CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

Similar documents
Lecture 16: Communication Complexity

Partitions and Covers

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,

CS Communication Complexity: Applications and New Directions

Lecture 5: February 21, 2017

On extracting computations from propositional proofs (a survey)

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

Resolution Lower Bounds for the Weak Pigeonhole Principle

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

AVERAGE CASE LOWER BOUNDS FOR MONOTONE SWITCHING NETWORKS. Robert Robere

Communication Lower Bounds via Critical Block Sensitivity

Resolution and the Weak Pigeonhole Principle

CS Foundations of Communication Complexity

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

CS21 Decidability and Tractability

Lecture 20: Lower Bounds for Inner Product & Indexing

A note on monotone real circuits

Essential facts about NP-completeness:

Complexity of Finding a Duplicate in a Stream: Simple Open Problems

Regular Resolution Lower Bounds for the Weak Pigeonhole Principle

NP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof

Comp487/587 - Boolean Formulas

CSCI 1590 Intro to Computational Complexity

Upper and Lower Bounds for Tree-like. Cutting Planes Proofs. Abstract. In this paper we study the complexity of Cutting Planes (CP) refutations, and

Lecture Notes CS:5360 Randomized Algorithms Lecture 20 and 21: Nov 6th and 8th, 2018 Scribe: Qianhang Sun

Classes of Boolean Functions

Communication Complexity

More NP-Complete Problems

Math 262A Lecture Notes - Nechiporuk s Theorem

NP Complete Problems. COMP 215 Lecture 20

CSE 3500 Algorithms and Complexity Fall 2016 Lecture 25: November 29, 2016

Propositional Logic: Models and Proofs

CS 512, Spring 2017, Handout 10 Propositional Logic: Conjunctive Normal Forms, Disjunctive Normal Forms, Horn Formulas, and other special forms

Propositional and Predicate Logic - V

Asymmetric Communication Complexity and Data Structure Lower Bounds

COS597D: Information Theory in Computer Science October 5, Lecture 6

Matrix Rank in Communication Complexity

NP-Complete Reductions 2

NP-Complete Problems. More reductions

Dag-like Communication and Its Applications

CS 5114: Theory of Algorithms

RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS

Deductive Systems. Lecture - 3

Branching. Teppo Niinimäki. Helsinki October 14, 2011 Seminar: Exact Exponential Algorithms UNIVERSITY OF HELSINKI Department of Computer Science

1.1 P, NP, and NP-complete

arxiv: v1 [cs.cc] 10 Aug 2007

Lecture 8. MINDNF = {(φ, k) φ is a CNF expression and DNF expression ψ s.t. ψ k and ψ is equivalent to φ}

CSCI 1010 Models of Computa3on. Lecture 02 Func3ons and Circuits

The Strength of Multilinear Proofs

Instructor N.Sadagopan Scribe: P.Renjith. Lecture- Complexity Class- P and NP

On the Structure and the Number of Prime Implicants of 2-CNFs

arxiv: v1 [cs.cc] 22 Aug 2018

Monotone Circuits for Matching Require. Linear Depth

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).

2

NP-Complete Reductions 1

Theory of Computation Chapter 9

Lecture 3: Nondeterminism, NP, and NP-completeness

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

Propositional Logic and Semantics

Boolean circuits. Lecture Definitions

arxiv: v1 [cs.cc] 12 Feb 2009

Clause/Term Resolution and Learning in the Evaluation of Quantified Boolean Formulas

PROPOSITIONAL LOGIC. VL Logik: WS 2018/19

CS21 Decidability and Tractability

1 Propositional Logic

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Computational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30)

Introduction. Pvs.NPExample

CS151 Complexity Theory. Lecture 13 May 15, 2017

Design and Analysis of Algorithms

Lecture 24 : Even more reductions

CS6840: Advanced Complexity Theory Mar 29, Lecturer: Jayalal Sarma M.N. Scribe: Dinesh K.

CS 583: Algorithms. NP Completeness Ch 34. Intractability

NP-completeness. Chapter 34. Sergey Bereg

Propositional Logic. Testing, Quality Assurance, and Maintenance Winter Prof. Arie Gurfinkel

Lecture 3: AC 0, the switching lemma

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1

8.1 Polynomial Threshold Functions

Lecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition.

NP-Completeness Part II

Lecture 2: Proof of Switching Lemma

Part V. Intractable Problems

Propositional Logic Basics Propositional Equivalences Normal forms Boolean functions and digital circuits. Propositional Logic.

Complexity Classes V. More PCPs. Eric Rachlin

Lecture 15 April 9, 2007

Solvers for the Problem of Boolean Satisfiability (SAT) Will Klieber Aug 31, 2011

Conjunctive Normal Form and SAT

CS Foundations of Communication Complexity

1 Primals and Duals: Zero Sum Games

1 More finite deterministic automata

NP-Completeness. Subhash Suri. May 15, 2018

Disjoint DNF Tautologies with Conflict Bound Two

INAPPROX APPROX PTAS. FPTAS Knapsack P

18.10 Addendum: Arbitrary number of pigeons

Introduction to Interactive Proofs & The Sumcheck Protocol

Interpolation theorems, lower bounds for proof. systems, and independence results for bounded. arithmetic. Jan Krajcek

Conjunctive Normal Form and SAT

Transcription:

CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many applications in computer science. Specifically, CC lower bounds for Set Disjoint problem is useful to prove many results in a large variety of contexts. Set disjoint problem Streaming problem Monotone formula and circuit complexity Proof complexity 2 Set Disjoint Problem Definition The set disjoint problem is defined as follows. Suppose Alice has a number x {0, 1} n and Bob has a number y {0, 1} n. We denote the disjoint function DISJ(x, y) = 1 if and only if there exists an integer i, such that x i = y i = 1. Theorem 1 DISJ function requires Ω(n) bits communication for deterministic protocols. Proof Consider all (x, y) pairs that x y = 1. Each pair of (x, y) is in its own rectangle in the communication matrix and there are 2 n such pairs. For any (x, y) that x y = 1, we have DISJ(x, y) = 0. Given arbitrary two such pairs, (x, y) and (x, y ), we have either DISJ(x, y) = 1 or DISJ(x, y ) = 1. So DISJ function has a fooling set of size 2 n, thus its deterministic communication complexity is Ω(n). Note that the DISJ function has a O(1) non-deterministic communication protocol. This is because each of Alice and Bob can guess the value of i then send each other s bit x i and y i, then compare them and output the result. Meanwhile, we claim that DISJ function requires Ω(n) bits communication for all randomized protocols. The proof of this claim requires knowledge on Information Theory and is not covered in this lecture. 1

3 Streaming Problem Complexity Suppose the input is a stream of data, the streaming complexity of a problem is how much space it would need to store in the worst case processing the stream. We use the following frequency moment problem as an example to show how to use communication complexity to prove streaming problem complexity lower bounds. Definition Suppose S [n] m is a length-m stream and S j is the j-th element in S. Let M i = { j [m] S j = i}, so M i equals to number of times that i appear in the stream. We further define F k = n i=1 M i k. Hence F 0 is the number of distinct elements in the stream, F 1 is the length of the stream, and F is the number of occurrences of the most frequent item in S. Theorem 2 If we have a small space algorithm for F, we can solve DISJ with small communication complexity. Proof Suppose Alice has a number x {0, 1} n, Bob has a number y {0, 1} n. For Alice, she can generate a stream of numbers a x = {i x i = 1}, then run algorithm F on a x. This computation will only take a small space based on our assumption. Suppose it takes s bits of space. Then Alice can send these s bit space after the compuation of F (a x ) to Bob. Bob will continue to use these s bit space to simulate the computation on b y, where b y = {i y i = 1}. The output will be the number of occurrences of the most frequent item in a x b y. If the output number is larger than one, we know there is some number appear more than once in a x b y, which means DISJ(x, y) = 0. Otherwise DISJ(x, y) = 1. 4 Circuit Complexity In this section we will discuss the relation between circuit depth lower bound and communication complexity. Definition Clique problem. For k = n/10, given an n-node undirected graph G = (V, E), does it contain a clique of size k? (A k-sized clique means there is a subset S V, S = k, such that i, j S, < i, j > E.) The clique problem is a problem having the monotone property. It takes a n 2 -sized vector as input (could be adjacent matrix or adjacent list representation of this graph). If the answer of the clique problem on this input graph is true, then it means adding new edge into this graph, the graph will keep the property that contain a k-clique. In other words, changing any 0 to 1 in the input will only make the output larger, which means larger input is more likely to have larger output. Theorem 3 Any monotone circuit for the clique problem requires depth Ω( n). This implies any monotone formula for clique requires size 2 Ω n. Monotone circuits means circuits with and gates but without negation. This is because changing any input bit from 0 to 1 will make the output more likely to output 1. For any 2

circuit that requires depth Ω( n), we claim that it requires formula size 2 Ω n. This is because any formula with size S can be balanced to depth log(s). So we will show how to reduce the depth of circuit solving a function f to a communication complexity solving a Karchmer-Wigderson game R(f). Definition Suppose we have a boolean function solving a search problem: f : {0, 1} n {0, 1} where the output indicates if the search result is true for false. For example, for the searching clique problem the input of f could be a graph and f returns whether this graph has a clique of size k = n/10. We define R(f) as the following problem: at the beginning, Alice gets x f 1 (1) and Bob gets y f 1 (0). For the clique problem example, Alice gets a graph that contains a clique of k vertices. Meanwhile, Bob gets a maxterm k 1 non-clique graph, which means adding even one edge will make the graph contain a clique of size k. Output of R(f) will be the first i such that x i y i. If f is monotone, then R(f) is to output the first i such that x i = 1 and y i = 0. Theorem 4 Let f by any function {0, 1} n {0, 1}. CC(R f ) equals to the minimal depth of the circuit that solves f. If f is monotone, then CC(R f ) equals to the minimal depth of monotone circuit solving f. Proof We show that CC(R f ) depth(f) by reducing a circuit that computes f to a protocol that solves R f. The circuit can be shown as a tree of gates. We can assume that the top of the circuit is an gate and next level is a gate, and so on. Suppose Alice has x f 1 (1) and Bob has y f 1 (0). Because f(y) = 0, for f(y) there must be a gate on the next level of circuit whose output is different with f(x). So Alice and Bob will communicate, telling each other which gate their output start to diverse. Then they recurse to a lower level in the circuit. At this time we meet the same problem as before, but on a smaller subcircuit. We recurse until we meet to the leaves of the circuit, where the input is simply one of bits on x and y, where we can identify the index of difference between x and y. We send one message for every level of circuit that we traverse down, so the total communication complexity of R f depth(f). Here we give an example of how we build the protocol. Example x1!x2 x1 x5!x4 x2 Figure 1: Convert a circuit into a communication protocol. 3

Suppose Alice has input 01101 and Bob has input 01010. Then on the circuit above the sequence of bits sent would be as follows. 1. Alice: 0 (go right) 2. Bob: 1 (go left) 3. Alice: 0 (go left) 4. Both Alice and Bob reach x 3 bit on which they differ. Now we will show depth(f) CC(R f ). Given a protocol for R f, we can also construct a circuit computing f with depth CC(R f ). Suppose R f takes x for Alice and y for Bob, it outputs z as the result. Consider a protocol tree T for R f and we can convert T into a circuit as follows: 1. For each node where the message is sent by Alice, replace the node with an gate. 2. For each node where the message is sent by Bob, replace the node with an gate. 3. At each leaf of the protocol tree, with associated monochromatic rectangle AxB and input bit i, one of the following holds: (a) α A, α i = 1 and β B, β i = 0 (b) α A, α i = 0 and β B, β i = 1 If (a) holds, we assign the leaf node to z i, otherwise we assign it to z i. 5 Proof Complexity In this section we will show the relation between communication complexity and proof complexity. Proof complexity is about the length of proof that is needed for proving a theorem. For example, an open problem in proof complexity field is about how to prove or disprove there exists a family of 3DNF tautologies {f n n sufficient large} where each f n is a 3DNF tautology and n variables, such that any f n requires Frege proof of size superpolynomial in n. (x 1 x 2 x 3 ) ( x 1 x 3 x 4 ) (x 2 x 3 x 4 ) ( x 3 x 4 ) x 3 ( x 4 (x 2 x 3 ) x 2 x 3 x 3 Figure 2: Resolution refutation proof tree of an unsatisfiable formula. 4

Definition Resolution proofs. Resolution refutation can show a CNF formula is unsatisfiable. Resolution rule is the only inference rule in this system. It produces a new clause implied by two clauses containing complementary elements. Two elements are complementary if one is the negation of the other. For example c is complement to c. The resulting clause contains all the elements that do not have the complements. If the proof finishes with an empty clause, then the original formula is unsatisfiable. Resolution rule is known to be both sound and complete. Figure 1 shows a resolution proof tree of an unsatisfiable CNF formula (x 1 x 2 x 3 ) ( x 1 x 3 x 4 ) x 2 x 3 ( x 3 x 4 ). Size of a resolution refutation proof is the total number of clauses in the proof. Lemma 5 If f has a resolution refutation proof of depth d, then search f protocol of cost O(d). has a communication Proof We can reduce depth of a resolution proof tree to communication complexity of a search problem. Let f be an unsatisfiable CNF formula. We define the problem search f where the variables in f are partitioned into two groups: x and y. Alice gets assignment α to x variables and Bob gets assignment β to y variables. The taget is to find out a clause C i in f, such that C i (α, β) = 0. We can do it starting from the root of the proof tree towards leaves of the tree. For each child clause of root, Alice will evaluate all literals for the clauses using α and send the result to Bob and Bob will do the same thing. If either Alice or Bob get result 1 it means this clause is true under (α, β), otherwise the clause is false. Because the resolution rule is sound, the assignment (α, β) is guaranteed to falsify at least one branch clause, where Alice and Bob will start to go one step down until they reach the leaf node. In the end they will find a clause of f is falsified. It takes at most d steps so CC(search f ) = O(d). Note that this proof can be generalized to any sound proof system that can be represented by a 2-player communication protocol. Theorem 6 Any resolution proof of f n requires a resolution tree of depth Ω(n) and tree size 2 Ω(n). 5