Notes for Lecture 14

Similar documents
U.C. Berkeley Better-than-Worst-Case Analysis Handout 3 Luca Trevisan May 24, 2018

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017

Notes on Space-Bounded Complexity

Notes for Lecture 25

CS294: PCP and Hardness of Approximation January 25, Notes for Lecture 3

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 9/6/2004. Notes for Lecture 3

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 11 Luca Trevisan February 29, 2016

Notes on Space-Bounded Complexity

Lectures 15: Cayley Graphs of Abelian Groups

Midterm 1 for CS 170

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5

Notes for Lecture Decision Diffie Hellman and Quadratic Residues

1 Adjacency matrix and eigenvalues

Notes for Lecture 14 v0.9

15-451/651: Design & Analysis of Algorithms October 31, 2013 Lecture #20 last changed: October 31, 2013

Some notes on streaming algorithms continued

Notes for Lecture 15

Lecture Space Bounded and Random Turing Machines and RL

An Elementary Construction of Constant-Degree Expanders

The Simplest Construction of Expanders

Stanford University CS366: Graph Partitioning and Expanders Handout 13 Luca Trevisan March 4, 2013

Notes for Lecture 25

Very few Moore Graphs

Undirected ST-Connectivity in Log-Space. Omer Reingold. Presented by: Thang N. Dinh CISE, University of Florida, Fall, 2010

Lecture Semidefinite Programming and Graph Partitioning

Lecture 31: Miller Rabin Test. Miller Rabin Test

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

18.312: Algebraic Combinatorics Lionel Levine. Lecture 19

Lecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1

CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1

CS168: The Modern Algorithmic Toolbox Lecture #19: Expander Codes

Lecture 15: Expanders

1 Reductions and Expressiveness

Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681

CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication

Random Lifts of Graphs

Rings, Paths, and Paley Graphs

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 3 Luca Trevisan August 31, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017

Spectra of Semidirect Products of Cyclic Groups

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

Notes on Zero Knowledge

Notes for Lecture 17

Expander Construction in VNC 1

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Bounded Arithmetic, Expanders, and Monotone Propositional Proofs

CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication

Figure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations.

We simply compute: for v = x i e i, bilinearity of B implies that Q B (v) = B(v, v) is given by xi x j B(e i, e j ) =

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 12 Luca Trevisan October 3, 2017

1 Computational Problems

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

Lecture 6: September 22

1 Matrix notation and preliminaries from spectral graph theory

Definition A finite Markov chain is a memoryless homogeneous discrete stochastic process with a finite number of states.

Affine extractors over large fields with exponential error

Advanced Engineering Mathematics Prof. Pratima Panigrahi Department of Mathematics Indian Institute of Technology, Kharagpur

6.842 Randomness and Computation March 3, Lecture 8

Graph fundamentals. Matrices associated with a graph

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 27

Algebraic Methods in Combinatorics

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Algebraic Constructions of Graphs

Theoretical Cryptography, Lecture 10

Notes for Lecture 11

Lecture 5: Random Walks and Markov Chain

Lecture 14: Random Walks, Local Graph Clustering, Linear Programming

Algebraic Methods in Combinatorics

Lecture 8: Construction of Expanders

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 1/29/2002. Notes for Lecture 3

Linear Systems of ODE: Nullclines, Eigenvector lines and trajectories

Preliminaries and Complexity Theory

Notes for Lecture 9. 1 Combining Encryption and Authentication

Spectral Graph Theory and You: Matrix Tree Theorem and Centrality Metrics

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods. Lecture 7: November 11, 2003 Estimating the permanent Eric Vigoda

Lecture 12: Constant Degree Lossless Expanders

Proof of a Conjecture on Monomial Graphs

Lecture 4. 1 Estimating the number of connected components and minimum spanning tree

Linear Systems of ODE: Nullclines, Eigenvector lines and trajectories

Lower Bounds for Testing Bipartiteness in Dense Graphs

Applying block intersection polynomials to study graphs and designs

An Algorithmist s Toolkit September 10, Lecture 1

Lecture 17 November 8, 2012

Midterm 2. DO NOT turn this page until you are instructed to do so

CSE373: Data Structures and Algorithms Lecture 3: Math Review; Algorithm Analysis. Catie Baker Spring 2015

CS173 Lecture B, November 3, 2015

Eigenvalues, random walks and Ramanujan graphs

ORIE 6334 Spectral Graph Theory September 22, Lecture 11

Lecture 6: Random Walks versus Independent Sampling

Advanced topic: Space complexity

A Brief Outline of Math 355

On the inverse matrix of the Laplacian and all ones matrix

U.C. Berkeley CS174: Randomized Algorithms Lecture Note 12 Professor Luca Trevisan April 29, 2003

A Polynomial-Time Algorithm for Pliable Index Coding

Lecture 13: Spectral Graph Theory

Random Walk and Expander

Lecture 12 : Graph Laplacians and Cheeger s Inequality

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010

Transcription:

U.C. Berkeley CS278: Computational Complexity Handout N4 Professor Luca Trevisan 3/3/2008 Notes for Lecture 4 In the last lecture, we saw how a series of alternated squaring and zig-zag products can turn any connected graph into a good expander and, in particular, into a graph of diameter O(log n). Today we ll see how that construction naturally leads to Reingold s O(log n)- space deterministic algorithm for ST-UCONN, the problem of connectivity in undirected graphs. There is an easy reduction from ST-UCONN in general graphs to the special case of 3-regular graphs, so we will only deal with the latter case. We begin the lecture with the last missing piece from the expander constructions we have seen so far: how to construct a d-regular graph H with d 4 vertices and small λ 2. An Explicit Construction of Small Expanders In this section we prove the following theorem, which was stated without proof in a past lecture. Theorem For every prime p and integer t < p, there is a p 2 -regular graph H with p t+ vertices and λ 2 (H) t p. We let the vertex set of H be V := F t+ p. For every α, F, and every vertex v = (v 0,..., v t ), we have an edge connective v to the vertex (v 0 +, v + α,..., v t + α t ). Note that the graph is p 2 -regular as promised. In order to analyse the eingenvalues of (the transition matrix of) H, we will present a set of V orthogonal eigenvectors, and we will be guaranteed that their corresponding eigenvalues include all the eigenvalues of the graph. Although we know that there are real eigenvectors, we will present a system of eigenvectors with complex-valued entries. We start with a few preliminary observations. Let ω := e 2πi/p be a primitive p-th root of unity. Observe that ω has the property that ω p =, and that ω 0 + ω + ω 2 + ω p = 0 where the above equality follows from the fact that, if we define s := p j=0 ωj, then we have ω s = s, and so s = 0. More generally, for every k p, we have p ω kj = 0 j=0 because the mapping j kj mod p is a bijection, and so the above summation is just a reordering of the sum p j=0 ωj. We now define our system of eigenvectors. For b F t+, we define the vector x b as x b (a) := ω P j a jb j

and We will need the following two linearity properties x b (u) x b (v) = x b (u + v) () x a (v) x b (v) = x a+b (v) (2) Note also that x a (u) = x a (u). We can now prove that the vectors x b are orthogonal. Take any two vectors x a, x b, b a, and consider their inner product x a, x b = v x a (v)x b (v) = v x a b (v) = v ω P j (a j b j )v j = j v j ω (a j b j)v j = 0 where the last equality follows from the fact that if a b then there is an index j such that a j b j 0 (mod p), and so, for that j, v j ω (a j b j)v j = 0 Next, we prove that each of the vectors x a is an eigenvector. If M is the transition matrix of H, then and, using linearity, (x a M)(v) = p 2 x a (v (, α, α t )) = p 2 x a (v)x a ( (, α, α t )) = x a (v) p 2 x a (, α, α t ) where we have eliminated the minus sign via the change of variable. Thus we established that each vector x a is an eigenvector, with eigenvalue λ a λ a := p 2 x a (, α,, α t ) When a = (0,..., 0), then λ 0,...,0 =, and the corresponding eigenvector is (,..., ), as usual in an undirected graph. We now bound all other eigenvalues in absolute value. Let a (0,..., 0), and define the polynomial P a (z) := a 0 + a z + + a t z t. This is a non-zero polynomial of degree t, and hence it has at most t roots. 2

λ a = = = p 2 x a (, α,, α t ) p 2 ω a 0+a α+ +a tα t p 2 ω Pa(α) p 2 ω 0 + p 2 t p α:p a(α)=0 α:p a(α) 0 ω Pa(α) With the last inequality following from the fact that there are at most t values of α such that P a (α) = 0, and from the fact that for each α such that P a (α) 0 we have, by previous calculations ω Pa(α) = 0 2 Reingold s Connectivity Algorithm Let H be a d-regular graph on d 4 vertices such that λ 2 (H) 0. From the construction of the previous section, we can take p = 7 and t = 7, so that the graph is d = (7) 2 -regular and has (7) 8 = d 4 vertices, while its λ 2 parameter is at most 7 7. If G 0 is a d 2 -regular graph on n vertices, and we define, for k, G k := G 2 k Z H Then we proved in the previous lecture that each G k is d 2 -regular, it has n d 4k vertices, and { } λ 2 (G k ) max 2, (.2)k ( λ 2 (G)) In particular, if G is a connected 3-regular graph, and G 0 is defined as G plus d 2 3 self-loops on each vertex, then { ( )} λ 2 (G k ) max 2, (.2)k O n 2 and, for k = O(log n), G k has a λ 2 parameter that is at most /2. This also implies, by earlier calculations, that the diameter of G k is at most O(log nd 4k ) = O(log n). 3

Let us give names to the vertices and edges of G k. Let us start from G := G 2 0 Z H. G 2 0 has the same vertex set as G 0, but the (a, b)-th edge out of u in G 2 0 is the edge that connects u with v, provided that there is a vertex w in G 0 such that w is the a-th neighbor of v and u is the b-th neighbor of w. (In the above a, b [d 2 ].) In G 2 0 Z H, we have vertices of the type (u, (a, b)), and we have that the c-th neighbor of (u, (a, b)) is defined in the following way. Write c = (c, c 2 ), so that c and c 2 index edges in H. Let (f, g) be the c -th neihgbor of (a, b) in H. Let (v, (h, m)) be the unique neighbor of (u, (f, g)) outside the block of u in the replacement product. (That is, v is the (f, g)-th neighbor of u in G 2 0 and u is the (h, m)-th neighbor of v in G2 0.) Finally, let (p, q) be the c 2 -th neighbor of (f, g) in H. Then (v, (p, q)) is the (c, c 2 )-th neighbor of (u, (a, b)) in G. In general, a vertex of G k is of the form (u, a,..., a k ) where each a i is an element of [d 4 ]. Suppose now that G is not connected, but that a set of vertices S in G induces a connected component. As before, define G 0 to be G plus d 2 3 self-loops on each vertex, and define G k := G 2 k Z H. If we focus, at each step k, on the set of vertices of the form (u, a,..., a k ) with u S, then the graph they induce is the same we would have obtained as if we had started with G restricted to S and carried out the above procedure. In particular, when k = O(log n), this subgraph of G k has logarithmic diameter. Note also that if S and T induce two distinct connected components in G, then vertices of the form (u, a,..., a k ) with u S and (v, b,..., b k ) with v T will form two distinct connected component in G k. These observations give the outline of Reingold s algorithm. Given a 3-regular graph G on n vertices and two vertices s, t, construct the graph G k as above, with k = O(log n) chosen so that each connected component of G becomes a connected component of G k having λ 2 parameter at most 2, and so diameter O(log n). Then, check whether (s, a,..., a k ) and (t, a..., a k ) are connected, where the a i can be chosen arbitrarily. The second step can be implemented using O(log n) memory, because G k has n O() vertices, O() degree and O(log n) diameter. If the construction of G k with k = O(log n) can be carried out by a O(log n) memory transducer, then the whole computation can be carried out using O(log n) space. (Recall that a log-space computation performed on the output of a log-space transducer can be performed in log-space.) It remains to organize the recursive computation of the adjacency matrix of G k in terms of G k so that each step of the recursion can be implemented using only O(log n) global memory, shared between the various levels of recursion, and a constant number of extra bits of memory per level. We shall refer to Reingold s paper for the details. 3 References Reingold s algorithm appeared in [Rei05]. 4

References [Rei05] Omer Reingold. Undirected ST-connectivity in log-space. In Proceedings of the 37th ACM Symposium on Theory of Computing, pages 376 385, 2005. 4 5