首页 > 最新文献

ACM Transactions on Computation Theory (TOCT)最新文献

英文 中文
Quadratic Maps Are Hard to Sample 二次映射很难采样
Pub Date : 2016-06-14 DOI: 10.1145/2934308
Emanuele Viola
This note proves the existence of a quadratic GF(2) map p: {0, 1}n → {0, 1} such that no constant-depth circuit of size poly(n) can sample the distribution (u, p(u)) for uniform u.
证明了二次型GF(2)映射p: {0,1}n→{0,1}的存在性,使得大小为poly(n)的等深度电路不能对均匀u的分布(u, p(u))进行采样。
{"title":"Quadratic Maps Are Hard to Sample","authors":"Emanuele Viola","doi":"10.1145/2934308","DOIUrl":"https://doi.org/10.1145/2934308","url":null,"abstract":"This note proves the existence of a quadratic GF(2) map p: {0, 1}n → {0, 1} such that no constant-depth circuit of size poly(n) can sample the distribution (u, p(u)) for uniform u.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127388295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimal Sparsification for Some Binary CSPs Using Low-Degree Polynomials 利用低次多项式的一些二元csp的最优稀疏化
Pub Date : 2016-06-10 DOI: 10.1145/3349618
B. Jansen, A. Pieterse
This article analyzes to what extent it is possible to efficiently reduce the number of clauses in NP-hard satisfiability problems without changing the answer. Upper and lower bounds are established using the concept of kernelization. Existing results show that if NP ⊈ coNP/poly, no efficient preprocessing algorithm can reduce n-variable instances of cnf-sat with d literals per clause to equivalent instances with O(nd−ε ) bits for any ε > 0. For the Not-All-Equal sat problem, a compression to size Õ(nd−1) exists. We put these results in a common framework by analyzing the compressibility of CSPs with a binary domain. We characterize constraint types based on the minimum degree of multivariate polynomials whose roots correspond to the satisfying assignments, obtaining (nearly) matching upper and lower bounds in several settings. Our lower bounds show that not just the number of constraints, but also the encoding size of individual constraints plays an important role. For example, for Exact Satisfiability with unbounded clause length it is possible to efficiently reduce the number of constraints to n+1, yet no polynomial-time algorithm can reduce to an equivalent instance with O(n2−ε ) bits for any ε > 0, unless NP ⊆ coNP/poly.
本文分析了在不改变NP-hard可满足性问题的答案的情况下,在多大程度上可以有效地减少子句的数量。利用核化的概念建立了上界和下界。已有的结果表明,如果NP - coNP/poly,没有有效的预处理算法可以将n个变量的cnf-sat的每子句d个字的实例减少到ε > 0的O(and - ε)位的等效实例。对于不完全相等的sat问题,存在一个大小为Õ(nd−1)的压缩。通过分析具有二值域的csp的可压缩性,我们将这些结果放在一个共同的框架中。我们基于根对应于满足赋值的多元多项式的最小度来表征约束类型,得到了几种情况下(几乎)匹配的上界和下界。我们的下界表明,不仅约束的数量,而且单个约束的编码大小也起着重要作用。例如,对于具有无界子句长度的精确可满足性,可以有效地将约束的数量减少到n+1,但对于任何ε > 0,多项式时间算法都不能减少到具有O(n2−ε)位的等效实例,除非NP≠coNP/poly。
{"title":"Optimal Sparsification for Some Binary CSPs Using Low-Degree Polynomials","authors":"B. Jansen, A. Pieterse","doi":"10.1145/3349618","DOIUrl":"https://doi.org/10.1145/3349618","url":null,"abstract":"This article analyzes to what extent it is possible to efficiently reduce the number of clauses in NP-hard satisfiability problems without changing the answer. Upper and lower bounds are established using the concept of kernelization. Existing results show that if NP ⊈ coNP/poly, no efficient preprocessing algorithm can reduce n-variable instances of cnf-sat with d literals per clause to equivalent instances with O(nd−ε ) bits for any ε > 0. For the Not-All-Equal sat problem, a compression to size Õ(nd−1) exists. We put these results in a common framework by analyzing the compressibility of CSPs with a binary domain. We characterize constraint types based on the minimum degree of multivariate polynomials whose roots correspond to the satisfying assignments, obtaining (nearly) matching upper and lower bounds in several settings. Our lower bounds show that not just the number of constraints, but also the encoding size of individual constraints plays an important role. For example, for Exact Satisfiability with unbounded clause length it is possible to efficiently reduce the number of constraints to n+1, yet no polynomial-time algorithm can reduce to an equivalent instance with O(n2−ε ) bits for any ε > 0, unless NP ⊆ coNP/poly.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126829328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Hardness of Approximation for H-free Edge Modification Problems 无h边修正问题的逼近硬度
Pub Date : 2016-06-08 DOI: 10.1145/3196834
I. Bliznets, Marek Cygan, Pawel Komosa, Michal Pilipczuk
The H-free Edge Deletion problem asks, for a given graph G and integer k, whether it is possible to delete at most k edges from G to make it H-free—that is, not containing H as an induced subgraph. The H-free Edge Completion problem is defined similarly, but we add edges instead of deleting them. The study of these two problem families has recently been the subject of intensive studies from the point of view of parameterized complexity and kernelization. In particular, it was shown that the problems do not admit polynomial kernels (under plausible complexity assumptions) for almost all graphs H, with several important exceptions occurring when the class of H-free graphs exhibits some structural properties. In this work, we complement the parameterized study of edge modification problems to H-free graphs by considering their approximability. We prove that whenever H is 3-connected and has at least two nonedges, then both H-free Edge Deletion and H-free Edge Completion are very hard to approximate: they do not admit poly(OPT)-approximation in polynomial time, unless P=NP, or even in time subexponential in OPT, unless the exponential time hypothesis fails. The assumption of the existence of two nonedges appears to be important: we show that whenever H is a complete graph without one edge, then H-free Edge Deletion is tightly connected to the Min Horn Deletion problem, whose approximability is still open. Finally, in an attempt to extend our hardness results beyond 3-connected graphs, we consider the cases of H being a path or a cycle, and we achieve an almost complete dichotomy there.
无H边删除问题的问题是,对于给定的图G和整数k,是否有可能从G中删除最多k条边使其无H-即不包含H作为诱导子图。无h边补全问题的定义类似,但我们添加边而不是删除边。从参数化复杂性和核化的角度对这两个问题族进行了深入的研究。特别地,它显示了几乎所有图H的问题不承认多项式核(在似是而非的复杂性假设下),当一类无H图表现出一些结构性质时,出现了几个重要的例外。在这项工作中,我们通过考虑H-free图的近似性来补充边修正问题的参数化研究。我们证明了当H是3连通且至少有两条非边时,H-free边缺失和H-free边补全都很难近似:除非P=NP,否则它们在多项式时间内不允许多(OPT)逼近,甚至在时间上不允许多(OPT)逼近,除非指数时间假设不成立。两个非边存在的假设显得很重要:我们证明了当H是一个没有一条边的完全图时,无H边删除与最小角删除问题紧密相连,其逼近性仍然是开的。最后,为了将我们的硬度结果扩展到3连通图之外,我们考虑了H是路径或循环的情况,并且我们在那里实现了几乎完全的二分类。
{"title":"Hardness of Approximation for H-free Edge Modification Problems","authors":"I. Bliznets, Marek Cygan, Pawel Komosa, Michal Pilipczuk","doi":"10.1145/3196834","DOIUrl":"https://doi.org/10.1145/3196834","url":null,"abstract":"The H-free Edge Deletion problem asks, for a given graph G and integer k, whether it is possible to delete at most k edges from G to make it H-free—that is, not containing H as an induced subgraph. The H-free Edge Completion problem is defined similarly, but we add edges instead of deleting them. The study of these two problem families has recently been the subject of intensive studies from the point of view of parameterized complexity and kernelization. In particular, it was shown that the problems do not admit polynomial kernels (under plausible complexity assumptions) for almost all graphs H, with several important exceptions occurring when the class of H-free graphs exhibits some structural properties. In this work, we complement the parameterized study of edge modification problems to H-free graphs by considering their approximability. We prove that whenever H is 3-connected and has at least two nonedges, then both H-free Edge Deletion and H-free Edge Completion are very hard to approximate: they do not admit poly(OPT)-approximation in polynomial time, unless P=NP, or even in time subexponential in OPT, unless the exponential time hypothesis fails. The assumption of the existence of two nonedges appears to be important: we show that whenever H is a complete graph without one edge, then H-free Edge Deletion is tightly connected to the Min Horn Deletion problem, whose approximability is still open. Finally, in an attempt to extend our hardness results beyond 3-connected graphs, we consider the cases of H being a path or a cycle, and we achieve an almost complete dichotomy there.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114296091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Parameterized Complexity of Fixing Number and Vertex Individualization in Graphs 图中定数与顶点个性化的参数化复杂度
Pub Date : 2016-06-01 DOI: 10.1145/3558077
V. Arvind, Frank Fuhlbrück, J. Köbler, Sebastian Kuhnert, Gaurav Rattan
In this paper we study the algorithmic complexity of the following problems: (1) Given a vertex-colored graph X = (V,E,c), compute a minimum cardinality set of vertices S⊆ V such that no nontrivial automorphism of X fixes all vertices in S. A closely related problem is computing a minimum base S for a permutation group G ≤ Sym(n) given by generators, i.e., a minimum cardinality subset S ⊆ [n] such that no nontrivial permutation in G fixes all elements of S. Our focus is mainly on the parameterized complexity of these problems. We show that when k=|S| is treated as parameter, then both problems are MINI[1]-hard. For the dual problems, where k = n – |S| is the parameter, we give FPT algorithms.(2) A notion related to fixing is individualization, which is a useful technique combined with the Weisfeiler-Leman procedure in algorithms for Graph Isomorphism. We explore the complexity of individualization: the problem of computing the minimum number of vertices we need to individualize in a given graph such that color refinement results in a graph with useful structural properties in the context of Graph Isomorphism and the Weisfeiler-Leman procedure.
本文研究了以下问题的算法复杂度:(1)鉴于vertex-colored图X = (V, E、c),计算出最低的基数的顶点集S⊆V这样没有重要的自同构(X)修复所有顶点在美国一个密切相关的问题是计算最小基年代置换群G≤信谊(n)由发电机,即最低基数子集S⊆[n]这样,没有重要的排列在G修复所有元素的美国主要是我们关注的是参数化的这些问题的复杂性。我们证明了当k=|S|作为参数时,两个问题都是MINI[1]难的。(2)与固定相关的一个概念是个体化,它是图同构算法中与Weisfeiler-Leman过程相结合的一种有用的技术。我们探索个性化的复杂性:在给定的图中,计算我们需要个性化的最小顶点数的问题,以便在图同构和Weisfeiler-Leman过程的背景下,颜色细化产生具有有用结构属性的图。
{"title":"The Parameterized Complexity of Fixing Number and Vertex Individualization in Graphs","authors":"V. Arvind, Frank Fuhlbrück, J. Köbler, Sebastian Kuhnert, Gaurav Rattan","doi":"10.1145/3558077","DOIUrl":"https://doi.org/10.1145/3558077","url":null,"abstract":"In this paper we study the algorithmic complexity of the following problems: (1) Given a vertex-colored graph X = (V,E,c), compute a minimum cardinality set of vertices S⊆ V such that no nontrivial automorphism of X fixes all vertices in S. A closely related problem is computing a minimum base S for a permutation group G ≤ Sym(n) given by generators, i.e., a minimum cardinality subset S ⊆ [n] such that no nontrivial permutation in G fixes all elements of S. Our focus is mainly on the parameterized complexity of these problems. We show that when k=|S| is treated as parameter, then both problems are MINI[1]-hard. For the dual problems, where k = n – |S| is the parameter, we give FPT algorithms.(2) A notion related to fixing is individualization, which is a useful technique combined with the Weisfeiler-Leman procedure in algorithms for Graph Isomorphism. We explore the complexity of individualization: the problem of computing the minimum number of vertices we need to individualize in a given graph such that color refinement results in a graph with useful structural properties in the context of Graph Isomorphism and the Weisfeiler-Leman procedure.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Characterization and Lower Bounds for Branching Program Size using Projective Dimension 用射影维数表征分支程序大小及下界
Pub Date : 2016-04-25 DOI: 10.1145/3305274
K. Dinesh, Sajin Koroth, Jayalal Sarma
We study projective dimension, a graph parameter, denoted by pd(G) for a bipartite graph G, introduced by Pudlák and Rödl (1992). For a Boolean function f (on n bits), Pudlák and Rödl associated a bipartite graph Gf and showed that size of the optimal branching program computing f, denoted by bpsize(f), is at least pd(Gf) (also denoted by pd(f)). Hence, proving lower bounds for pd(f) implies lower bounds for bpsize(f). Despite several attempts (Pudlák and Rödl (1992), Rónyai et al. (2000)), proving super-linear lower bounds for projective dimension of explicit families of graphs has remained elusive. We observe that there exist a Boolean function f for which the gap between the pd(f) and bpsize(f)) is 2Ω(n). Motivated by the argument in Pudlák and Rödl (1992), we define two variants of projective dimension: projective dimension with intersection dimension 1, denoted by upd(f), and bitwise decomposable projective dimension, denoted by bitpdim(f). We show the following results: (a) We observe that there exist a Boolean function f for which the gap between upd(f) and bpsize(f) is 2Ω(n). In contrast, we also show that the bitwise decomposable projective dimension characterizes size of the branching program up to a polynomial factor. That is, there exists a constant c > 0 and for any function f, bitpdim(f)/6 ≤ bpsize(f) ≤ (bitpdim(f))c. (b) We introduce a new candidate family of functions f for showing super-polynomial lower bounds for bitpdim(f). As our main result, for this family of functions, we demonstrate gaps between pd(f) and the above two new measures for f: pd(f) = O(√n)   upd(f) = Ω (n)   bitpdim(f) = Ω (n1.5 / log n). We adapt Nechiporuk’s techniques for our linear algebraic setting to prove the best-known bpsize lower bounds for bitpdim. Motivated by this linear algebraic setting of our main result, we derive exponential lower bounds for two restricted variants of pd(f) and upd(f) by observing that they are exactly equal to well-studied graph parameters—bipartite clique cover number and bipartite partition number, respectively.
我们研究了由Pudlák和Rödl(1992)引入的二部图G的投影维数,一个用pd(G)表示的图参数。对于布尔函数f (n位),Pudlák和Rödl关联了一个二部图Gf,并证明了计算f的最优分支程序的大小,用bpsize(f)表示,至少是pd(Gf)(也用pd(f)表示)。因此,证明pd(f)的下界意味着bpsize(f)的下界。尽管有几次尝试(Pudlák和Rödl (1992), Rónyai等人(2000)),证明显式图族的射影维的超线性下界仍然难以捉摸。我们观察到存在一个布尔函数f,其pd(f)和bpsize(f)之间的间隙为2Ω(n)。根据Pudlák和Rödl(1992)中的论证,我们定义了两个投影维数的变体:具有交维数1的投影维数,用upd(f)表示,和按位可分解的投影维数,用bitpdim(f)表示。(a)我们观察到存在一个布尔函数f, upd(f)和bpsize(f)之间的差为2Ω(n)。相反,我们也证明了按位可分解的投影维数将分支规划的大小表征为多项式因子。即存在一个常数c > 0,且对于任意函数f, bitpdim(f)/6≤bpsize(f)≤(bitpdim(f))c。(b)我们引入了一个新的候选函数族f来表示bitpdim(f)的超多项式下界。作为我们的主要结果,对于这个函数族,我们证明了pd(f)和上述两个f的新度量之间的差距:pd(f) = O(√n) upd(f) = Ω (n) bitpdim(f) = Ω (n1.5 / log n)。我们将Nechiporuk的技术应用于我们的线性代数设置,以证明bitpdim最著名的bpsize下界。在我们的主要结果的这个线性代数集合的激励下,我们通过观察pd(f)和upd(f)的两个受限变量分别完全等于研究得很好的图参数——二部团覆盖数和二部分区数,推导出它们的指数下界。
{"title":"Characterization and Lower Bounds for Branching Program Size using Projective Dimension","authors":"K. Dinesh, Sajin Koroth, Jayalal Sarma","doi":"10.1145/3305274","DOIUrl":"https://doi.org/10.1145/3305274","url":null,"abstract":"We study projective dimension, a graph parameter, denoted by pd(G) for a bipartite graph G, introduced by Pudlák and Rödl (1992). For a Boolean function f (on n bits), Pudlák and Rödl associated a bipartite graph Gf and showed that size of the optimal branching program computing f, denoted by bpsize(f), is at least pd(Gf) (also denoted by pd(f)). Hence, proving lower bounds for pd(f) implies lower bounds for bpsize(f). Despite several attempts (Pudlák and Rödl (1992), Rónyai et al. (2000)), proving super-linear lower bounds for projective dimension of explicit families of graphs has remained elusive. We observe that there exist a Boolean function f for which the gap between the pd(f) and bpsize(f)) is 2Ω(n). Motivated by the argument in Pudlák and Rödl (1992), we define two variants of projective dimension: projective dimension with intersection dimension 1, denoted by upd(f), and bitwise decomposable projective dimension, denoted by bitpdim(f). We show the following results: (a) We observe that there exist a Boolean function f for which the gap between upd(f) and bpsize(f) is 2Ω(n). In contrast, we also show that the bitwise decomposable projective dimension characterizes size of the branching program up to a polynomial factor. That is, there exists a constant c > 0 and for any function f, bitpdim(f)/6 ≤ bpsize(f) ≤ (bitpdim(f))c. (b) We introduce a new candidate family of functions f for showing super-polynomial lower bounds for bitpdim(f). As our main result, for this family of functions, we demonstrate gaps between pd(f) and the above two new measures for f: pd(f) = O(√n)   upd(f) = Ω (n)   bitpdim(f) = Ω (n1.5 / log n). We adapt Nechiporuk’s techniques for our linear algebraic setting to prove the best-known bpsize lower bounds for bitpdim. Motivated by this linear algebraic setting of our main result, we derive exponential lower bounds for two restricted variants of pd(f) and upd(f) by observing that they are exactly equal to well-studied graph parameters—bipartite clique cover number and bipartite partition number, respectively.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125807594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Complexity Trichotomy for Approximately Counting List H-Colorings 近似计数表h -着色的复杂度三分法
Pub Date : 2016-02-12 DOI: 10.1145/3037381
Andreas Galanis, L. A. Goldberg, M. Jerrum
We examine the computational complexity of approximately counting the list H-colorings of a graph. We discover a natural graph-theoretic trichotomy based on the structure of the graph H. If H is an irreflexive bipartite graph or a reflexive complete graph, then counting list H-colorings is trivially in polynomial time. Otherwise, if H is an irreflexive bipartite permutation graph or a reflexive proper interval graph, then approximately counting list H-colorings is equivalent to #BIS, the problem of approximately counting independent sets in a bipartite graph. This is a well-studied problem that is believed to be of intermediate complexity—it is believed that it does not have an FPRAS, but that it is not as difficult as approximating the most difficult counting problems in #P. For every other graph H, approximately counting list H-colorings is complete for #P with respect to approximation-preserving reductions (so there is no FPRAS unless NP = RP). Two pleasing features of the trichotomy are (1) it has a natural formulation in terms of hereditary graph classes, and (2) the proof is largely self-contained and does not require any universal algebra (unlike similar dichotomies in the weighted case). We are able to extend the hardness results to the bounded-degree setting, showing that all hardness results apply to input graphs with maximum degree at most 6.
我们研究了图的列表h -着色的近似计数的计算复杂度。基于图H的结构,我们发现了一个自然的图论三分法。如果H是一个非自反二部图或自反完全图,则计数表H染色在多项式时间内是平凡的。否则,如果H是一个非自反的二部置换图或自反的固有区间图,则近似计数表H-染色等价于二部图中独立集的近似计数问题#BIS。这是一个被充分研究的问题,被认为是中等复杂程度的问题——人们相信它没有FPRAS,但它不像#P中最困难的计数问题那样困难。对于每一个其他图H,关于保持近似约简,近似计数表H染色对于#P是完全的(因此除非NP = RP,否则不存在FPRAS)。三分法的两个令人满意的特征是:(1)它具有遗传图类的自然公式,(2)证明在很大程度上是自包含的,不需要任何通用代数(不像加权情况下的类似二分法)。我们能够将硬度结果扩展到有界度设置,表明所有硬度结果适用于最大度不超过6的输入图。
{"title":"A Complexity Trichotomy for Approximately Counting List H-Colorings","authors":"Andreas Galanis, L. A. Goldberg, M. Jerrum","doi":"10.1145/3037381","DOIUrl":"https://doi.org/10.1145/3037381","url":null,"abstract":"We examine the computational complexity of approximately counting the list H-colorings of a graph. We discover a natural graph-theoretic trichotomy based on the structure of the graph H. If H is an irreflexive bipartite graph or a reflexive complete graph, then counting list H-colorings is trivially in polynomial time. Otherwise, if H is an irreflexive bipartite permutation graph or a reflexive proper interval graph, then approximately counting list H-colorings is equivalent to #BIS, the problem of approximately counting independent sets in a bipartite graph. This is a well-studied problem that is believed to be of intermediate complexity—it is believed that it does not have an FPRAS, but that it is not as difficult as approximating the most difficult counting problems in #P. For every other graph H, approximately counting list H-colorings is complete for #P with respect to approximation-preserving reductions (so there is no FPRAS unless NP = RP). Two pleasing features of the trichotomy are (1) it has a natural formulation in terms of hereditary graph classes, and (2) the proof is largely self-contained and does not require any universal algebra (unlike similar dichotomies in the weighted case). We are able to extend the hardness results to the bounded-degree setting, showing that all hardness results apply to input graphs with maximum degree at most 6.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114479749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Complexity of Shift Bribery in Committee Elections 委员会选举中职务转移贿赂的复杂性
Pub Date : 2016-01-07 DOI: 10.1145/3470647
Robert Bredereck, P. Faliszewski, R. Niedermeier, Nimrod Talmon
Given an election, a preferred candidate p, and a budget, the SHIFT BRIBERY problem asks whether p can win the election after shifting p higher in some voters’ preference orders. Of course, shifting comes at a price (depending on the voter and on the extent of the shift) and one must not exceed the given budget. We study the (parameterized) computational complexity of SHIFT BRIBERY for multiwinner voting rules where winning the election means to be part of some winning committee. We focus on the well-established SNTV, Bloc, k-Borda, and Chamberlin-Courant rules, as well as on approximate variants of the Chamberlin-Courant rule. We show that SHIFT BRIBERY tends to be harder in the multiwinner setting than in the single-winner one by showing settings where SHIFT BRIBERY is computationally easy in the single-winner cases, but is hard (and hard to approximate) in the multiwinner ones.
给定一场选举、一个首选候选人p和一个预算,SHIFT贿赂问题问的是,在将p在一些选民的偏好顺序中调高后,p是否能赢得选举。当然,转移是有代价的(取决于选民和转移的程度),而且不能超过给定的预算。我们研究了多赢家投票规则下SHIFT贿赂的(参数化)计算复杂度,其中赢得选举意味着成为某个获胜委员会的一部分。我们的重点是完善的SNTV、Bloc、k-Borda和Chamberlin-Courant规则,以及Chamberlin-Courant规则的近似变体。我们通过展示在单赢家情况下SHIFT贿赂在计算上容易,但在多赢家情况下SHIFT贿赂很难(也很难近似)的设置,表明在多赢家情况下,SHIFT贿赂往往比单赢家情况下更难。
{"title":"Complexity of Shift Bribery in Committee Elections","authors":"Robert Bredereck, P. Faliszewski, R. Niedermeier, Nimrod Talmon","doi":"10.1145/3470647","DOIUrl":"https://doi.org/10.1145/3470647","url":null,"abstract":"Given an election, a preferred candidate p, and a budget, the SHIFT BRIBERY problem asks whether p can win the election after shifting p higher in some voters’ preference orders. Of course, shifting comes at a price (depending on the voter and on the extent of the shift) and one must not exceed the given budget. We study the (parameterized) computational complexity of SHIFT BRIBERY for multiwinner voting rules where winning the election means to be part of some winning committee. We focus on the well-established SNTV, Bloc, k-Borda, and Chamberlin-Courant rules, as well as on approximate variants of the Chamberlin-Courant rule. We show that SHIFT BRIBERY tends to be harder in the multiwinner setting than in the single-winner one by showing settings where SHIFT BRIBERY is computationally easy in the single-winner cases, but is hard (and hard to approximate) in the multiwinner ones.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Lower Bounds for Constant Query Affine-Invariant LCCs and LTCs 常查询仿射不变lcc和ltc的下界
Pub Date : 2015-11-24 DOI: 10.1145/3016802
Arnab Bhattacharyya, Sivakanth Gopi
Affine-invariant codes are codes whose coordinates form a vector space over a finite field and which are invariant under affine transformations of the coordinate space. They form a natural, well-studied class of codes; they include popular codes such as Reed-Muller and Reed-Solomon. A particularly appealing feature of affine-invariant codes is that they seem well suited to admit local correctors and testers. In this work, we give lower bounds on the length of locally correctable and locally testable affine-invariant codes with constant query complexity. We show that if a code C ⊂ ΣKn is an r-query affine invariant locally correctable code (LCC), where K is a finite field and Σ is a finite alphabet, then the number of codewords in C is at most exp(OK,r,|Σ|(nr−1)). Also, we show that if C ⊂ ΣKn is an r-query affine invariant locally testable code (LTC), then the number of codewords in C is at most exp(OK,r,|Σ|(nr−2)). The dependence on n in these bounds is tight for constant-query LCCs/LTCs, since Guo, Kopparty, and Sudan (ITCS’13) constructed affine-invariant codes via lifting that have the same asymptotic tradeoffs. Note that our result holds for non-linear codes, whereas previously, Ben-Sasson and Sudan (RANDOM’11) assumed linearity to derive similar results. Our analysis uses higher-order Fourier analysis. In particular, we show that the codewords corresponding to an affine-invariant LCC/LTC must be far from each other with respect to Gowers norm of an appropriate order. This then allows us to bound the number of codewords, using known decomposition theorems, which approximate any bounded function in terms of a finite number of low-degree non-classical polynomials, up to a small error in the Gowers norm.
仿射不变码是指其坐标在有限域上形成一个向量空间,并且在坐标空间的仿射变换下不变的码。它们形成了一种自然的、经过充分研究的代码;其中包括Reed-Muller和Reed-Solomon等流行代码。仿射不变码的一个特别吸引人的特点是,它们似乎非常适合于承认本地校正者和测试者。在这项工作中,我们给出了具有恒定查询复杂度的局部可校正和局部可测试仿射不变码的长度下界。我们证明,如果一个码C∧ΣKn是一个r-query仿射不变局部可校正码(LCC),其中K是一个有限域,Σ是一个有限字母,则C中的码字数至多为exp(OK,r,|Σ|(nr−1))。同样,我们证明如果C∧ΣKn是一个r-query仿射不变局部可测试码(LTC),则C中的码字数至多为exp(OK,r,|Σ|(nr−2))。对于常查询lcc /LTCs,在这些边界中对n的依赖是紧密的,因为Guo, Kopparty和Sudan (ITCS ' 13)通过提升构造了具有相同渐近权衡的仿射不变码。请注意,我们的结果适用于非线性代码,而之前,Ben-Sasson和Sudan (RANDOM ' 11)假设线性来得出类似的结果。我们的分析使用了高阶傅里叶分析。特别地,我们证明了对应于仿射不变LCC/LTC的码字必须相对于适当阶的Gowers范数彼此远离。这允许我们使用已知的分解定理来限定码字的数量,这些定理用有限数量的低次非经典多项式近似任何有界函数,直到高尔斯范数中的一个小误差。
{"title":"Lower Bounds for Constant Query Affine-Invariant LCCs and LTCs","authors":"Arnab Bhattacharyya, Sivakanth Gopi","doi":"10.1145/3016802","DOIUrl":"https://doi.org/10.1145/3016802","url":null,"abstract":"Affine-invariant codes are codes whose coordinates form a vector space over a finite field and which are invariant under affine transformations of the coordinate space. They form a natural, well-studied class of codes; they include popular codes such as Reed-Muller and Reed-Solomon. A particularly appealing feature of affine-invariant codes is that they seem well suited to admit local correctors and testers. In this work, we give lower bounds on the length of locally correctable and locally testable affine-invariant codes with constant query complexity. We show that if a code C ⊂ ΣKn is an r-query affine invariant locally correctable code (LCC), where K is a finite field and Σ is a finite alphabet, then the number of codewords in C is at most exp(OK,r,|Σ|(nr−1)). Also, we show that if C ⊂ ΣKn is an r-query affine invariant locally testable code (LTC), then the number of codewords in C is at most exp(OK,r,|Σ|(nr−2)). The dependence on n in these bounds is tight for constant-query LCCs/LTCs, since Guo, Kopparty, and Sudan (ITCS’13) constructed affine-invariant codes via lifting that have the same asymptotic tradeoffs. Note that our result holds for non-linear codes, whereas previously, Ben-Sasson and Sudan (RANDOM’11) assumed linearity to derive similar results. Our analysis uses higher-order Fourier analysis. In particular, we show that the codewords corresponding to an affine-invariant LCC/LTC must be far from each other with respect to Gowers norm of an appropriate order. This then allows us to bound the number of codewords, using known decomposition theorems, which approximate any bounded function in terms of a finite number of low-degree non-classical polynomials, up to a small error in the Gowers norm.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114602727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identity Testing and Lower Bounds for Read-k Oblivious Algebraic Branching Programs 读-k无关代数分支程序的恒等检验与下界
Pub Date : 2015-11-23 DOI: 10.1145/3170709
Matthew W. Anderson, Michael A. Forbes, Ramprasad Saptharishi, Amir Shpilka, Ben lee Volk
Read-k oblivious algebraic branching programs are a natural generalization of the well-studied model of read-once oblivious algebraic branching program (ABP). In this work, we give an exponential lower bound of exp (n/kO(k)) on the width of any read-k oblivious ABP computing some explicit multilinear polynomial f that is computed by a polynomial-size depth-3 circuit. We also study the polynomial identity testing (PIT) problem for this model and obtain a white-box subexponential-time PIT algorithm. The algorithm runs in time 2Õ(n1−1/2k−1) and needs white box access only to know the order in which the variables appear in the ABP.
读-k无关代数分支程序是对读- 1无关代数分支程序(ABP)模型的自然推广。在这项工作中,我们给出了exp (n/kO(k))的指数下界,该下界用于计算由多项式大小的depth-3电路计算的显式多线性多项式f的任何read-k无关ABP的宽度。我们还研究了该模型的多项式恒等式检验问题,得到了一个白盒次指数时间的多项式恒等式检验算法。该算法运行时间为2Õ(n1−1/2k−1),仅在知道变量在ABP中出现的顺序时才需要白盒访问。
{"title":"Identity Testing and Lower Bounds for Read-k Oblivious Algebraic Branching Programs","authors":"Matthew W. Anderson, Michael A. Forbes, Ramprasad Saptharishi, Amir Shpilka, Ben lee Volk","doi":"10.1145/3170709","DOIUrl":"https://doi.org/10.1145/3170709","url":null,"abstract":"Read-k oblivious algebraic branching programs are a natural generalization of the well-studied model of read-once oblivious algebraic branching program (ABP). In this work, we give an exponential lower bound of exp (n/kO(k)) on the width of any read-k oblivious ABP computing some explicit multilinear polynomial f that is computed by a polynomial-size depth-3 circuit. We also study the polynomial identity testing (PIT) problem for this model and obtain a white-box subexponential-time PIT algorithm. The algorithm runs in time 2Õ(n1−1/2k−1) and needs white box access only to know the order in which the variables appear in the ABP.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Tight Running Time Lower Bounds for Vertex Deletion Problems 顶点删除问题的紧运行时间下界
Pub Date : 2015-11-17 DOI: 10.1145/3186589
Christian Komusiewicz
For a graph class Π, the Π-Vertex Deletion problem has as input an undirected graph G = (V,E) and an integer k and asks whether there is a set of at most k vertices that can be deleted from G such that the resulting graph is a member of Π. By a classic result of Lewis and Yannakakis [17], Π-Vertex Deletion is NP-hard for all hereditary properties Π. We adapt the original NP-hardness construction to show that under the exponential time hypothesis (ETH), tight complexity results can be obtained. We show that Π-Vertex Deletion does not admit a 2o(n)-time algorithm where n is the number of vertices in G. We also obtain a dichotomy for running time bounds that include the number m of edges in the input graph. On the one hand, if Π contains all edgeless graphs, then there is no 2o(n+m)-time algorithm for Π-Vertex Deletion. On the other hand, if there is a fixed edgeless graph that is not contained in Π and containment in Π can be determined in 2O(n) time or 2o(m) time, then Π-Vertex Deletion can be solved in 2O(√m)+O(n) or 2o(m)+O(n) time, respectively. We also consider restrictions on the domain of the input graph G. For example, we obtain that Π-Vertex Deletion cannot be solved in 2o(√n) time if G is planar and Π is hereditary and contains and excludes infinitely many planar graphs. Finally, we provide similar results for the problem variant where the deleted vertex set has to induce a connected graph.
对于一个图类Π, Π-Vertex删除问题有一个无向图G = (V,E)和一个整数k作为输入,并询问是否存在一个最多k个顶点的集合,可以从G中删除,使得结果图是Π的成员。根据Lewis和Yannakakis[17]的经典结果,Π-Vertex对于所有遗传特性来说,缺失都是NP-hard的Π。我们对原来的np -硬度结构进行了调整,证明在指数时间假设(ETH)下,可以得到紧复杂度的结果。我们证明Π-Vertex删除不允许20 (n)时间算法,其中n是g中的顶点数。我们还获得了包含输入图中边数m的运行时间界限的二分类。一方面,如果Π包含所有无边图,则不存在耗时20 (n+m)的Π-Vertex delete算法。另一方面,如果存在一个不包含在Π中的固定无边图,并且在20 (n)或20 (m)时间内可以确定Π中的包含,则Π-Vertex的删除可以分别在20(√m)+O(n)或20 (m)+O(n)时间内解决。我们还考虑了输入图G的域上的限制,例如,我们得到了Π-Vertex不能在20(√n)时间内解决删除,如果G是平面的,Π是遗传的,包含和排除无限多个平面图。最后,对于删除的顶点集必须生成连通图的问题变体,我们提供了类似的结果。
{"title":"Tight Running Time Lower Bounds for Vertex Deletion Problems","authors":"Christian Komusiewicz","doi":"10.1145/3186589","DOIUrl":"https://doi.org/10.1145/3186589","url":null,"abstract":"For a graph class Π, the Π-Vertex Deletion problem has as input an undirected graph G = (V,E) and an integer k and asks whether there is a set of at most k vertices that can be deleted from G such that the resulting graph is a member of Π. By a classic result of Lewis and Yannakakis [17], Π-Vertex Deletion is NP-hard for all hereditary properties Π. We adapt the original NP-hardness construction to show that under the exponential time hypothesis (ETH), tight complexity results can be obtained. We show that Π-Vertex Deletion does not admit a 2o(n)-time algorithm where n is the number of vertices in G. We also obtain a dichotomy for running time bounds that include the number m of edges in the input graph. On the one hand, if Π contains all edgeless graphs, then there is no 2o(n+m)-time algorithm for Π-Vertex Deletion. On the other hand, if there is a fixed edgeless graph that is not contained in Π and containment in Π can be determined in 2O(n) time or 2o(m) time, then Π-Vertex Deletion can be solved in 2O(√m)+O(n) or 2o(m)+O(n) time, respectively. We also consider restrictions on the domain of the input graph G. For example, we obtain that Π-Vertex Deletion cannot be solved in 2o(√n) time if G is planar and Π is hereditary and contains and excludes infinitely many planar graphs. Finally, we provide similar results for the problem variant where the deleted vertex set has to induce a connected graph.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
ACM Transactions on Computation Theory (TOCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1