabilistic Polynomial Time Hierarchy under Fault Tolerant Access to Oracle Classes Jin-Yi Cai Abstract We show a simple application of Zuckerman's amplication technique to the

More information

The Informational Content of Canonical Disjoint NP-Pairs

The Informational Content of Canonical Disjoint NP-Pairs The Informational Content of Canonical Disjoint NP-Pairs Christian Glaßer Alan L. Selman Liyu Zhang June 17, 2009 Abstract We investigate the connection between propositional proof systems and their canonical

More information

Complexity of DNF and Isomorphism of Monotone Formulas

Complexity of DNF and Isomorphism of Monotone Formulas Complexity of DNF and Isomorphism of Monotone Formulas Judy Goldsmith 1, Matthias Hagen 2, Martin Mundhenk 2 1 University of Kentucky, Dept. of Computer Science, Lexington, KY 40506 0046, goldsmit@cs.uky.edu

More information

Sparse Sets, Approximable Sets, and Parallel Queries to NP. Abstract

Sparse Sets, Approximable Sets, and Parallel Queries to NP. Abstract Sparse Sets, Approximable Sets, and Parallel Queries to NP V. Arvind Institute of Mathematical Sciences C. I. T. Campus Chennai 600 113, India Jacobo Toran Abteilung Theoretische Informatik, Universitat

More information

Relativized Worlds with an Innite Hierarchy. Lance Fortnow y. University of Chicago E. 58th. St. Chicago, IL Abstract

Relativized Worlds with an Innite Hierarchy. Lance Fortnow y. University of Chicago E. 58th. St. Chicago, IL Abstract Relativized Worlds with an Innite Hierarchy Lance Fortnow y University of Chicago Department of Computer Science 1100 E. 58th. St. Chicago, IL 60637 Abstract We introduce the \Book Trick" as a method for

More information

This is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes..

This is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes.. This is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes.. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/74777/

More information

The Informational Content of Canonical Disjoint NP-Pairs

The Informational Content of Canonical Disjoint NP-Pairs The Informational Content of Canonical Disjoint NP-Pairs Christian Glaßer Alan L. Selman Liyu Zhang February 21, 2007 Abstract We investigate the connection between propositional proof systems and their

More information

Reductions to Graph Isomorphism

Reductions to Graph Isomorphism Reductions to raph Isomorphism Jacobo Torán Institut für Theoretische Informatik Universität Ulm D-89069 Ulm, ermany jacobo.toran@uni-ulm.de June 13, 2008 Keywords: Computational complexity, reducibilities,

More information

A Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies

A Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies A Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies Richard Beigel Yale University Richard Chang Cornell University Mitsunori Ogiwara University of Electro-Communications

More information

Tuples of Disjoint NP-Sets

Tuples of Disjoint NP-Sets Tuples of Disjoint NP-Sets (Extended Abstract) Olaf Beyersdorff Institut für Informatik, Humboldt-Universität zu Berlin, 10099 Berlin, Germany beyersdo@informatik.hu-berlin.de Abstract. Disjoint NP-pairs

More information

Nondeterministic Functions and the Existence of Optimal Proof Systems 1

Nondeterministic Functions and the Existence of Optimal Proof Systems 1 Nondeterministic Functions and the Existence of Optimal Proof Systems 1 Olaf Beyersdorff a,2 Johannes Köbler b Jochen Messner c a Institut für Theoretische Informatik, Leibniz Universität Hannover, Germany

More information

only the path M B (x), which is the path where a \yes" branch from a node is taken i the label of the node is in B, and we also consider preorder and

only the path M B (x), which is the path where a \yes branch from a node is taken i the label of the node is in B, and we also consider preorder and Monotonic oracle machines and binary search reductions Martin Mundhenk y May 7, 1996 Abstract Polynomial-time oracle machines being restricted to perform a certain search technique in the oracle are considered

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

June 5, Abstract. We introduce the class MP of languages L which can be solved in polynomial

June 5, Abstract. We introduce the class MP of languages L which can be solved in polynomial On the Power of One Bit of a #P Function Kenneth W. Regan SUNY/Bualo regan@cs.bualo.edu Thomas Schwentick University of Mainz tick@uaimzti.mathematik.uni-mainz.de June 5, 1992 Abstract We introduce the

More information

Nondeterministic Functions and the Existence of Optimal Proof Systems

Nondeterministic Functions and the Existence of Optimal Proof Systems Nondeterministic Functions and the Existence of Optimal Proof Systems Olaf Beyersdorff 1, Johannes Köbler 2, and Jochen Messner 3 1 Institut für Theoretische Informatik, Leibniz-Universität Hannover, Germany

More information

Theoretical Computer Science. Nondeterministic functions and the existence of optimal proof systems

Theoretical Computer Science. Nondeterministic functions and the existence of optimal proof systems Theoretical Computer Science 410 (2009) 3839 3855 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Nondeterministic functions and the

More information

One Bit of Advice.

One Bit of Advice. One Bit of Advice Harry Buhrman 1, Richard Chang 2, and Lance Fortnow 3 1 CWI & University of Amsterdam. Address: CWI, INS4, P.O. Box 94709, Amsterdam, The Netherlands. buhrman@cwi.nl. 2 Department of

More information

Mathematik / Informatik

Mathematik / Informatik UNIVERSITAT TRIER Mathematik / Informatik Forschungsbericht Nr 95{02 Monotonous oracle machines Martin Mundhenk Universitat Trier, Fachbereich IV{Informatik, D-54286 Trier, Germany Electronic copies of

More information

On the Power of Unambiguity in Alternating Machines

On the Power of Unambiguity in Alternating Machines On the Power of Unambiguity in Alternating Machines Holger Spaowsi 1 and Rahul Tripathi 2 1 Institut für Informati, Heinrich-Heine-Universität, 40225 Düsseldorf, Germany. spaows@cs.uni-duesseldorf.de.

More information

This is a repository copy of Nondeterministic Instance Complexity and Proof Systems with Advice.

This is a repository copy of Nondeterministic Instance Complexity and Proof Systems with Advice. This is a repository copy of Nondeterministic Instance Complexity and Proof Systems with Advice. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/74796/ Proceedings Paper:

More information

The Complexity of the Descriptiveness of Boolean Circuits over Different Sets of Gates

The Complexity of the Descriptiveness of Boolean Circuits over Different Sets of Gates The Complexity of the Descriptiveness of Boolean Circuits over Different Sets of Gates Elmar Böhler 1 and Henning Schnoor 2 1 Theoretische Informatik, Universität Würzburg, Am Hubland, 97072 Würzburg,

More information

The Complexity of Post s Classes

The Complexity of Post s Classes Institut für Informationssysteme Universität Hannover Diplomarbeit The Complexity of Post s Classes Henning Schnoor 7. Juli 2004 Prüfer: Prof. Dr. Heribert Vollmer Prof. Dr. Rainer Parchmann ii Erklärung

More information

Graph Isomorphism is in SPP

Graph Isomorphism is in SPP Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur Institute of Mathematical Sciences, C.I.T Campus Chennai 600113, India email: {arvind,ppk}@imsc.ernet.in Abstract We show that Graph Isomorphism

More information

Separating NE from Some Nonuniform Nondeterministic Complexity Classes

Separating NE from Some Nonuniform Nondeterministic Complexity Classes Separating NE from Some Nonuniform Nondeterministic Complexity Classes Bin Fu 1, Angsheng Li 2, and Liyu Zhang 3 1 Dept. of Computer Science, University of Texas - Pan American TX 78539, USA. binfu@cs.panam.edu

More information

Limitations of Efficient Reducibility to the Kolmogorov Random Strings

Limitations of Efficient Reducibility to the Kolmogorov Random Strings Limitations of Efficient Reducibility to the Kolmogorov Random Strings John M. HITCHCOCK 1 Department of Computer Science, University of Wyoming Abstract. We show the following results for polynomial-time

More information

Canonical Disjoint NP-Pairs of Propositional Proof Systems

Canonical Disjoint NP-Pairs of Propositional Proof Systems Canonical Disjoint NP-Pairs of Propositional Proof Systems Christian Glaßer Alan L. Selman Liyu Zhang November 19, 2004 Abstract We prove that every disjoint NP-pair is polynomial-time, many-one equivalent

More information

i ) and L(NM O 2 i ), L(NM O 2 L(NM Z i ) L(NM Z j ) =. j )) to (A, B) requires

i ) and L(NM O 2 i ), L(NM O 2 L(NM Z i ) L(NM Z j ) =. j )) to (A, B) requires Disjoint NP-Pairs Christian Glaßer 1 Alan L. Selman Samik Sengupta Liyu Zhang Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY 14260 Email: {cglasser,selman,samik,lzhang7}@cse.buffalo.edu

More information

The Complexity of Computing the Size of an Interval

The Complexity of Computing the Size of an Interval Rochester Institute of Technology RIT Scholar Works Articles 12-21-2006 The Complexity of Computing the Size of an Interval Lane A. Hemaspaandra University of Rochester Christopher M. Homan Rochester Institute

More information

Graph Isomorphism is in SPP

Graph Isomorphism is in SPP Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur 1 Institute of Mathematical Sciences, Chennai 600113, India Abstract We show that Graph Isomorphism is in the complexity class SPP, and hence it

More information

A Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle

A Note on the Complexity of Network Reliability Problems. Hans L. Bodlaender Thomas Wolle A Note on the Complexity of Network Reliability Problems Hans L. Bodlaender Thomas Wolle institute of information and computing sciences, utrecht university technical report UU-CS-2004-001 www.cs.uu.nl

More information

IS VALIANT VAZIRANI S ISOLATION PROBABILITY IMPROVABLE? Holger Dell, Valentine Kabanets, Dieter van Melkebeek, and Osamu Watanabe December 31, 2012

IS VALIANT VAZIRANI S ISOLATION PROBABILITY IMPROVABLE? Holger Dell, Valentine Kabanets, Dieter van Melkebeek, and Osamu Watanabe December 31, 2012 IS VALIANT VAZIRANI S ISOLATION PROBABILITY IMPROVABLE? Holger Dell, Valentine Kabanets, Dieter van Melkebeek, and Osamu Watanabe December 31, 2012 Abstract. The Isolation Lemma of Valiant & Vazirani (1986)

More information

GRAPH ISOMORPHISM IS LOW FOR PP

GRAPH ISOMORPHISM IS LOW FOR PP GRAPH ISOMORPHISM IS LOW FOR PP Johannes Köbler, Uwe Schöning and Jacobo Torán Abstract. We show that the graph isomorphism problem is low for PP and for C = P, i.e., it does not provide a PP or C = P

More information

The Complexity of Computing Minimal Unidirectional Covering Sets

The Complexity of Computing Minimal Unidirectional Covering Sets The Complexity of Computing Minimal Unidirectional Covering Sets Dorothea Baumeister a, Felix Brandt b, Felix Fischer c, Jan Hoffmann d, Jörg Rothe a a Institut für Informatik, Heinrich-Heine-Universität

More information

Cluster Computing and the Power of Edge Recognition

Cluster Computing and the Power of Edge Recognition Cluster Computing and the Power of Edge Recognition Lane A. Hemaspaandra Department of Computer Science University of Rochester Rochester, NY 14627 USA Sven Kosub Institut für Informatik Technische Universität

More information

Then RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since

Then RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since A Note on Independent Random Oracles Jack H. Lutz Department of Computer Science Iowa State University Ames, IA 50011 Abstract It is shown that P(A) \ P(B) = BPP holds for every A B. algorithmically random

More information

Inverse HAMILTONIAN CYCLE and Inverse 3-D MATCHING Are conp-complete

Inverse HAMILTONIAN CYCLE and Inverse 3-D MATCHING Are conp-complete Inverse HAMILTONIAN CYCLE and Inverse 3-D MATCHING Are conp-complete Michael Krüger and Harald Hempel Institut für Informatik, Friedrich-Schiller-Universität Jena {krueger, hempel}@minet.uni-jena.de Abstract.

More information

A Note on Quadratic Residuosity and UP

A Note on Quadratic Residuosity and UP A Note on Quadratic Residuosity and UP Jin-Yi Cai a, Robert A. Threlfall b a Computer Sciences Department, University of Wisconsin, 1210 West Dayton St, Madison, WI 53706, USA b B & C Group International,

More information

A Note on the Karp-Lipton Collapse for the Exponential Hierarchy

A Note on the Karp-Lipton Collapse for the Exponential Hierarchy A Note on the Karp-Lipton Collapse for the Exponential Hierarchy Chris Bourke Department of Computer Science & Engineering University of Nebraska Lincoln, NE 68503, USA Email: cbourke@cse.unl.edu January

More information

, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan

, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan SIAM J. COMPUT. Vol. 13, No. 4, November 1984 (C) 1984 Society for Industrial and Applied Mathematics 002 EQUIVALENCE RELATIONS, INVARIANTS, AND NORMAL FORMS* ANDREAS BLASS" AND YURI GUREVICH* Abstract.

More information

The Complexity of Unions of Disjoint Sets

The Complexity of Unions of Disjoint Sets Electronic Colloquium on Computational Complexity, Report No. 69 (2006) The Complexity of Unions of Disjoint Sets Christian Glaßer, Alan L. Selman, Stephen Travers, and Klaus W. Wagner Abstract This paper

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1 U.C. Berkeley CS278: Computational Complexity Handout N1 Professor Luca Trevisan August 30, 2004 Notes for Lecture 1 This course assumes CS170, or equivalent, as a prerequisite. We will assume that the

More information

The Complexity of Computing Minimal Unidirectional Covering Sets

The Complexity of Computing Minimal Unidirectional Covering Sets The Complexity of Computing Minimal Unidirectional Covering Sets Dorothea Baumeister 1, Felix Brandt 2, Felix Fischer 3, Jan Hoffmann 2, and Jörg Rothe 1 1 Institut für Informatik, Heinrich-Heine-Universität

More information

On Unique Satisfiability and Randomized Reductions. Department of Computer Science, Cornell University Ithaca, New York 14853, USA

On Unique Satisfiability and Randomized Reductions. Department of Computer Science, Cornell University Ithaca, New York 14853, USA On Unique Satisfiability and Randomized Reductions Richard Chang Pankaj Rohatgi Department of Computer Science, Cornell University Ithaca, New York 14853, USA Abstract Ever since Valiant and Vazirani [VV86]

More information

: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007

: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007 80240233: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall 2007 16 October 2007 Instructor: Andrej Bogdanov Notes by: Jialin Zhang and Pinyan Lu In this lecture, we introduce the complexity

More information

Structure in Approximation Classes 2 able to come back from \good" solutions for B to \good" solutions for A. Surprisingly, the rst denition of this k

Structure in Approximation Classes 2 able to come back from \good solutions for B to \good solutions for A. Surprisingly, the rst denition of this k Submitted to SIAM Journal on Computing Structure in Approximation Classes? P. Crescenzi 1, V. Kann 2, R. Silvestri 1, and L. Trevisan 1 1 Dipartimento di Scienze dell'informazione Universita degli Studi

More information

258 Handbook of Discrete and Combinatorial Mathematics

258 Handbook of Discrete and Combinatorial Mathematics 258 Handbook of Discrete and Combinatorial Mathematics 16.3 COMPUTABILITY Most of the material presented here is presented in far more detail in the texts of Rogers [R], Odifreddi [O], and Soare [S]. In

More information

Abstract. We consider uniform subclasses of the nonuniform complexity classes de-

Abstract. We consider uniform subclasses of the nonuniform complexity classes de- COMPLEXITY-RESTRICTED ADVICE FUNCTIONS Johannes Kobler y AND Thomas Thierauf yz Abstract. We consider uniform subclasses of the nonuniform complexity classes de- ned by Karp and Lipton [23] via the notion

More information

4. The Isolation Technique

4. The Isolation Technique 4. The Isolation Technique Brother: And the Lord spake, saying, First shalt thou take out the Holy Pin. Then, shalt thou count to three, no more, no less. Three shalt be the number thou shalt count, and

More information

Logical Closure Properties of Propositional Proof Systems

Logical Closure Properties of Propositional Proof Systems Logical Closure Properties of Propositional Proof Systems (Extended Abstract) Olaf Beyersdorff Institut für Theoretische Informatik, Leibniz Universität Hannover, Germany beyersdorff@thi.uni-hannover.de

More information

Characterising FS domains by means of power domains

Characterising FS domains by means of power domains Theoretical Computer Science 264 (2001) 195 203 www.elsevier.com/locate/tcs Characterising FS domains by means of power domains Reinhold Heckmann FB 14 Informatik, Universitat des Saarlandes, Postfach

More information

Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes

Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes David Eppstein Lane A. Hemachandra James Tisdall Bülent Yener Abstract We study the relationship between probabilistic

More information

Almost-Everywhere Complexity Hierarchies for. Nondeterministic Time 3. Eric Allender y. Department of Computer Science, Rutgers University

Almost-Everywhere Complexity Hierarchies for. Nondeterministic Time 3. Eric Allender y. Department of Computer Science, Rutgers University Almost-Everywhere Complexity Hierarchies for Nondeterministic Time 3 Eric Allender y Department of Computer Science, Rutgers University New Brunswick, NJ, USA 08903 Richard Beigel z Department of Computer

More information

Ma/CS 117c Handout # 5 P vs. NP

Ma/CS 117c Handout # 5 P vs. NP Ma/CS 117c Handout # 5 P vs. NP We consider the possible relationships among the classes P, NP, and co-np. First we consider properties of the class of NP-complete problems, as opposed to those which are

More information

The Deduction Theorem for Strong Propositional Proof Systems

The Deduction Theorem for Strong Propositional Proof Systems The Deduction Theorem for Strong Propositional Proof Systems Olaf Beyersdorff Institut für Theoretische Informatik, Leibniz Universität Hannover, Germany beyersdorff@thi.uni-hannover.de Abstract. This

More information

Lecture 23: Alternation vs. Counting

Lecture 23: Alternation vs. Counting CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture

More information

On the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2. December. 1987

On the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2. December. 1987 On the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2 December. 1987 CUCS-274-87 I Department of Computer Science. Yale University, New Haven. CT 06520 1Department of Computer Science.

More information

On the expressive power of existential quantification in polynomial-time computability (Extended abstract)

On the expressive power of existential quantification in polynomial-time computability (Extended abstract) On the expressive power of existential quantification in polynomial-time computability (Extended abstract) Dieter Spreen Fachbereich Mathematik, Theoretische Informatik Universität Siegen, 57068 Siegen,

More information

Bi-Immunity Separates Strong NP-Completeness Notions

Bi-Immunity Separates Strong NP-Completeness Notions Bi-Immunity Separates Strong NP-Completeness Notions A. Pavan 1 and Alan L Selman 2 1 NEC Research Institute, 4 Independence way, Princeton, NJ 08540. apavan@research.nj.nec.com 2 Department of Computer

More information

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists

More information

Autoreducibility of NP-Complete Sets under Strong Hypotheses

Autoreducibility of NP-Complete Sets under Strong Hypotheses Autoreducibility of NP-Complete Sets under Strong Hypotheses John M. Hitchcock and Hadi Shafei Department of Computer Science University of Wyoming Abstract We study the polynomial-time autoreducibility

More information

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes

More information

Applied Mathematics &Optimization

Applied Mathematics &Optimization Appl Math Optim 29: 211-222 (1994) Applied Mathematics &Optimization c 1994 Springer-Verlag New Yor Inc. An Algorithm for Finding the Chebyshev Center of a Convex Polyhedron 1 N.D.Botin and V.L.Turova-Botina

More information

Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Uni

Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Uni Tableau Calculus for Local Cubic Modal Logic and it's Implementation MAARTEN MARX, Department of Articial Intelligence, Faculty of Sciences, Vrije Universiteit Amsterdam, De Boelelaan 1081a, 1081 HV Amsterdam,

More information

Introduction to Complexity Theory. Bernhard Häupler. May 2, 2006

Introduction to Complexity Theory. Bernhard Häupler. May 2, 2006 Introduction to Complexity Theory Bernhard Häupler May 2, 2006 Abstract This paper is a short repetition of the basic topics in complexity theory. It is not intended to be a complete step by step introduction

More information

Lecture 4. 1 Circuit Complexity. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz

Lecture 4. 1 Circuit Complexity. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 4 1 Circuit Complexity Circuits are directed, acyclic graphs where nodes are called gates and edges are called

More information

The Complexity of Solving Multiobjective Optimization Problems and its Relation to Multivalued Functions

The Complexity of Solving Multiobjective Optimization Problems and its Relation to Multivalued Functions Electronic Colloquium on Computational Complexity, Report No. 53 (2011) The Complexity of Solving Multiobjective Optimization Problems and its Relation to Multivalued Functions Krzysztof Fleszar * Christian

More information

Tuples of Disjoint NP-Sets

Tuples of Disjoint NP-Sets Tuples of Disjoint NP-Sets Olaf Beyersdorff Institut für Informatik, Humboldt-Universität zu Berlin, Germany beyersdo@informatik.hu-berlin.de Abstract. Disjoint NP-pairs are a well studied complexity-theoretic

More information

Proving SAT does not have Small Circuits with an Application to the Two Queries Problem

Proving SAT does not have Small Circuits with an Application to the Two Queries Problem Proving SAT does not have Small Circuits with an Application to the Two Queries Problem Lance Fortnow A. Pavan Samik Sengupta Abstract We show that if SAT does not have small circuits, then there must

More information

The Tournament Divide and Conquer Technique. Daniel Rubery Georgiy Platonov Mohammad Rafayet Ali Xiong Zhang

The Tournament Divide and Conquer Technique. Daniel Rubery Georgiy Platonov Mohammad Rafayet Ali Xiong Zhang The Tournament Divide and Conquer Technique Daniel Rubery Georgiy Platonov Mohammad Rafayet Ali Xiong Zhang 1 K-tournaments Consider the set of k people playing a game with the following properties: 1)

More information

Acceptance of!-languages by Communicating Deterministic Turing Machines

Acceptance of!-languages by Communicating Deterministic Turing Machines Acceptance of!-languages by Communicating Deterministic Turing Machines Rudolf Freund Institut für Computersprachen, Technische Universität Wien, Karlsplatz 13 A-1040 Wien, Austria Ludwig Staiger y Institut

More information

Is Valiant Vazirani s Isolation Probability Improvable?

Is Valiant Vazirani s Isolation Probability Improvable? Is Valiant Vazirani s Isolation Probability Improvable? Holger Dell Valentine Kabanets Dieter van Melkebeek Osamu Watanabe Department of Computer Sciences University of Wisconsin Madison, WI 53711, USA

More information

On the Power of Multi-Prover Interactive Protocols. Lance Fortnow. John Rompel y. Michael Sipser z. Massachusetts Institute of Technology

On the Power of Multi-Prover Interactive Protocols. Lance Fortnow. John Rompel y. Michael Sipser z. Massachusetts Institute of Technology On the Power of Multi-Prover Interactive Protocols Lance Fortnow John Rompel y Michael Sipser z { Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 1 Introduction

More information

Solvability of Word Equations Modulo Finite Special And. Conuent String-Rewriting Systems Is Undecidable In General.

Solvability of Word Equations Modulo Finite Special And. Conuent String-Rewriting Systems Is Undecidable In General. Solvability of Word Equations Modulo Finite Special And Conuent String-Rewriting Systems Is Undecidable In General Friedrich Otto Fachbereich Mathematik/Informatik, Universitat GH Kassel 34109 Kassel,

More information

1 Computational Problems

1 Computational Problems Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

ON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS

ON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS ON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS RICHARD CHANG Abstract. Kadin [6] showed that if the Polynomial Hierarchy (PH) has infinitely many levels, then for all k, P SAT[k] P SAT[k+1].

More information

One Quantier Will Do in Existential Monadic. Second-Order Logic over Pictures. Oliver Matz. Institut fur Informatik und Praktische Mathematik

One Quantier Will Do in Existential Monadic. Second-Order Logic over Pictures. Oliver Matz. Institut fur Informatik und Praktische Mathematik One Quantier Will Do in Existential Monadic Second-Order Logic over Pictures Oliver Matz Institut fur Informatik und Praktische Mathematik Christian-Albrechts-Universitat Kiel, 24098 Kiel, Germany e-mail:

More information

Notes for Lecture Notes 2

Notes for Lecture Notes 2 Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

MTAT Complexity Theory October 20th-21st, Lecture 7

MTAT Complexity Theory October 20th-21st, Lecture 7 MTAT.07.004 Complexity Theory October 20th-21st, 2011 Lecturer: Peeter Laud Lecture 7 Scribe(s): Riivo Talviste Polynomial hierarchy 1 Turing reducibility From the algorithmics course, we know the notion

More information

Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing. Toshio Suzuki

Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing. Toshio Suzuki Recognizing Tautology by a Deterministic Algorithm Whose While-loop s Execution Time Is Bounded by Forcing Toshio Suzui Osaa Prefecture University Saai, Osaa 599-8531, Japan suzui@mi.cias.osaafu-u.ac.jp

More information

On NP-Completeness for Linear Machines

On NP-Completeness for Linear Machines JOURNAL OF COMPLEXITY 13, 259 271 (1997) ARTICLE NO. CM970444 On NP-Completeness for Linear Machines Christine Gaßner* Institut für Mathematik und Informatik, Ernst-Moritz-Arndt-Universität, F.-L.-Jahn-Strasse

More information

A Study on Monotone Self-Dual Boolean Functions

A Study on Monotone Self-Dual Boolean Functions A Study on Monotone Self-Dual Boolean Functions Mustafa Altun a and Marc D Riedel b a Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey 34469 b Electrical and Computer

More information

Lecture 2 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

Lecture 2 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak; Topics in Theoretical Computer Science February 29, 2016 Lecturer: Ola Svensson Lecture 2 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent

More information

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de

More information

CS154, Lecture 17: conp, Oracles again, Space Complexity

CS154, Lecture 17: conp, Oracles again, Space Complexity CS154, Lecture 17: conp, Oracles again, Space Complexity Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode: Guess string

More information

Mitosis in Computational Complexity

Mitosis in Computational Complexity Mitosis in Computational Complexity Christian Glaßer 1, A. Pavan 2, Alan L. Selman 3, and Liyu Zhang 4 1 Universität Würzburg, glasser@informatik.uni-wuerzburg.de 2 Iowa State University, pavan@cs.iastate.edu

More information

Lecture 2. 1 More N P-Compete Languages. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz

Lecture 2. 1 More N P-Compete Languages. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 2 1 More N P-Compete Languages It will be nice to find more natural N P-complete languages. To that end, we ine

More information

DRAFT. Diagonalization. Chapter 4

DRAFT. Diagonalization. Chapter 4 Chapter 4 Diagonalization..the relativized P =?NP question has a positive answer for some oracles and a negative answer for other oracles. We feel that this is further evidence of the difficulty of the

More information

A version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd

A version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd CDMTCS Research Report Series A Version of for which ZFC can not Predict a Single Bit Robert M. Solovay University of California at Berkeley CDMTCS-104 May 1999 Centre for Discrete Mathematics and Theoretical

More information

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible?

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Harry Buhrman Lance Fortnow Michal Koucký John D. Rogers Nikolay Vereshchagin December 23, 2008 Abstract The class TFNP, defined

More information

Lecture Notes 4. Issued 8 March 2018

Lecture Notes 4. Issued 8 March 2018 CM30073 Advanced Algorithms and Complexity 1. Structure of the class NP Lecture Notes 4 Issued 8 March 2018 Recall that it is not known whether or not P = NP, the widely accepted hypothesis being that

More information

Determining Acceptance Possibility for a Quantum. Computation is Hard for the Polynomial Hierarchy. Frederic Green y. Randall Pruim x.

Determining Acceptance Possibility for a Quantum. Computation is Hard for the Polynomial Hierarchy. Frederic Green y. Randall Pruim x. Determining Acceptance Possibility for a Quantum Computation is Hard for the Polynomial Hierarchy Stephen Fenner University of South Carolina Steven Homer z Boston University Frederic Green y Clark University

More information

case in mathematics and Science, disposing of an auxiliary condition that is not well-understood (i.e., uniformity) may turn out fruitful. In particul

case in mathematics and Science, disposing of an auxiliary condition that is not well-understood (i.e., uniformity) may turn out fruitful. In particul Texts in Computational Complexity: P/poly and PH Oded Goldreich Department of Computer Science and Applied Mathematics Weizmann Institute of Science, Rehovot, Israel. November 28, 2005 Summary: We consider

More information