首页 > 最新文献

ACM Transactions on Computation Theory (TOCT)最新文献

英文 中文
A Polynomial Degree Bound on Equations for Non-rigid Matrices and Small Linear Circuits 非刚性矩阵和小线性电路方程的多项式度界
Pub Date : 2022-07-26 DOI: 10.1145/3543685
Ben lee Volk, Mrinal Kumar
We show that there is an equation of degree at most poly(n) for the (Zariski closure of the) set of the non-rigid matrices: That is, we show that for every large enough field 𝔽, there is a non-zero n2-variate polynomial P ε 𝔽[x1, 1, ..., xn, n] of degree at most poly(n) such that every matrix M that can be written as a sum of a matrix of rank at most n/100 and a matrix of sparsity at most n2/100 satisfies P(M) = 0. This confirms a conjecture of Gesmundo, Hauenstein, Ikenmeyer, and Landsberg [9] and improves the best upper bound known for this problem down from exp (n2) [9, 12] to poly(n). We also show a similar polynomial degree bound for the (Zariski closure of the) set of all matrices M such that the linear transformation represented by M can be computed by an algebraic circuit with at most n2/200 edges (without any restriction on the depth). As far as we are aware, no such bound was known prior to this work when the depth of the circuits is unbounded. Our methods are elementary and short and rely on a polynomial map of Shpilka and Volkovich [21] to construct low-degree “universal” maps for non-rigid matrices and small linear circuits. Combining this construction with a simple dimension counting argument to show that any such polynomial map has a low-degree annihilating polynomial completes the proof. As a corollary, we show that any derandomization of the polynomial identity testing problem will imply new circuit lower bounds. A similar (but incomparable) theorem was proved by Kabanets and Impagliazzo [11].
我们证明了非刚性矩阵集合的(Zariski闭包)在最多聚(n)处存在一个度方程:即,我们证明了对于每一个足够大的域,存在一个非零的n2变量多项式P ε∈[x1, 1,…], xn, n]次最多为poly(n),使得每一个矩阵M可以写成秩最多为n/100的矩阵与稀疏度最多为n2/100的矩阵的和,满足P(M) = 0。这证实了Gesmundo, Hauenstein, Ikenmeyer和Landsberg[9]的一个猜想,并改进了已知的该问题的最佳上界,从exp (n2)[9,12]到poly(n)。我们还为所有矩阵M的集合(Zariski闭包)展示了一个类似的多项式度界,使得由M表示的线性变换可以通过一个最多有n2/200条边的代数电路来计算(对深度没有任何限制)。据我们所知,在这项工作之前,当电路的深度是无界的时候,没有这样的界限是已知的。我们的方法是基本和简短的,并依赖于Shpilka和Volkovich[21]的多项式映射来构建非刚性矩阵和小型线性电路的低度“通用”映射。将这种构造与一个简单的维数计数论证结合起来,表明任何这样的多项式映射都有一个低次湮灭多项式,从而完成了证明。作为一个推论,我们证明了多项式恒等检验问题的任何非随机化将隐含新的电路下界。Kabanets和Impagliazzo[11]也证明了一个类似的(但无可比拟的)定理。
{"title":"A Polynomial Degree Bound on Equations for Non-rigid Matrices and Small Linear Circuits","authors":"Ben lee Volk, Mrinal Kumar","doi":"10.1145/3543685","DOIUrl":"https://doi.org/10.1145/3543685","url":null,"abstract":"We show that there is an equation of degree at most poly(n) for the (Zariski closure of the) set of the non-rigid matrices: That is, we show that for every large enough field 𝔽, there is a non-zero n2-variate polynomial P ε 𝔽[x1, 1, ..., xn, n] of degree at most poly(n) such that every matrix M that can be written as a sum of a matrix of rank at most n/100 and a matrix of sparsity at most n2/100 satisfies P(M) = 0. This confirms a conjecture of Gesmundo, Hauenstein, Ikenmeyer, and Landsberg [9] and improves the best upper bound known for this problem down from exp (n2) [9, 12] to poly(n). We also show a similar polynomial degree bound for the (Zariski closure of the) set of all matrices M such that the linear transformation represented by M can be computed by an algebraic circuit with at most n2/200 edges (without any restriction on the depth). As far as we are aware, no such bound was known prior to this work when the depth of the circuits is unbounded. Our methods are elementary and short and rely on a polynomial map of Shpilka and Volkovich [21] to construct low-degree “universal” maps for non-rigid matrices and small linear circuits. Combining this construction with a simple dimension counting argument to show that any such polynomial map has a low-degree annihilating polynomial completes the proof. As a corollary, we show that any derandomization of the polynomial identity testing problem will imply new circuit lower bounds. A similar (but incomparable) theorem was proved by Kabanets and Impagliazzo [11].","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123385989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal Distribution-Free Sample-Based Testing of Subsequence-Freeness with One-Sided Error 单侧误差下子序列自由度的最优无分布抽样检验
Pub Date : 2022-03-24 DOI: 10.1145/3512750
D. Ron, Asaf Rosin
In this work, we study the problem of testing subsequence-freeness. For a given subsequence (word) w = w1 … wk, a sequence (text) T = t1 … tn is said to contain w if there exist indices 1 ≤ i1 < … < ik ≤ n such that tij = wj for every 1 ≤ j ≤ k. Otherwise, T is w-free. While a large majority of the research in property testing deals with algorithms that perform queries, here we consider sample-based testing (with one-sided error). In the “standard” sample-based model (i.e., under the uniform distribution), the algorithm is given samples (i, ti) where i is distributed uniformly independently at random. The algorithm should distinguish between the case that T is w-free, and the case that T is ε-far from being w-free (i.e., more than an ε-fraction of its symbols should be modified so as to make it w-free). Freitag, Price, and Swartworth (Proceedings of RANDOM, 2017) showed that O((k2 log k)ε) samples suffice for this testing task. We obtain the following results. – The number of samples sufficient for one-sided error sample-based testing (under the uniform distribution) is O(kε). This upper bound builds on a characterization that we present for the distance of a text T from w-freeness in terms of the maximum number of copies of w in T, where these copies should obey certain restrictions. – We prove a matching lower bound, which holds for every word w. This implies that the above upper bound is tight. – The same upper bound holds in the more general distribution-free sample-based model. In this model, the algorithm receives samples (i, ti) where i is distributed according to an arbitrary distribution p (and the distance from w-freeness is measured with respect to p). We highlight the fact that while we require that the testing algorithm work for every distribution and when only provided with samples, the complexity we get matches a known lower bound for a special case of the seemingly easier problem of testing subsequence-freeness with one-sided error under the uniform distribution and with queries (Canonne et al., Theory of Computing, 2019).
在这项工作中,我们研究了子序列自由度的测试问题。对于给定的子序列(word) w = w1…wk,如果存在索引1≤i1 <…< ik≤n,且对于每一个1≤j≤k, tij = wj,则称序列(text) T = t1…tn包含w,否则T不含w。虽然绝大多数属性测试研究涉及执行查询的算法,但在这里我们考虑基于样本的测试(具有单侧误差)。在“标准”样本模型中(即均匀分布下),算法给定样本(i, ti),其中i均匀独立随机分布。算法应该区分T是无w的情况,以及T是ε-远不是无w的情况(即,应该修改其符号的ε-分数以使其无w)。Freitag, Price和Swartworth (Proceedings of RANDOM, 2017)表明,O((k2 log k)ε)样本足以完成该测试任务。我们得到以下结果。-在均匀分布下,足以进行单侧误差样本检验的样本数量为0 (kε)。这个上限建立在一个表征上,我们用w在T中的最大拷贝数来表示文本T与w自由的距离,这些拷贝应该遵守一定的限制。-我们证明了一个匹配的下界,它适用于每个单词w。这意味着上面的上界是紧的。同样的上界适用于更一般的无分布的基于样本的模型。在该模型中,算法接收样本(i, ti),其中i根据任意分布p分布(并且相对于p测量到w-free的距离)。我们强调的事实是,虽然我们要求测试算法适用于每个分布,并且仅提供样本时,我们得到的复杂性匹配一个已知的下界,这是一个看似更容易的问题,即在均匀分布和查询下测试单侧错误的子序列自由性(Canonne等人,Theory of Computing, 2019)。
{"title":"Optimal Distribution-Free Sample-Based Testing of Subsequence-Freeness with One-Sided Error","authors":"D. Ron, Asaf Rosin","doi":"10.1145/3512750","DOIUrl":"https://doi.org/10.1145/3512750","url":null,"abstract":"In this work, we study the problem of testing subsequence-freeness. For a given subsequence (word) w = w1 … wk, a sequence (text) T = t1 … tn is said to contain w if there exist indices 1 ≤ i1 < … < ik ≤ n such that tij = wj for every 1 ≤ j ≤ k. Otherwise, T is w-free. While a large majority of the research in property testing deals with algorithms that perform queries, here we consider sample-based testing (with one-sided error). In the “standard” sample-based model (i.e., under the uniform distribution), the algorithm is given samples (i, ti) where i is distributed uniformly independently at random. The algorithm should distinguish between the case that T is w-free, and the case that T is ε-far from being w-free (i.e., more than an ε-fraction of its symbols should be modified so as to make it w-free). Freitag, Price, and Swartworth (Proceedings of RANDOM, 2017) showed that O((k2 log k)ε) samples suffice for this testing task. We obtain the following results. – The number of samples sufficient for one-sided error sample-based testing (under the uniform distribution) is O(kε). This upper bound builds on a characterization that we present for the distance of a text T from w-freeness in terms of the maximum number of copies of w in T, where these copies should obey certain restrictions. – We prove a matching lower bound, which holds for every word w. This implies that the above upper bound is tight. – The same upper bound holds in the more general distribution-free sample-based model. In this model, the algorithm receives samples (i, ti) where i is distributed according to an arbitrary distribution p (and the distance from w-freeness is measured with respect to p). We highlight the fact that while we require that the testing algorithm work for every distribution and when only provided with samples, the complexity we get matches a known lower bound for a special case of the seemingly easier problem of testing subsequence-freeness with one-sided error under the uniform distribution and with queries (Canonne et al., Theory of Computing, 2019).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116274673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Approximate Degree, Weight, and Indistinguishability 近似度、重量和不可区分性
Pub Date : 2022-03-04 DOI: 10.1145/3492338
Xuangui Huang, Emanuele Viola
We prove that the OR function on {-1,1}n can be pointwise approximated with error ε by a polynomial of degree O(k) and weight 2O(n log (1/ε)/k), for any k ≥ √n log (1/ε). This result is tight for any k ≤ (1-Ω (1))n. Previous results were either not tight or had ε = Ω (1). In general, we obtain a tight approximate degree-weight result for any symmetric function. Building on this, we also obtain an approximate degree-weight result for bounded-width CNF. For these two classes no such result was known. We prove that the ( mathsf {OR} ) function on ( lbrace -1,1rbrace ^n ) can be pointwise approximated with error ( epsilon ) by a polynomial of degree ( O(k) ) and weight ( 2^{O(n log (1/epsilon) /k)} ) , for any ( k ge sqrt {n log (1/epsilon)} ) . This result is tight for any ( k le (1-Omega (1))n ) . Previous results were either not tight or had ( epsilon = Omega (1) ) . In general, we obtain a tight approximate degree-weight result for any symmetric function. Building on this, we also obtain an approximate degree-weight result for bounded-width ( mathsf {CNF} ) . For these two classes no such result was known. One motivation for such results comes from the study of indistinguishability. Two distributions ( P ) , ( Q ) over ( n ) -bit strings are ( (k,delta) ) -indistinguishable if their projections on any ( k ) bits have statistical distance at most ( delta ) . The above approximations give values of ( (k,delta) ) that suffice to fool ( mathsf {OR} ) , symmetric functions, and bounded-width ( mathsf {CNF} ) , and the first result is tight for all ( k ) while the second result is tight for ( k le (1-Omega (1))n ) . We also show that any two ( (k, delta) ) -indistinguishable distributions are ( O(n^{k/2}delta) ) -close to two distributions that are ( (k,0) ) -indistinguishable, improving the previous bound of ( O(n)^k delta ) . Finally, we present proofs of some known approximate degree lower bounds in the language of indistinguishability, which we find more intuitive.
我们证明了对于任意k≥√n log (1/ε),在{-1,1}n上的OR函数可以用一个阶为O(k)、权为2O(n log (1/ε)/k)的多项式点逼近误差为ε。这个结果对于任何k≤(1-Ω (1))n都是严密的。以前的结果要么不紧,要么ε = Ω(1)。一般来说,我们对任何对称函数都得到了一个紧的近似度权结果。在此基础上,我们还得到了有界宽度CNF的近似度权结果。对于这两个类,没有这样的结果是已知的。我们证明了(lbrace -1,1rbrace ^n )上的(mathsf {OR} )函数对于任意(k ge sqrt {n log (1/epsilon)} ,可以用一个阶数(O(k) )和权值(2^{O(n log (1/epsilon)} )的多项式逐点逼近误差(epsilon )。这个结果对于任何(k le (1- (1))n )都是紧密的。之前的结果要么不严密,要么有(epsilon = Omega(1) )。一般来说,对于任意对称函数,我们都得到了一个紧密近似的度权结果。在此基础上,我们还获得了bound -width (mathsf {CNF} )的近似度数权重结果。对于这两个类,没有这样的结果是已知的。这种结果的一个动机来自对不可区分性的研究。两个分布(P ), (Q ) / (n )位串是(k,delta) )不可区分的,如果它们在任意(k )位上的投影有最多(delta )的统计距离。上述近似给出的值(k,delta) )足以欺骗(mathsf {OR} )、对称函数和有界宽度(mathsf {CNF} ),并且第一个结果对所有(k )都是紧的,而第二个结果对(k le (1-Omega (1))n )是紧的。我们还证明了任意两个(k, delta) ) -不可区分的分布都(O(n^{k/2}delta) ) -接近于(k,0) ) -不可区分的两个分布,改进了(O(n)^k delta )的上一个边界。最后,我们用不可区分的语言给出了一些已知的近似度下界的证明,我们发现它更直观。
{"title":"Approximate Degree, Weight, and Indistinguishability","authors":"Xuangui Huang, Emanuele Viola","doi":"10.1145/3492338","DOIUrl":"https://doi.org/10.1145/3492338","url":null,"abstract":"We prove that the OR function on {-1,1}n can be pointwise approximated with error ε by a polynomial of degree O(k) and weight 2O(n log (1/ε)/k), for any k ≥ √n log (1/ε). This result is tight for any k ≤ (1-Ω (1))n. Previous results were either not tight or had ε = Ω (1). In general, we obtain a tight approximate degree-weight result for any symmetric function. Building on this, we also obtain an approximate degree-weight result for bounded-width CNF. For these two classes no such result was known. We prove that the ( mathsf {OR} ) function on ( lbrace -1,1rbrace ^n ) can be pointwise approximated with error ( epsilon ) by a polynomial of degree ( O(k) ) and weight ( 2^{O(n log (1/epsilon) /k)} ) , for any ( k ge sqrt {n log (1/epsilon)} ) . This result is tight for any ( k le (1-Omega (1))n ) . Previous results were either not tight or had ( epsilon = Omega (1) ) . In general, we obtain a tight approximate degree-weight result for any symmetric function. Building on this, we also obtain an approximate degree-weight result for bounded-width ( mathsf {CNF} ) . For these two classes no such result was known. One motivation for such results comes from the study of indistinguishability. Two distributions ( P ) , ( Q ) over ( n ) -bit strings are ( (k,delta) ) -indistinguishable if their projections on any ( k ) bits have statistical distance at most ( delta ) . The above approximations give values of ( (k,delta) ) that suffice to fool ( mathsf {OR} ) , symmetric functions, and bounded-width ( mathsf {CNF} ) , and the first result is tight for all ( k ) while the second result is tight for ( k le (1-Omega (1))n ) . We also show that any two ( (k, delta) ) -indistinguishable distributions are ( O(n^{k/2}delta) ) -close to two distributions that are ( (k,0) ) -indistinguishable, improving the previous bound of ( O(n)^k delta ) . Finally, we present proofs of some known approximate degree lower bounds in the language of indistinguishability, which we find more intuitive.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The (Coarse) Fine-Grained Structure of NP-Hard SAT and CSP Problems NP-Hard SAT和CSP问题的(粗)细晶结构
Pub Date : 2021-12-15 DOI: 10.1145/3492336
Victor Lagerkvist, Magnus Wahlström
We study the fine-grained complexity of NP-complete satisfiability (SAT) problems and constraint satisfaction problems (CSPs) in the context of the strong exponential-time hypothesis(SETH), showing non-trivial lower and upper bounds on the running time. Here, by a non-trivial lower bound for a problem SAT (Γ) (respectively CSP (Γ)) with constraint language Γ, we mean a value c0 > 1 such that the problem cannot be solved in time O(cn) for any c
在强指数时间假设(SETH)的背景下,研究了np完全可满足性(SAT)问题和约束满足问题(csp)的细粒度复杂性,给出了运行时间的非平凡下界和上界。这里,通过约束语言Γ的问题SAT (Γ)(分别为CSP (Γ))的非平凡下界,我们指的是一个值c0 > 1,使得对于任何c< c0,除非SETH为假,否则问题不能在O(cn)时间内解决,而非平凡上界仅仅是对于某些c< 2,在O(cn)时间内运行的问题的算法。这样的下界已经被证明是非常难以捉摸的,除了c0=2的情况外,实际上没有这样的上界是已知的。我们通过使用代数框架来实现这一点,研究约束语言Γ的代数性质。我们揭示了一个强大的代数框架,其中对允许的约束的温和限制提供了简洁的代数表征。在关系方面,我们将自己限制为封闭于变量否定和部分赋值的布尔语言,称为符号对称语言。在代数方面,这导致通过由恒等式系统产生的部分运算进行描述,与产生可处理的csp的运算密切相关,例如近一致运算和边运算。利用这种联系,我们构造了几种有趣的符号对称语言的改进算法,并证明了SETH下的显式下界。因此,我们找到了np -完全SAT问题的第一个例子,该问题具有非平凡算法,并且在SETH下承认非平凡下界。这提出了一个与CSP二分定理密切相关的二分猜想:np完全SAT问题当且仅当它承认上述形式的非平凡部分不变量时,允许改进算法。
{"title":"The (Coarse) Fine-Grained Structure of NP-Hard SAT and CSP Problems","authors":"Victor Lagerkvist, Magnus Wahlström","doi":"10.1145/3492336","DOIUrl":"https://doi.org/10.1145/3492336","url":null,"abstract":"We study the fine-grained complexity of NP-complete satisfiability (SAT) problems and constraint satisfaction problems (CSPs) in the context of the strong exponential-time hypothesis(SETH), showing non-trivial lower and upper bounds on the running time. Here, by a non-trivial lower bound for a problem SAT (Γ) (respectively CSP (Γ)) with constraint language Γ, we mean a value c0 > 1 such that the problem cannot be solved in time O(cn) for any c <c0 unless SETH is false, while a non-trivial upper bound is simply an algorithm for the problem running in time O(cn) for some c< 2. Such lower bounds have proven extremely elusive, and except for cases where c0=2 effectively no such previous bound was known. We achieve this by employing an algebraic framework, studying constraint languages Γ in terms of their algebraic properties. We uncover a powerful algebraic framework where a mild restriction on the allowed constraints offers a concise algebraic characterization. On the relational side we restrict ourselves to Boolean languages closed under variable negation and partial assignment, called sign-symmetric languages. On the algebraic side this results in a description via partial operations arising from system of identities, with a close connection to operations resulting in tractable CSPs, such as near unanimity operations and edge operations. Using this connection we construct improved algorithms for several interesting classes of sign-symmetric languages, and prove explicit lower bounds under SETH. Thus, we find the first example of an NP-complete SAT problem with a non-trivial algorithm which also admits a non-trivial lower bound under SETH. This suggests a dichotomy conjecture with a close connection to the CSP dichotomy theorem: an NP-complete SAT problem admits an improved algorithm if and only if it admits a non-trivial partial invariant of the above form.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"18 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124605620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiplicative Parameterization Above a Guarantee 保证之上的乘法参数化
Pub Date : 2021-09-01 DOI: 10.1145/3460956
F. Fomin, P. Golovach, D. Lokshtanov, Fahad Panolan, Saket Saurabh, M. Zehavi
Parameterization above a guarantee is a successful paradigm in Parameterized Complexity. To the best of our knowledge, all fixed-parameter tractable problems in this paradigm share an additive form defined as follows. Given an instance (I,k) of some (parameterized) problem π with a guarantee g(I), decide whether I admits a solution of size at least (or at most) k + g(I). Here, g(I) is usually a lower bound on the minimum size of a solution. Since its introduction in 1999 for MAX SAT and MAX CUT (with g(I) being half the number of clauses and half the number of edges, respectively, in the input), analysis of parameterization above a guarantee has become a very active and fruitful topic of research. We highlight a multiplicative form of parameterization above (or, rather, times) a guarantee: Given an instance (I,k) of some (parameterized) problem π with a guarantee g(I), decide whether I admits a solution of size at least (or at most) k · g(I). In particular, we study the Long Cycle problem with a multiplicative parameterization above the girth g(I) of the input graph, which is the most natural guarantee for this problem, and provide a fixed-parameter algorithm. Apart from being of independent interest, this exemplifies how parameterization above a multiplicative guarantee can arise naturally. We also show that, for any fixed constant ε > 0, multiplicative parameterization above g(I)1+ε of Long Cycle yields para-NP-hardness, thus our parameterization is tight in this sense. We complement our main result with the design (or refutation of the existence) of fixed-parameter algorithms as well as kernelization algorithms for additional problems parameterized multiplicatively above girth.
保证之上的参数化是参数化复杂性的一个成功范例。据我们所知,该范式中所有固定参数可处理问题都具有如下定义的加性形式。给定一个(参数化的)问题π的实例(I,k),它有一个保证g(I),判定I是否存在一个至少(或最多)k + g(I)的解。这里,g(I)通常是解的最小尺寸的下界。自1999年引入MAX SAT和MAX CUT(输入中g(I)分别为子句数的一半和边数的一半)以来,对保证以上参数化的分析已经成为一个非常活跃和富有成果的研究课题。我们在保证上(或者更确切地说,是在保证上)强调了参数化的乘法形式:给定具有保证g(I)的某些(参数化的)问题π的实例(I,k),决定I是否允许大小至少(或最多)k·g(I)的解。特别地,我们研究了输入图周长g(I)以上的乘法参数化问题,这是该问题最自然的保证,并提供了一种固定参数算法。除了具有独立的兴趣之外,这还举例说明了乘法保证之上的参数化是如何自然产生的。我们还证明,对于ε > 0的任何固定常数,长周期的g(I)1+ε以上的乘法参数化产生了准np硬度,因此我们的参数化在这个意义上是紧密的。我们用固定参数算法的设计(或对存在性的反驳)来补充我们的主要结果,以及用于在环以上乘化参数化的附加问题的核化算法。
{"title":"Multiplicative Parameterization Above a Guarantee","authors":"F. Fomin, P. Golovach, D. Lokshtanov, Fahad Panolan, Saket Saurabh, M. Zehavi","doi":"10.1145/3460956","DOIUrl":"https://doi.org/10.1145/3460956","url":null,"abstract":"Parameterization above a guarantee is a successful paradigm in Parameterized Complexity. To the best of our knowledge, all fixed-parameter tractable problems in this paradigm share an additive form defined as follows. Given an instance (I,k) of some (parameterized) problem π with a guarantee g(I), decide whether I admits a solution of size at least (or at most) k + g(I). Here, g(I) is usually a lower bound on the minimum size of a solution. Since its introduction in 1999 for MAX SAT and MAX CUT (with g(I) being half the number of clauses and half the number of edges, respectively, in the input), analysis of parameterization above a guarantee has become a very active and fruitful topic of research. We highlight a multiplicative form of parameterization above (or, rather, times) a guarantee: Given an instance (I,k) of some (parameterized) problem π with a guarantee g(I), decide whether I admits a solution of size at least (or at most) k · g(I). In particular, we study the Long Cycle problem with a multiplicative parameterization above the girth g(I) of the input graph, which is the most natural guarantee for this problem, and provide a fixed-parameter algorithm. Apart from being of independent interest, this exemplifies how parameterization above a multiplicative guarantee can arise naturally. We also show that, for any fixed constant ε > 0, multiplicative parameterization above g(I)1+ε of Long Cycle yields para-NP-hardness, thus our parameterization is tight in this sense. We complement our main result with the design (or refutation of the existence) of fixed-parameter algorithms as well as kernelization algorithms for additional problems parameterized multiplicatively above girth.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Algorithms and Lower Bounds for De Morgan Formulas of Low-Communication Leaf Gates 低通信叶门De Morgan公式的算法及下界
Pub Date : 2021-08-31 DOI: 10.1145/3470861
Valentine Kabanets, Sajin Koroth, Zhenjian Lu, Dimitrios Myrisiotis, I. Oliveira
The class FORMULA[s]∘G consists of Boolean functions computable by size-s De Morgan formulas whose leaves are any Boolean functions from a class G. We give lower bounds and (SAT, Learning, and pseudorandom generators (PRGs)) algorithms for FORMULA[n1.99]∘G, for classes G of functions with low communication complexity. Let R(k)G be the maximum k-party number-on-forehead randomized communication complexity of a function in G. Among other results, we show the following: • The Generalized Inner Product function GIPkn cannot be computed in FORMULA[s]° G on more than 1/2+ε fraction of inputs for s=o(n2/k⋅4k⋅R(k)(G)⋅log⁡(n/ε)⋅log⁡(1/ε))2). This significantly extends the lower bounds against bipartite formulas obtained by [62]. As a corollary, we get an average-case lower bound for GIPkn against FORMULA[n1.99]∘PTFk−1, i.e., sub-quadratic-size De Morgan formulas with degree-k-1) PTF (polynomial threshold function) gates at the bottom. Previously, it was open whether a super-linear lower bound holds for AND of PTFs.• There is a PRG of seed length n/2+O(s⋅R(2)(G)⋅log⁡(s/ε)⋅log⁡(1/ε)) that ε-fools FORMULA[s]∘G. For the special case of FORMULA[s]∘LTF, i.e., size-s formulas with LTF (linear threshold function) gates at the bottom, we get the better seed length O(n1/2⋅s1/4⋅log⁡(n)⋅log⁡(n/ε)). In particular, this provides the first non-trivial PRG (with seed length o(n)) for intersections of n halfspaces in the regime where ε≤1/n, complementing a recent result of [45].• There exists a randomized 2n-t #SAT algorithm for FORMULA[s]∘G, where t=Ω(n√s⋅log2⁡(s)⋅R(2)(G))/1/2. In particular, this implies a nontrivial #SAT algorithm for FORMULA[n1.99]∘LTF.• The Minimum Circuit Size Problem is not in FORMULA[n1.99]∘XOR; thereby making progress on hardness magnification, in connection with results from [14, 46]. On the algorithmic side, we show that the concept class FORMULA[n1.99]∘XOR can be PAC-learned in time 2O(n/log n).
我们给出了FORMULA[n1.99]的下界和(SAT、学习和伪随机生成器(prg))算法,对于G类的低通信复杂度函数,我们给出了FORMULA[n1.99]∘G的函数。设R(k)G为G中函数的最大k方额上随机通信复杂度。在其他结果中,我们证明了以下结论:•对于s=o(n2/k⋅4k⋅R(k)(G)·log (n/ε)·log (1/ε))2),当输入大于1/2+ε分数时,广义内积函数GIPkn不能在公式[s]°G中计算。这极大地扩展了由[62]得到的二部公式的下界。作为推论,我们得到了GIPkn对FORMULA[n1.99]°PTFk−1的平均下界,即次二次大小的De Morgan公式,底部有次-k-1次PTF(多项式阈值函数)门。以前,对于ptf的AND是否存在超线性下界是开放的。•有一个种子长度为n/2+O(s⋅R(2)(G)⋅log (s/ε)⋅log (1/ε))的PRG, ε-欺骗公式[s]°G。对于FORMULA[s]°LTF的特殊情况,即size-s的公式底部有LTF(线性阈值函数)门,我们得到更好的种子长度O(n1/2⋅s1/4⋅log (n)⋅log (n/ε))。特别地,这提供了在ε≤1/n的区域中n个半空间的交集的第一个非平凡PRG(种子长度为o(n)),补充了最近的结果[45]。•对于FORMULA[s]∘G,存在随机化的2n-t #SAT算法,其中t=Ω(n√s⋅log2 (s)⋅R(2)(G))/1/2。特别地,这意味着对于FORMULA[n1.99]°LTF需要一个非平凡的#SAT算法。最小电路尺寸问题不在公式[n1.99]中;从而在硬度放大方面取得进展,这与[14,46]的结果有关。在算法方面,我们证明了概念类FORMULA[n1.99]°XOR可以在20 (n/log n)时间内被pac学习。
{"title":"Algorithms and Lower Bounds for De Morgan Formulas of Low-Communication Leaf Gates","authors":"Valentine Kabanets, Sajin Koroth, Zhenjian Lu, Dimitrios Myrisiotis, I. Oliveira","doi":"10.1145/3470861","DOIUrl":"https://doi.org/10.1145/3470861","url":null,"abstract":"The class FORMULA[s]∘G consists of Boolean functions computable by size-s De Morgan formulas whose leaves are any Boolean functions from a class G. We give lower bounds and (SAT, Learning, and pseudorandom generators (PRGs)) algorithms for FORMULA[n1.99]∘G, for classes G of functions with low communication complexity. Let R(k)G be the maximum k-party number-on-forehead randomized communication complexity of a function in G. Among other results, we show the following: • The Generalized Inner Product function GIPkn cannot be computed in FORMULA[s]° G on more than 1/2+ε fraction of inputs for s=o(n2/k⋅4k⋅R(k)(G)⋅log⁡(n/ε)⋅log⁡(1/ε))2). This significantly extends the lower bounds against bipartite formulas obtained by [62]. As a corollary, we get an average-case lower bound for GIPkn against FORMULA[n1.99]∘PTFk−1, i.e., sub-quadratic-size De Morgan formulas with degree-k-1) PTF (polynomial threshold function) gates at the bottom. Previously, it was open whether a super-linear lower bound holds for AND of PTFs.• There is a PRG of seed length n/2+O(s⋅R(2)(G)⋅log⁡(s/ε)⋅log⁡(1/ε)) that ε-fools FORMULA[s]∘G. For the special case of FORMULA[s]∘LTF, i.e., size-s formulas with LTF (linear threshold function) gates at the bottom, we get the better seed length O(n1/2⋅s1/4⋅log⁡(n)⋅log⁡(n/ε)). In particular, this provides the first non-trivial PRG (with seed length o(n)) for intersections of n halfspaces in the regime where ε≤1/n, complementing a recent result of [45].• There exists a randomized 2n-t #SAT algorithm for FORMULA[s]∘G, where t=Ω(n√s⋅log2⁡(s)⋅R(2)(G))/1/2. In particular, this implies a nontrivial #SAT algorithm for FORMULA[n1.99]∘LTF.• The Minimum Circuit Size Problem is not in FORMULA[n1.99]∘XOR; thereby making progress on hardness magnification, in connection with results from [14, 46]. On the algorithmic side, we show that the concept class FORMULA[n1.99]∘XOR can be PAC-learned in time 2O(n/log n).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125858582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On a Theorem of Lovász that (&sdot, H) Determines the Isomorphism Type of H 关于Lovász中(&sdot, H)确定H同构类型的定理
Pub Date : 2021-06-04 DOI: 10.1145/3448641
Jin-Yi Cai, A. Govorov
Graph homomorphism has been an important research topic since its introduction [20]. Stated in the language of binary relational structures in that paper [20], Lovász proved a fundamental theorem that, for a graph H given by its 0-1 valued adjacency matrix, the graph homomorphism function G ↦ hom(G, H) determines the isomorphism type of H. In the past 50 years, various extensions have been proved by many researchers [1, 15, 21, 24, 26]. These extend the basic 0-1 case to admit vertex and edge weights; but these extensions all have some restrictions such as all vertex weights must be positive. In this article, we prove a general form of this theorem where H can have arbitrary vertex and edge weights. A noteworthy aspect is that we prove this by a surprisingly simple and unified argument. This bypasses various technical obstacles and unifies and extends all previous known versions of this theorem on graphs. The constructive proof of our theorem can be used to make various complexity dichotomy theorems for graph homomorphism effective in the following sense: it provides an algorithm that for any H either outputs a P-time algorithm solving hom(&sdot, H) or a P-time reduction from a canonical #P-hard problem to hom(&sdot, H).
图同态自提出以来一直是一个重要的研究课题。在论文[20]中,Lovász用二元关系结构的语言证明了一个基本定理,即对于由0-1值邻接矩阵给出的图H,图同态函数G∈homm (G, H)决定了H的同态类型。在过去的50年中,许多研究者已经证明了各种扩展[1,15,21,24,26]。这些扩展了基本的0-1情况,允许顶点和边的权重;但是这些扩展都有一些限制比如所有顶点的权值必须是正的。在这篇文章中,我们证明了这个定理的一般形式,其中H可以有任意的顶点和边权。一个值得注意的方面是,我们用一个惊人的简单和统一的论证来证明这一点。这绕过了各种技术障碍,统一并扩展了图上所有已知的定理版本。本定理的构造性证明可用于使图同态的各种复杂性二分定理在以下意义上有效:它提供了一种算法,对于任何H,它要么输出一个求解homm (&sdot, H)的p -时间算法,要么输出一个从标准# p -困难问题到homm (&sdot, H)的p -时间约简。
{"title":"On a Theorem of Lovász that (&sdot, H) Determines the Isomorphism Type of H","authors":"Jin-Yi Cai, A. Govorov","doi":"10.1145/3448641","DOIUrl":"https://doi.org/10.1145/3448641","url":null,"abstract":"Graph homomorphism has been an important research topic since its introduction [20]. Stated in the language of binary relational structures in that paper [20], Lovász proved a fundamental theorem that, for a graph H given by its 0-1 valued adjacency matrix, the graph homomorphism function G ↦ hom(G, H) determines the isomorphism type of H. In the past 50 years, various extensions have been proved by many researchers [1, 15, 21, 24, 26]. These extend the basic 0-1 case to admit vertex and edge weights; but these extensions all have some restrictions such as all vertex weights must be positive. In this article, we prove a general form of this theorem where H can have arbitrary vertex and edge weights. A noteworthy aspect is that we prove this by a surprisingly simple and unified argument. This bypasses various technical obstacles and unifies and extends all previous known versions of this theorem on graphs. The constructive proof of our theorem can be used to make various complexity dichotomy theorems for graph homomorphism effective in the following sense: it provides an algorithm that for any H either outputs a P-time algorithm solving hom(&sdot, H) or a P-time reduction from a canonical #P-hard problem to hom(&sdot, H).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"21 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121030075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
AC0 Unpredictability AC0不可预测性
Pub Date : 2021-03-17 DOI: 10.1145/3442362
Emanuele Viola
We prove that for every distribution D on n bits with Shannon entropy ≥ n − a, at most O(2da logd+1g)/γ5 of the bits Di can be predicted with advantage γ by an AC0 circuit of size g and depth D that is a function of all of the bits of D except Di. This answers a question by Meir and Wigderson, who proved a corresponding result for decision trees. We also show that there are distributions D with entropy ≥ n − O(1) such that any subset of O(n/ log n) bits of D on can be distinguished from uniform by a circuit of depth 2 and size poly(n). This separates the notions of predictability and distinguishability in this context.
我们证明了对于Shannon熵≥n - a的n位分布D,可以用一个大小为g、深度为D的AC0电路预测最多O(2da logd+1g)/γ - 5位Di,该电路是D中除Di以外的所有位的函数。这回答了Meir和Wigderson的一个问题,他们证明了决策树的相应结果。我们还证明了存在熵≥n−O(1)的分布D,使得D on的O(n/ log n)位的任何子集都可以通过深度为2和大小为poly(n)的电路与均匀区分开。在这种情况下,这将可预测性和可区分性的概念区分开来。
{"title":"AC0 Unpredictability","authors":"Emanuele Viola","doi":"10.1145/3442362","DOIUrl":"https://doi.org/10.1145/3442362","url":null,"abstract":"We prove that for every distribution D on n bits with Shannon entropy ≥ n − a, at most O(2da logd+1g)/γ5 of the bits Di can be predicted with advantage γ by an AC0 circuit of size g and depth D that is a function of all of the bits of D except Di. This answers a question by Meir and Wigderson, who proved a corresponding result for decision trees. We also show that there are distributions D with entropy ≥ n − O(1) such that any subset of O(n/ log n) bits of D on can be distinguished from uniform by a circuit of depth 2 and size poly(n). This separates the notions of predictability and distinguishability in this context.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fine-Grained Reductions from Approximate Counting to Decision 从近似计数到决策的细粒度约简
Pub Date : 2021-02-10 DOI: 10.1145/3442352
Holger Dell, John Lapinskas
In this article, we introduce a general framework for fine-grained reductions of approximate counting problems to their decision versions. (Thus, we use an oracle that decides whether any witness exists to multiplicatively approximate the number of witnesses with minimal overhead.) This mirrors a foundational result of Sipser (STOC 1983) and Stockmeyer (SICOMP 1985) in the polynomial-time setting, and a similar result of Müller (IWPEC 2006) in the FPT setting. Using our framework, we obtain such reductions for some of the most important problems in fine-grained complexity: the Orthogonal Vectors problem, 3SUM, and the Negative-Weight Triangle problem (which is closely related to All-Pairs Shortest Path). While all these problems have simple algorithms over which it is conjectured that no polynomial improvement is possible, our reductions would remain interesting even if these conjectures were proved; they have only polylogarithmic overhead and can therefore be applied to subpolynomial improvements such as the n3/ exp(Θ (√ log n))-time algorithm for the Negative-Weight Triangle problem due to Williams (STOC 2014). Our framework is also general enough to apply to versions of the problems for which more efficient algorithms are known. For example, the Orthogonal Vectors problem over GF(m)d for constant m can be solved in time n · poly (d) by a result of Williams and Yu (SODA 2014); our result implies that we can approximately count the number of orthogonal pairs with essentially the same running time. We also provide a fine-grained reduction from approximate #SAT to SAT. Suppose the Strong Exponential Time Hypothesis (SETH) is false, so that for some 1 < c < 2 and all k there is an O(cn)-time algorithm for k-SAT. Then we prove that for all k, there is an O(( c + o(1))n)-time algorithm for approximate #k-SAT. In particular, our result implies that the Exponential Time Hypothesis (ETH) is equivalent to the seemingly weaker statement that there is no algorithm to approximate #3-SAT to within a factor of 1+ɛ in time 2o(n)/ ɛ2 (taking ɛ > 0 as part of the input).
在本文中,我们将介绍一个通用框架,用于将近似计数问题的细粒度约简为其决策版本。(因此,我们使用一个oracle来决定是否存在任何证人,以最小的开销乘近似证人的数量。)这反映了Sipser (STOC 1983)和Stockmeyer (SICOMP 1985)在多项式时间设置中的基本结果,以及m ller (IWPEC 2006)在FPT设置中的类似结果。使用我们的框架,我们获得了细粒度复杂性中一些最重要问题的这种约简:正交向量问题、3SUM和负权三角形问题(与全对最短路径密切相关)。虽然所有这些问题都有简单的算法,但据推测,没有多项式改进是可能的,即使这些猜想被证明,我们的缩减仍然很有趣;它们只有多对数开销,因此可以应用于次多项式改进,例如Williams (STOC 2014)针对负权三角形问题的n3/ exp(Θ(√log n))时间算法。我们的框架也足够通用,可以应用于已知更有效算法的问题版本。例如,根据Williams和Yu (SODA 2014)的结果,常数m的GF(m)d上的正交向量问题可以在n·poly (d)时间内解决;我们的结果表明,我们可以近似地计算运行时间基本相同的正交对的数量。我们还提供了从近似#SAT到SAT的细粒度缩减。假设强指数时间假设(SETH)为假,因此对于某些1 < c < 2和所有k,存在k-SAT的O(cn)时间算法。然后,我们证明了对于所有k,存在一个O((c + O(1))n)时间的近似算法#k- sat。特别是,我们的结果表明,指数时间假设(ETH)相当于一个看似较弱的陈述,即没有算法可以将#3-SAT近似为在时间20 (n)/ 2(将[> 0]作为输入的一部分)内的1+ æ因子。
{"title":"Fine-Grained Reductions from Approximate Counting to Decision","authors":"Holger Dell, John Lapinskas","doi":"10.1145/3442352","DOIUrl":"https://doi.org/10.1145/3442352","url":null,"abstract":"In this article, we introduce a general framework for fine-grained reductions of approximate counting problems to their decision versions. (Thus, we use an oracle that decides whether any witness exists to multiplicatively approximate the number of witnesses with minimal overhead.) This mirrors a foundational result of Sipser (STOC 1983) and Stockmeyer (SICOMP 1985) in the polynomial-time setting, and a similar result of Müller (IWPEC 2006) in the FPT setting. Using our framework, we obtain such reductions for some of the most important problems in fine-grained complexity: the Orthogonal Vectors problem, 3SUM, and the Negative-Weight Triangle problem (which is closely related to All-Pairs Shortest Path). While all these problems have simple algorithms over which it is conjectured that no polynomial improvement is possible, our reductions would remain interesting even if these conjectures were proved; they have only polylogarithmic overhead and can therefore be applied to subpolynomial improvements such as the n3/ exp(Θ (√ log n))-time algorithm for the Negative-Weight Triangle problem due to Williams (STOC 2014). Our framework is also general enough to apply to versions of the problems for which more efficient algorithms are known. For example, the Orthogonal Vectors problem over GF(m)d for constant m can be solved in time n · poly (d) by a result of Williams and Yu (SODA 2014); our result implies that we can approximately count the number of orthogonal pairs with essentially the same running time. We also provide a fine-grained reduction from approximate #SAT to SAT. Suppose the Strong Exponential Time Hypothesis (SETH) is false, so that for some 1 < c < 2 and all k there is an O(cn)-time algorithm for k-SAT. Then we prove that for all k, there is an O(( c + o(1))n)-time algorithm for approximate #k-SAT. In particular, our result implies that the Exponential Time Hypothesis (ETH) is equivalent to the seemingly weaker statement that there is no algorithm to approximate #3-SAT to within a factor of 1+ɛ in time 2o(n)/ ɛ2 (taking ɛ > 0 as part of the input).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121814142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Abstract Geometrical Computation 10 几何计算10
Pub Date : 2021-02-10 DOI: 10.1145/3442359
Florent Becker, T. Besson, J. Durand-Lose, Aurélien Emmanuel, Mohammad-Hadi Foroughmand-Araabi, S. Goliaei, Shahrzad Heydarshahi
Signal machines form an abstract and idealized model of collision computing. Based on dimensionless signals moving on the real line, they model particle/signal dynamics in Cellular Automata. Each particle, or signal, moves at constant speed in continuous time and space. When signals meet, they get replaced by other signals. A signal machine defines the types of available signals, their speeds, and the rules for replacement in collision. A signal machine A simulates another one B if all the space-time diagrams of B can be generated from space-time diagrams of A by removing some signals and renaming other signals according to local information. Given any finite set of speeds S we construct a signal machine that is able to simulate any signal machine whose speeds belong to S. Each signal is simulated by a macro-signal, a ray of parallel signals. Each macro-signal has a main signal located exactly where the simulated signal would be, as well as auxiliary signals that encode its id and the collision rules of the simulated machine. The simulation of a collision, a macro-collision, consists of two phases. In the first phase, macro-signals are shrunk, and then the macro-signals involved in the collision are identified and it is ensured that no other macro-signal comes too close. If some do, the process is aborted and the macro-signals are shrunk, so that the correct macro-collision will eventually be restarted and successfully initiated. Otherwise, the second phase starts: the appropriate collision rule is found and new macro-signals are generated accordingly. Considering all finite sets of speeds S and their corresponding simulators provides an intrinsically universal family of signal machines.
信号机构成了一个抽象的、理想化的碰撞计算模型。基于在实线上运动的无量纲信号,对元胞自动机中的粒子/信号动力学进行建模。每个粒子或信号在连续的时间和空间中以恒定的速度运动。当信号相遇时,它们会被其他信号所取代。信号机定义可用信号的类型、速度和碰撞时的替换规则。如果从A的空时图中去掉部分信号,根据局部信息重命名其他信号,可以生成B的所有空时图,则信号机A模拟另一台信号机B。给定任何有限的速度S集合,我们构造一个信号机,它能够模拟任何速度属于S的信号机。每个信号都由一个宏信号(一串并行信号)来模拟。每个宏信号都有一个位于模拟信号所在位置的主信号,以及编码其id和模拟机器碰撞规则的辅助信号。碰撞(宏观碰撞)的模拟包括两个阶段。在第一阶段,对宏观信号进行收缩,然后识别出涉及碰撞的宏观信号,并确保没有其他宏观信号过于接近。如果发生冲突,则中止进程并缩小宏信号,以便最终重新启动并成功启动正确的宏碰撞。否则,开始第二阶段:找到合适的碰撞规则,并相应地生成新的宏信号。考虑到速度的所有有限集,S及其相应的模拟器提供了一个本质上通用的信号机族。
{"title":"Abstract Geometrical Computation 10","authors":"Florent Becker, T. Besson, J. Durand-Lose, Aurélien Emmanuel, Mohammad-Hadi Foroughmand-Araabi, S. Goliaei, Shahrzad Heydarshahi","doi":"10.1145/3442359","DOIUrl":"https://doi.org/10.1145/3442359","url":null,"abstract":"Signal machines form an abstract and idealized model of collision computing. Based on dimensionless signals moving on the real line, they model particle/signal dynamics in Cellular Automata. Each particle, or signal, moves at constant speed in continuous time and space. When signals meet, they get replaced by other signals. A signal machine defines the types of available signals, their speeds, and the rules for replacement in collision. A signal machine A simulates another one B if all the space-time diagrams of B can be generated from space-time diagrams of A by removing some signals and renaming other signals according to local information. Given any finite set of speeds S we construct a signal machine that is able to simulate any signal machine whose speeds belong to S. Each signal is simulated by a macro-signal, a ray of parallel signals. Each macro-signal has a main signal located exactly where the simulated signal would be, as well as auxiliary signals that encode its id and the collision rules of the simulated machine. The simulation of a collision, a macro-collision, consists of two phases. In the first phase, macro-signals are shrunk, and then the macro-signals involved in the collision are identified and it is ensured that no other macro-signal comes too close. If some do, the process is aborted and the macro-signals are shrunk, so that the correct macro-collision will eventually be restarted and successfully initiated. Otherwise, the second phase starts: the appropriate collision rule is found and new macro-signals are generated accordingly. Considering all finite sets of speeds S and their corresponding simulators provides an intrinsically universal family of signal machines.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114274775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Computation Theory (TOCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1