DD2446 Complexity Theory: Problem Set 4

Similar documents
Computational Complexity: Problem Set 4

Lecture 15 - NP Completeness 1

Advanced Algorithms (XIII) Yijia Chen Fudan University

Lecture 15: A Brief Look at PCP

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

PCP Theorem and Hardness of Approximation

Lecture 14 - P v.s. NP 1

1 Agenda. 2 History. 3 Probabilistically Checkable Proofs (PCPs). Lecture Notes Definitions. PCPs. Approximation Algorithms.

Solution of Exercise Sheet 12

On the efficient approximability of constraint satisfaction problems

Lecture 17 November 8, 2012

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming

Lecture 18: PCP Theorem and Hardness of Approximation I

Today. Few Comments. PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04].

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

Essential facts about NP-completeness:

Lecture 16 November 6th, 2012 (Prasad Raghavendra)

Lecture 8 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

Chapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013

BCCS: Computational methods for complex systems Wednesday, 16 June Lecture 3

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta

Topics in Complexity

Efficient Probabilistically Checkable Debates

DRAFT. PCP and Hardness of Approximation. Chapter 19

Approximating MAX-E3LIN is NP-Hard

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

Hardness of Approximation

Lecture 19: Interactive Proofs and the PCP Theorem

CS Communication Complexity: Applications and New Directions

CS151 Complexity Theory. Lecture 15 May 22, 2017

2 Completing the Hardness of approximation of Set Cover

Two Query PCP with Sub-Constant Error

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010

Limitations of Algorithm Power

CS 350 Algorithms and Complexity

PCP Soundness amplification Meeting 2 ITCS, Tsinghua Univesity, Spring April 2009

Lecture 10: Hardness of approximating clique, FGLSS graph

NP and NP Completeness

Notes on Complexity Theory Last updated: November, Lecture 10

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).

Lecture 10 + additional notes

CS 350 Algorithms and Complexity

Non-Approximability Results (2 nd part) 1/19

Almost transparent short proofs for NP R

NP-Completeness I. Lecture Overview Introduction: Reduction and Expressiveness

Lecture 26: Arthur-Merlin Games

NP Completeness. CS 374: Algorithms & Models of Computation, Spring Lecture 23. November 19, 2015

1 Propositional Logic

6.841/18.405J: Advanced Complexity Wednesday, April 2, Lecture Lecture 14

Lecture 20: conp and Friends, Oracles in Complexity Theory

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1

Introduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany

Lecture 16: Constraint Satisfaction Problems

2 P vs. NP and Diagonalization

Probabilistically Checkable Proofs. 1 Introduction to Probabilistically Checkable Proofs

1 Reductions and Expressiveness

Lecture 18: Zero-Knowledge Proofs

CSCI 1590 Intro to Computational Complexity

Complexity Classes IV

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms

Concurrent Non-malleable Commitments from any One-way Function

Lecture 12: Interactive Proofs

SAT, NP, NP-Completeness

NP-Hardness reductions

Notes on Computer Theory Last updated: November, Circuits

2 Natural Proofs: a barrier for proving circuit lower bounds

Geometric Steiner Trees

1 Probabilistically checkable proofs

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

1 Randomized Computation

Show that the following problems are NP-complete

Polynomial-time Reductions

The Complexity of Optimization Problems

Topics in Complexity Theory

2 Evidence that Graph Isomorphism is not NP-complete

CSCI3390-Second Test with Solutions

9.1 HW (3+3+8 points) (Knapsack decision problem NP-complete)

Notes for Lecture 21

Lecture 18: P & NP. Revised, May 1, CLRS, pp

Lecture 2: November 9

Overview. 1 Introduction. 2 Preliminary Background. 3 Unique Game. 4 Unique Games Conjecture. 5 Inapproximability Results. 6 Unique Game Algorithms

Integer Linear Programs

Asymmetric Communication Complexity and Data Structure Lower Bounds

Complexity Classes V. More PCPs. Eric Rachlin

Foundations of Machine Learning and Data Science. Lecturer: Avrim Blum Lecture 9: October 7, 2015

CPSC 320 (Intermediate Algorithm Design and Analysis). Summer Instructor: Dr. Lior Malka Final Examination, July 24th, 2009

Lecture 9 : PPAD and the Complexity of Equilibrium Computation. 1 Complexity Class PPAD. 1.1 What does PPAD mean?

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.

NP-problems continued

Review of Basic Computational Complexity

Upper and Lower Bounds for Tree-like. Cutting Planes Proofs. Abstract. In this paper we study the complexity of Cutting Planes (CP) refutations, and

PRIMES Math Problem Set

7.4 DO (uniqueness of minimum-cost spanning tree) Prove: if all edge weights are distinct then the minimum-cost spanning tree is unique.

Stanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/21/2010

2. This exam consists of 15 questions. The rst nine questions are multiple choice Q10 requires two

Transcription:

DD2446 Complexity Theory: Problem Set 4 Due: Friday November 8, 2013, at 23:59. Submit your solutions as a PDF le by e-mail to jakobn at kth dot se with the subject line Problem set 4: your full name. Name the PDF le PS4_ YourFullName.pdf (with your name coded in ASCII without national characters), and also state your name and e-mail address at the top of the rst page. Solutions should be written in LATEX or some other math-aware typesetting system. Please try to be precise and to the point in your solutions and refrain from vague statements. Write so that a fellow student of yours can read, understand, and verify your solutions. In addition to what is stated below, the general rules stated on the course webpage always apply. Collaboration: Discussions of ideas in groups of two people are allowedand indeed, encouragedbut you should write down your own solution individually and understand all aspects of it fully. You should also acknowledge any collaboration. State at the beginning of the problem set if you have been collaborating with someone and if so with whom. Reference material: Some of the problems are classic and hence it might be easy to nd solutions on the Internet, in textbooks or in research papers. It is not allowed to use such material in any way unless explicitly stated otherwise. Anything said during the lectures or in the lecture notes, or which can be found in chapters of Arora-Barak covered in the course, should be fair game, though, unless you are specically asked to show something that we claimed without proof in class. It is hard to pin down 100% formal rules on what all this meanswhen in doubt, ask the lecturer. About the problems: Some of the problems are meant to be quite challenging and you are not necessarily expected to solve all of them. A total score of around 50 points should be enough for grade E, 80 points for grade D, 110 points for grade C, 140 points for grade B, and 170 points for grade A on this problem set. Any corrections or clarications will be given at piazza.com/kth.se/fall2013/dd2446/ and any revised versions will be posted on the course webpage www.csc.kth.se/utbildning/kth/kurser/dd2446/kplx13/. 1 (10 p) Suppose that P is a strongly testable property, where P = n=1 P n for P n {f : D n R} (i.e., some subset of all functions from some family of domains D n to some xed range R). Prove that there is a non-adaptive one-sided tester for P with constant query complexity. 2 (10 p) Prove that for any function f : X Y Z it holds that R priv ɛ (f) Rɛ pub (f). 3 (20 p) Recall that an instance of the Max q-csp W problem over n variables is a collection of m constraints (C 1, I 1 ), (C 2, I 2 ),..., (C m, I m ), where each C j : [W ] q {0, 1} is some q-ary predicate and each I j = {i j,1, i j,2,..., i j,q } [n] q is a set of q variable indices. An assignment α [W ] n satises (C j, I j ) if C j ( αij,1, α ij,2,..., α ij,q ) = 1, and the task is to compute the maximal number of constraints that can be satised by any assignment. Determine for which values of q, W N + the Max q-csp W problem is easy and for which values it is NP-hard. Remark: Note that Max q-csp W is not a decision problem, and so it does not quite make sense to ask whether it is NP-complete or not. However, we can still prove that it is NP-hard in the sense that there is a polynomial-time reduction from some NP-complete problem so that we could decide this problem eciently if we had a polynomial-time algorithm for Max q-csp W. Page 1 (of 5)

4 (20 p) In the nal lectures we proved a lower bound Rɛ pub (ip) = Ω(n) for some xed but small error probability ɛ on the randomized communication complexity of the inner product function ip(x, y) = n i=1 x iy i (mod 2) for x, y {0, 1} n. We also noted that if we allow error probability ɛ = 1/2, then there is a trivial 1-bit protocol that just outputs a random guess (which has a 50% chance of being correct). In this problem, we want to study what happens with Rɛ pub (ip) when we relax the requirements on the protocol so that the error ɛ is not small but is allowed to approach 1/2. Suppose that we let ɛ = 1/2 ɛ for some small but constant ɛ, meaning that the protocol is only required to have a small ɛ -advantage over random guessing. How does the communication complexity change? Are there still strong lower bounds? What happens for ɛ = 1/2 ɛ (n) such that ɛ (n) 0 when n, i.e., when the advantage over random guessing vanishes as n increases? Determine for how small ɛ (constant or subconstant) we can still obtain an Ω(n) lower bound for R pub 1/2 ɛ (ip) using the techniques we covered in class. For full credit, you do not need to get additive or multiplicative constants exactly right, but the asymptotic bounds should be optimal. 5 (30 p) In Per's rst guest lecture on the PCP theorem and hardness of approximation, we saw two versions of the PCP theorem. The rst version was phrased as follows: There is some universal constant δ > 0 such that given a Max 3-Sat instance ϕ it is NP-hard to distinguish between the cases Opt(ϕ) = 1 and Opt(ϕ) 1 δ. We then dened PCPc,s[r, q, W ] to be class of languages having probabilistically checkable proofs over an alphabet of size W with completeness c and soundness error s, where the verier uses r random bits and makes q queries to the proof. This allowed us to give an equivalent formulation of the theorem as stated next: NP = PCP 1,1/2[O(log n), O(1), 2]. We proved in class that the rst version of the PCP theorem implies the second, but only sketched the opposite direction. Give a complete proof of the fact that the second version above of the PCP theorem implies the rst version. (This will involve rephrasing some of what was said in class in your own words, but also lling in the details that were omitted during the lecture.) 6 (20 p) One of the two key technical lemmas in the Dinur's proof of the PCP theorem, which we outlined in class, was a gap amplication lemma which we stated (essentially) as follows: For every l N + there exist W N +, κ > 0 and ɛ 0 polynomial-time reduction R from Max 2-CSP 3 to Max 2-CSP W following properties: ˆ If Val(ϕ) = 1, then Val(R(ϕ)) = 1. ˆ If Val(ϕ) 1 ɛ for ɛ < ɛ 0, then Val(R(ϕ)) 1 lɛ. ˆ R(ϕ) κ ϕ. > 0 such that there is a satisfying the In this lemma, the blow-up of the alphabet size is from 3 to some arbitrary W, but this W is independent of the size of the Max 2-CSP 3 instance ϕ. Show that if we instead allow the alphabet blow-up to be a function of the instance size (and drop the condition that the reduction should be polynomial-size), then for every ɛ > 0 there exist W = W ( ϕ ) such that there is a reduction R from Max 2-CSP 3 to Max 2-CSP W as above except that if Val(ϕ) < 1, then Val(R(ϕ)) ɛ. Page 2 (of 5)

7 (40 p) For x, y {0, 1} n interpreted as integers in [0, 2 n 1], let gt(x, y) = [x > y] be the function that evaluates to 1 if x > y and 0 otherwise. 7a (15 p) Determine exactly the deterministic communication complexity D(gt). 7b (25 p) What is the best upper bound you can give for Rɛ pub (gt)? (Say, for ɛ = 1/4 if you want a concrete ɛ, but giving asymptotic bounds for any constant ɛ (0, 1/2) is also ne.) 8 (60 p) In Per's rst lecture we also discussed how the class of languages captured by PCPc,s[r, q, W ] changes as we vary the parameters. For instance, we saw that PCP1,0[0, poly(n), 2] = NP and that PCP1,0[O(log n), 42, 2] = P. In this problem, we want to study this phenomenon further. 8a (30 p) Show that PCP 1,2 1042 [poly(n), 42, 2] = corp. 8b (30 p) Can you give some argument why for larger values s > 2 1042 of the soundness error it might hold that PCP1,s [poly(n), 42, 2] corp (under some more or less believable complexity-theoretic assumption, say)? How large do you need s to be for this argument? 9 (90 p) The falsied clause search problem is the following communication problem. The starting point is some xed unsatisable CNF formula F and some xed partition X. Y = Vars(F ) of the variables of F between Alice and Bob. Given as inputs truth value assignments α X : X {0, 1} and α Y : Y {0, 1}, Alice and Bob should communicate to nd a clause C F that is falsied by the assignment α = α X α Y. (Such a clause always exists since F is unsatisable.) The pyramid graph Π h of height h is a DAG with h + 1 layers, where there is one vertex in the highest layer (the sink z), two vertices in the next layer et cetera, down to h + 1 vertices in the lowest layer 0. The ith vertex in layer L has incoming edges from the ith and (i + 1)st vertices in layer L 1. See Figure 1(a) for an illustration of the pyramid graph of height 2. The purpose of this problem is to investigate the hardness of the falsied clause search problems for certain CNF formulas dened in terms of pyramids. 9a (30 p) The so-called pebbling formula over Π h, denoted Peb Πh, is the conjunction of the following clauses: ˆ for all vertices s in the bottom layer, a unit clause s (i.e., a clause of size 1), ˆ For all vertices w in layers L 1 with predecessors u, v, the clause u v w, ˆ for the sink z, the unit clause z. Figure 1(b) shows the formula corresponding to the pyramid in Figure 1(a). Give the best upper and lower bounds you can for the deterministic communication complexity of the falsied clause search problem for Peb Πh. Your bounds should hold for any partition X. Y = Vars ( Peb Πh ) of the variables. Express your bounds in terms of the number of vertices n = (h + 1)(h + 2)/2 in the graph Π h. For full credit the bounds should be asymptotically tight. Hint: Some kind of binary search might be a fruitful idea here. Page 3 (of 5)

z x y u v w (a) Pyramid graph Π 2 of height 2. u v w (u v x) (v w y) (x y z) z (b) Pebbling formula Peb Π2. Figure 1. Example pebbling formula. 9b 9c 9d (20 p) In the XORied pebbling formula Peb Πh [ ] over Π h we instead think of each vertex v as the exclusive or of two variables v 1 v 2 and have the following clauses: ˆ for all vertices s in the bottom layer, the CNF encoding of s 1 s 2, ˆ For all w in layers L 1 with predecessors u, v, the CNF encoding of (u 1 u 2 ) (v 1 v 2 ) (w 1 w 2 ), ˆ for the sink z, the CNF encoding of (z 1 z 2 ). Figure 2 shows the XORied pebbling formula for the pyramid in Figure 1(a). Give the best upper bound you can for the deterministic communication complexity of the falsied clause search problem for Peb Πh [ ], where Alice gets all variables X = {u 1, v 1, w 1,...} and Bob gets all variables Y = {u 2, v 2, w 2,...} (again expressed in terms of the number of vertices n = (h + 1)(h + 2)/2 in Π h ). (40 p) We say that a randomized protocol P solves the falsied clause search problem for F consistently if P computes some function f : Vars ( F ) {C F } except with error probability ɛ, where f is such that for any input α = α X α Y it holds that f(α) = C α is a clause in F falsied by α. Observe that deterministic protocols are consistent by denition, but for assignments α falsifying several clauses in F a randomized protocol could potentially give dierent answers depending on the random coin ips. For a consistent protocol, we require that it always outputs some specic falsied clause f(α) = C α except with probability ɛ, and any other clause is considered to be an error even if it is falsied by α. Note, however, that the protocol can choose any function f it wants, and in particular is free to pick any falsied clause C α for each α independent of all other choices. What is the cost of the best consistent randomized protocol you can give for Peb Πh [ ] with variables partitioned as in Problem 9b, expressed in terms of n = Θ(h 2 )? ( p) Prove a ω(log n) deterministic communication complexity lower bound for the falsi- ed clause search problem for Peb Πh [ ] with variables partitioned as in Problem 9b (ideally a bound on the form Ω ( n δ) for some δ > 0), or establish that no such lower bound exist. Remark: This is an open research problem, and so you are not necessarily expected to solve it... Page 4 (of 5)

(u 1 u 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (u 1 u 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (v 1 v 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (v 1 v 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (w 1 w 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (w 1 w 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (z 1 z 2 ) (v 1 v 2 w 1 w 2 y 1 y 2 ) (z 1 z 2 ) Figure 2. XORied pebbling contradiction Peb Π2 [ ]. Page 5 (of 5)