首页 > 最新文献

ACM Transactions on Computation Theory (TOCT)最新文献

英文 中文
Parameterized Testability 参数化的可测试性
Pub Date : 2017-12-14 DOI: 10.1145/3155294
K. Iwama, Yuichi Yoshida
This article studies property testing for NP optimization problems with parameter k under the general graph model with an augmentation of random edge sampling capability. It is shown that a variety of such problems, including k-Vertex Cover, k-Feedback Vertex Set, k-Multicut, k-Path-Free, and k-Dominating Set, are constant-query testable if k is constant. It should be noted that the first four problems are fixed parameter tractable (FPT) and it turns out that algorithmic techniques for their FPT algorithms (branch-and-bound search, color coding, etc.) are also useful for our testers. k-Dominating Set is W[2]-hard, but we can still test the property with a constant number of queries, since the definition of ε-farness makes the problem trivial for non-sparse graphs that are the source of hardness for the original optimization problem. We also consider k-Odd Cycle Transversal, which is another well-known FPT problem, but we only give a sublinear-query tester when k is a constant.
本文研究了在广义图模型下具有k参数的NP优化问题的性质检验,并增强了随机边采样能力。证明了k-顶点覆盖、k-反馈顶点集、k- multiccut、k- path - free、k- dominant Set等问题,在k为常数的条件下,是常数查询可测试的。值得注意的是,前四个问题是固定参数可处理的(FPT),并且它们的FPT算法的算法技术(分支定界搜索,颜色编码等)对我们的测试人员也很有用。k-支配集是W[2]-困难的,但我们仍然可以用常数次查询来测试该性质,因为ε-farness的定义使得非稀疏图的问题微不足道,而非稀疏图是原始优化问题的困难来源。我们还考虑了另一个著名的FPT问题——k-奇循环截线,但我们只给出了k为常数时的次线性查询检验。
{"title":"Parameterized Testability","authors":"K. Iwama, Yuichi Yoshida","doi":"10.1145/3155294","DOIUrl":"https://doi.org/10.1145/3155294","url":null,"abstract":"This article studies property testing for NP optimization problems with parameter k under the general graph model with an augmentation of random edge sampling capability. It is shown that a variety of such problems, including k-Vertex Cover, k-Feedback Vertex Set, k-Multicut, k-Path-Free, and k-Dominating Set, are constant-query testable if k is constant. It should be noted that the first four problems are fixed parameter tractable (FPT) and it turns out that algorithmic techniques for their FPT algorithms (branch-and-bound search, color coding, etc.) are also useful for our testers. k-Dominating Set is W[2]-hard, but we can still test the property with a constant number of queries, since the definition of ε-farness makes the problem trivial for non-sparse graphs that are the source of hardness for the original optimization problem. We also consider k-Odd Cycle Transversal, which is another well-known FPT problem, but we only give a sublinear-query tester when k is a constant.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121024590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Parameterized Property Testing of Functions 函数的参数化性质测试
Pub Date : 2017-12-14 DOI: 10.1145/3155296
R. Pallavoor, Sofya Raskhodnikova, Nithin M. Varma
We investigate the parameters in terms of which the complexity of sublinear-time algorithms should be expressed. Our goal is to find input parameters that are tailored to the combinatorics of the specific problem being studied and design algorithms that run faster when these parameters are small. This direction enables us to surpass the (worst-case) lower bounds, expressed in terms of the input size, for several problems. Our aim is to develop a similar level of understanding of the complexity of sublinear-time algorithms to the one that was enabled by research in parameterized complexity for classical algorithms. Specifically, we focus on testing properties of functions. By parameterizing the query complexity in terms of the size r of the image of the input function, we obtain testers for monotonicity and convexity of functions of the form f:[n]→ R with query complexity O (log r), with no dependence on n. The result for monotonicity circumvents the Ω (log n) lower bound by Fischer (Inf. Comput. 2004) for this problem. We present several other parameterized testers, providing compelling evidence that expressing the query complexity of property testers in terms of the input size is not always the best choice.
我们研究了用来表示亚线性时间算法复杂度的参数。我们的目标是找到适合正在研究的特定问题的组合的输入参数,并设计当这些参数很小时运行得更快的算法。这个方向使我们能够超越(最坏情况下的)下界,以输入大小表示,对于几个问题。我们的目标是发展对亚线性时间算法复杂性的类似水平的理解,这是通过研究经典算法的参数化复杂性所实现的。具体来说,我们专注于测试函数的属性。通过用输入函数图像的大小r来参数化查询复杂度,我们得到了f:[n]→r形式函数的单调性和凸性的检验,查询复杂度为O (log r),不依赖于n。单调性的结果绕过了Fischer (Inf. computer . 2004)对这个问题的Ω (log n)下界。我们提出了几个其他的参数化测试器,提供了令人信服的证据,证明根据输入大小来表达属性测试器的查询复杂性并不总是最好的选择。
{"title":"Parameterized Property Testing of Functions","authors":"R. Pallavoor, Sofya Raskhodnikova, Nithin M. Varma","doi":"10.1145/3155296","DOIUrl":"https://doi.org/10.1145/3155296","url":null,"abstract":"We investigate the parameters in terms of which the complexity of sublinear-time algorithms should be expressed. Our goal is to find input parameters that are tailored to the combinatorics of the specific problem being studied and design algorithms that run faster when these parameters are small. This direction enables us to surpass the (worst-case) lower bounds, expressed in terms of the input size, for several problems. Our aim is to develop a similar level of understanding of the complexity of sublinear-time algorithms to the one that was enabled by research in parameterized complexity for classical algorithms. Specifically, we focus on testing properties of functions. By parameterizing the query complexity in terms of the size r of the image of the input function, we obtain testers for monotonicity and convexity of functions of the form f:[n]→ R with query complexity O (log r), with no dependence on n. The result for monotonicity circumvents the Ω (log n) lower bound by Fischer (Inf. Comput. 2004) for this problem. We present several other parameterized testers, providing compelling evidence that expressing the query complexity of property testers in terms of the input size is not always the best choice.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Inner Product and Set Disjointness 内积与集合不相交
Pub Date : 2017-11-29 DOI: 10.1145/3428671
V. Podolskii, Alexander A. Sherstov
A major goal in complexity theory is to understand the communication complexity of number-on-the-forehead problems f:({0, 1} n)k → {0, 1} with k > log n parties. We study the problems of inner product and set disjointness and determine their randomized communication complexity for every k ≥ log n, showing in both cases that Θ(1 + ⌈log n⌉/ log ⌈1 + k/ log n⌉) bits are necessary and sufficient. In particular, these problems admit constant-cost protocols if and only if the number of parties is k ≥ nε for some constant ε > 0.
复杂性理论的一个主要目标是理解数-额问题f:({0,1} n)k→{0,1}与k > log n方的通信复杂性。我们研究了每k≥log n时的内积和集合不连通问题,并确定了它们的随机通信复杂度,证明了在这两种情况下Θ(1 +≤≤log n /≤≤log 1 +≤k/≤log n /)位是充分必要的。特别地,当且仅当对于某常数ε >,这些问题承认常数成本协议。
{"title":"Inner Product and Set Disjointness","authors":"V. Podolskii, Alexander A. Sherstov","doi":"10.1145/3428671","DOIUrl":"https://doi.org/10.1145/3428671","url":null,"abstract":"A major goal in complexity theory is to understand the communication complexity of number-on-the-forehead problems f:({0, 1} n)k → {0, 1} with k > log n parties. We study the problems of inner product and set disjointness and determine their randomized communication complexity for every k ≥ log n, showing in both cases that Θ(1 + ⌈log n⌉/ log ⌈1 + k/ log n⌉) bits are necessary and sufficient. In particular, these problems admit constant-cost protocols if and only if the number of parties is k ≥ nε for some constant ε > 0.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130077370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Beyond Worst-case (In)approximability of Nonsubmodular Influence Maximization 非次模影响最大化的超最坏情况(In)逼近性
Pub Date : 2017-10-08 DOI: 10.1145/3313904 10.1007/978-3-319-71924-5_26
G. Schoenebeck, Biaoshuai Tao
We consider the problem of maximizing the spread of influence in a social network by choosing a fixed number of initial seeds, formally referred to as the influence maximization problem. It admits a (1−1/e)-factor approximation algorithm if the influence function is submodular. Otherwise, in the worst case, the problem is NP-hard to approximate to within a factor of N1−ϵ. This article studies whether this worst-case hardness result can be circumvented by making assumptions about either the underlying network topology or the cascade model. All our assumptions are motivated by many real-life social network cascades. First, we present strong inapproximability results for a very restricted class of networks called the (stochastic) hierarchical blockmodel, a special case of the well-studied (stochastic) blockmodel in which relationships between blocks admit a tree structure. We also provide a dynamic-programming-based polynomial time algorithm, which optimally computes a directed variant of the influence maximization problem on hierarchical blockmodel networks. Our algorithm indicates that the inapproximability result is due to the bidirectionality of influence between agent-blocks. Second, we present strong inapproximability results for a class of influence functions that are “almost” submodular, called 2-quasi-submodular. Our inapproximability results hold even for any 2-quasi-submodular f fixed in advance. This result also indicates that the “threshold” between submodularity and nonsubmodularity is sharp, regarding the approximability of influence maximization.
我们考虑通过选择固定数量的初始种子来最大化社交网络中影响力传播的问题,正式称为影响力最大化问题。如果影响函数是子模的,则允许采用(1−1/e)因子近似算法。否则,在最坏的情况下,问题是np -难以近似到N1−ε的因子范围内。本文研究是否可以通过对底层网络拓扑或级联模型进行假设来规避这种最坏情况下的硬度结果。我们所有的假设都是由许多现实生活中的社交网络级联所激发的。首先,我们提出了一个非常有限的网络类别的强不可逼近性结果,称为(随机)分层块模型,这是一个已经得到充分研究的(随机)块模型的特殊情况,其中块之间的关系允许树形结构。我们还提供了一种基于动态规划的多项式时间算法,该算法最优地计算了分层块模型网络上影响最大化问题的有向变体。我们的算法表明,不逼近的结果是由于智能体块之间的双向影响。其次,我们给出了一类“几乎”子模的影响函数的强不可逼近性结果,称为2-拟子模。我们的不可逼近性结果对任何2-拟子模都成立。这一结果还表明,在影响最大化的近似性方面,亚模块化和非亚模块化之间的“阈值”是尖锐的。
{"title":"Beyond Worst-case (In)approximability of Nonsubmodular Influence Maximization","authors":"G. Schoenebeck, Biaoshuai Tao","doi":"10.1145/3313904 10.1007/978-3-319-71924-5_26","DOIUrl":"https://doi.org/10.1145/3313904 10.1007/978-3-319-71924-5_26","url":null,"abstract":"We consider the problem of maximizing the spread of influence in a social network by choosing a fixed number of initial seeds, formally referred to as the influence maximization problem. It admits a (1−1/e)-factor approximation algorithm if the influence function is submodular. Otherwise, in the worst case, the problem is NP-hard to approximate to within a factor of N1−ϵ. This article studies whether this worst-case hardness result can be circumvented by making assumptions about either the underlying network topology or the cascade model. All our assumptions are motivated by many real-life social network cascades. First, we present strong inapproximability results for a very restricted class of networks called the (stochastic) hierarchical blockmodel, a special case of the well-studied (stochastic) blockmodel in which relationships between blocks admit a tree structure. We also provide a dynamic-programming-based polynomial time algorithm, which optimally computes a directed variant of the influence maximization problem on hierarchical blockmodel networks. Our algorithm indicates that the inapproximability result is due to the bidirectionality of influence between agent-blocks. Second, we present strong inapproximability results for a class of influence functions that are “almost” submodular, called 2-quasi-submodular. Our inapproximability results hold even for any 2-quasi-submodular f fixed in advance. This result also indicates that the “threshold” between submodularity and nonsubmodularity is sharp, regarding the approximability of influence maximization.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Surjective H-Colouring over Reflexive Digraphs 自反有向图上的满射h -着色
Pub Date : 2017-09-27 DOI: 10.1145/3282431
B. Larose, B. Martin, D. Paulusma
The Surjective H-Colouring problem is to test if a given graph allows a vertex-surjective homomorphism to a fixed graph H. The complexity of this problem has been well studied for undirected (partially) reflexive graphs. We introduce endo-triviality, the property of a structure that all of its endomorphisms that do not have range of size 1 are automorphisms, as a means to obtain complexity-theoretic classifications of Surjective H-Colouring in the case of reflexive digraphs. Chen (2014) proved, in the setting of constraint satisfaction problems, that Surjective H-Colouring is NP-complete if H has the property that all of its polymorphisms are essentially unary. We give the first concrete application of his result by showing that every endo-trivial reflexive digraph H has this property. We then use the concept of endo-triviality to prove, as our main result, a dichotomy for Surjective H-Colouring when H is a reflexive tournament: if H is transitive, then Surjective H-Colouring is in NL; otherwise, it is NP-complete. By combining this result with some known and new results, we obtain a complexity classification for Surjective H-Colouring when H is a partially reflexive digraph of size at most 3.
满射h -着色问题是测试给定图是否允许与固定图h的顶点满射同态。对于无向(部分)自反图,这个问题的复杂性已经得到了很好的研究。我们引入了一个结构的自平凡性,即其所有的自同构在大小范围不为1的情况下都是自同构,作为在自反有向图的情况下获得满射h -着色的复杂性理论分类的一种手段。Chen(2014)证明,在约束满足问题的设置下,如果H具有其所有多态性本质上都是一元的性质,则满射H-着色是np完全的。我们通过证明每一个内平凡自反有向图H都具有这个性质,给出了他的结果的第一个具体应用。然后,我们利用内平凡的概念证明了当H是一个自反比武时满射H-着色的一个二分法:如果H是传递的,则满射H-着色在NL中;否则,它是np完全的。通过将这一结果与一些已知的和新的结果相结合,我们得到了当H是最大为3的部分自反有向图时满射H-着色的复杂度分类。
{"title":"Surjective H-Colouring over Reflexive Digraphs","authors":"B. Larose, B. Martin, D. Paulusma","doi":"10.1145/3282431","DOIUrl":"https://doi.org/10.1145/3282431","url":null,"abstract":"The Surjective H-Colouring problem is to test if a given graph allows a vertex-surjective homomorphism to a fixed graph H. The complexity of this problem has been well studied for undirected (partially) reflexive graphs. We introduce endo-triviality, the property of a structure that all of its endomorphisms that do not have range of size 1 are automorphisms, as a means to obtain complexity-theoretic classifications of Surjective H-Colouring in the case of reflexive digraphs. Chen (2014) proved, in the setting of constraint satisfaction problems, that Surjective H-Colouring is NP-complete if H has the property that all of its polymorphisms are essentially unary. We give the first concrete application of his result by showing that every endo-trivial reflexive digraph H has this property. We then use the concept of endo-triviality to prove, as our main result, a dichotomy for Surjective H-Colouring when H is a reflexive tournament: if H is transitive, then Surjective H-Colouring is in NL; otherwise, it is NP-complete. By combining this result with some known and new results, we obtain a complexity classification for Surjective H-Colouring when H is a partially reflexive digraph of size at most 3.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116161717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
All Classical Adversary Methods Are Equivalent for Total Functions 所有经典的对抗方法对全函数都是等效的
Pub Date : 2017-09-26 DOI: 10.1145/3442357
A. Ambainis, M. Kokainis, Krisjanis Prusis, J. Vihrovs
We show that all known classical adversary lower bounds on randomized query complexity are equivalent for total functions and are equal to the fractional block sensitivity fbs(f). That includes the Kolmogorov complexity bound of Laplante and Magniez and the earlier relational adversary bound of Aaronson. This equivalence also implies that for total functions, the relational adversary is equivalent to a simpler lower bound, which we call rank-1 relational adversary. For partial functions, we show unbounded separations between fbs(f) and other adversary bounds, as well as between the adversary bounds themselves. We also show that, for partial functions, fractional block sensitivity cannot give lower bounds larger than √ n ⋅ bs(f), where n is the number of variables and bs(f) is the block sensitivity. Then, we exhibit a partial function f that matches this upper bound, fbs(f) = Ω (√ n ⋅ bs(f)).
我们表明,所有已知的随机查询复杂度的经典对手下界对于总函数是等效的,并且等于分数块灵敏度fbs(f)。这包括Laplante和Magniez的Kolmogorov复杂度界以及Aaronson早期的关系对手界。这个等价还意味着,对于全函数,关系对手等价于一个更简单的下界,我们称之为秩1关系对手。对于部分函数,我们展示了fbs(f)与其他对手界之间以及对手界本身之间的无界分离。我们还证明,对于部分函数,分数块灵敏度不能给出大于√n·bs(f)的下界,其中n为变量数,bs(f)为块灵敏度。然后,我们给出了一个匹配这个上界的偏函数f, fbs(f) = Ω(√n⋅bs(f))。
{"title":"All Classical Adversary Methods Are Equivalent for Total Functions","authors":"A. Ambainis, M. Kokainis, Krisjanis Prusis, J. Vihrovs","doi":"10.1145/3442357","DOIUrl":"https://doi.org/10.1145/3442357","url":null,"abstract":"We show that all known classical adversary lower bounds on randomized query complexity are equivalent for total functions and are equal to the fractional block sensitivity fbs(f). That includes the Kolmogorov complexity bound of Laplante and Magniez and the earlier relational adversary bound of Aaronson. This equivalence also implies that for total functions, the relational adversary is equivalent to a simpler lower bound, which we call rank-1 relational adversary. For partial functions, we show unbounded separations between fbs(f) and other adversary bounds, as well as between the adversary bounds themselves. We also show that, for partial functions, fractional block sensitivity cannot give lower bounds larger than √ n ⋅ bs(f), where n is the number of variables and bs(f) is the block sensitivity. Then, we exhibit a partial function f that matches this upper bound, fbs(f) = Ω (√ n ⋅ bs(f)).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125294433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pseudorandom Bits for Oblivious Branching Programs 无关分支程序的伪随机位
Pub Date : 2017-08-07 DOI: 10.1145/3378663
R. Gurjar, Ben lee Volk
We construct a pseudorandom generator that fools known-order read-k oblivious branching programs and, more generally, any linear length oblivious branching program. For polynomial width branching programs, the seed lengths in our constructions are Õ(n1−1/2k−1) (for the read-k case) and O(n/ log log n) (for the linear length case). Previously, the best construction for these models required seed length (1 − Ω(1))n.
我们构造了一个伪随机生成器,它可以愚弄已知阶的读-k无关分支程序,更一般地说,可以愚弄任何线性长度无关分支程序。对于多项式宽度分支程序,我们构造的种子长度为Õ(n1−1/2k−1)(对于read-k情况)和O(n/ log log n)(对于线性长度情况)。以前,这些模型的最佳构造需要种子长度(1−Ω(1))n。
{"title":"Pseudorandom Bits for Oblivious Branching Programs","authors":"R. Gurjar, Ben lee Volk","doi":"10.1145/3378663","DOIUrl":"https://doi.org/10.1145/3378663","url":null,"abstract":"We construct a pseudorandom generator that fools known-order read-k oblivious branching programs and, more generally, any linear length oblivious branching program. For polynomial width branching programs, the seed lengths in our constructions are Õ(n1−1/2k−1) (for the read-k case) and O(n/ log log n) (for the linear length case). Previously, the best construction for these models required seed length (1 − Ω(1))n.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126416241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Min/Max-Poly Weighting Schemes and the NL versus UL Problem 最小/最大多边形加权方案和NL与UL问题
Pub Date : 2017-05-12 DOI: 10.1145/3070902
Anant Dhayal, Jayalal Sarma, Saurabh Sawlani
For a graph G(V, E) (|V| = n) and a vertex s ∈ V, a weighting scheme (W : E ↦ Z+) is called a min-unique (resp. max-unique) weighting scheme if, for any vertex v of the graph G, there is a unique path of minimum (resp. maximum) weight from s to v, where weight of a path is the sum of the weights assigned to the edges. Instead, if the number of paths of minimum (resp. maximum) weight is bounded by nc for some constant c, then the weighting scheme is called a min-poly (resp. max-poly) weighting scheme. In this article, we propose an unambiguous nondeterministic log-space (UL) algorithm for the problem of testing reachability graphs augmented with a min-poly weighting scheme. This improves the result in Reinhardt and Allender [2000], in which a UL algorithm was given for the case when the weighting scheme is min-unique. Our main technique involves triple inductive counting and generalizes the techniques of Immerman [1988], Szelepcsényi [1988], and Reinhardt and Allender [2000], combined with a hashing technique due to Fredman et al. [1984] (also used in Garvin et al. [2014]). We combine this with a complementary unambiguous verification method to give the desired UL algorithm. At the other end of the spectrum, we propose a UL algorithm for testing reachability in layered DAGs augmented with max-poly weighting schemes. To achieve this, we first reduce reachability in layered DAGs to the longest path problem for DAGs with a unique source, such that the reduction also preserves the max-unique and max-poly properties of the graph. Using our techniques, we generalize the double inductive counting method in Limaye et al. [2009], in which the UL algorithm was given for the longest path problem on DAGs with a unique sink and augmented with a max-unique weighting scheme. An important consequence of our results is that, to show NL = UL, it suffices to design log-space computable min-poly (or max-poly) weighting schemes for layered DAGs.
对于一个图G(V, E) (|V| = n)和一个顶点s∈V,一个加权方案(W: E∈Z+)称为最小唯一(resp。如果对于图G的任意顶点v,存在唯一的最小路径(resp。最大)从s到v的权值,其中路径的权值是分配给边的权值之和。相反,如果最小路径数(对应的路径数)。对于某常数c,最大)权值以nc为界,则加权方案称为最小多边形。Max-poly)加权方案。在本文中,我们提出了一种无二义性的非确定性对数空间(UL)算法,用于测试最小多加权增广的可达图问题。这改进了Reinhardt和Allender[2000]的结果,其中给出了加权方案为最小唯一的情况下的UL算法。我们的主要技术涉及三重感应计数,并推广了Immerman[1988]、szelepcs[1988]和Reinhardt and Allender[2000]的技术,并结合了Fredman等人[1984]的哈希技术(Garvin等人[2014]也使用了哈希技术)。我们将其与互补的无二义性验证方法相结合,以给出所需的UL算法。在频谱的另一端,我们提出了一种UL算法,用于测试具有最大多加权方案的分层dag的可达性。为了实现这一点,我们首先将分层dag中的可达性简化为具有唯一源的dag的最长路径问题,这样的简化也保留了图的最大唯一和最大多边形属性。利用我们的技术,我们推广了Limaye等人[2009]中的双感应计数方法,其中给出了具有唯一sink的dag上最长路径问题的UL算法,并用最大唯一加权方案进行了扩充。我们的结果的一个重要结论是,为了显示NL = UL,它足以为分层dag设计对数空间可计算的最小聚(或最大聚)加权方案。
{"title":"Min/Max-Poly Weighting Schemes and the NL versus UL Problem","authors":"Anant Dhayal, Jayalal Sarma, Saurabh Sawlani","doi":"10.1145/3070902","DOIUrl":"https://doi.org/10.1145/3070902","url":null,"abstract":"For a graph G(V, E) (|V| = n) and a vertex s ∈ V, a weighting scheme (W : E ↦ Z+) is called a min-unique (resp. max-unique) weighting scheme if, for any vertex v of the graph G, there is a unique path of minimum (resp. maximum) weight from s to v, where weight of a path is the sum of the weights assigned to the edges. Instead, if the number of paths of minimum (resp. maximum) weight is bounded by nc for some constant c, then the weighting scheme is called a min-poly (resp. max-poly) weighting scheme. In this article, we propose an unambiguous nondeterministic log-space (UL) algorithm for the problem of testing reachability graphs augmented with a min-poly weighting scheme. This improves the result in Reinhardt and Allender [2000], in which a UL algorithm was given for the case when the weighting scheme is min-unique. Our main technique involves triple inductive counting and generalizes the techniques of Immerman [1988], Szelepcsényi [1988], and Reinhardt and Allender [2000], combined with a hashing technique due to Fredman et al. [1984] (also used in Garvin et al. [2014]). We combine this with a complementary unambiguous verification method to give the desired UL algorithm. At the other end of the spectrum, we propose a UL algorithm for testing reachability in layered DAGs augmented with max-poly weighting schemes. To achieve this, we first reduce reachability in layered DAGs to the longest path problem for DAGs with a unique source, such that the reduction also preserves the max-unique and max-poly properties of the graph. Using our techniques, we generalize the double inductive counting method in Limaye et al. [2009], in which the UL algorithm was given for the longest path problem on DAGs with a unique sink and augmented with a max-unique weighting scheme. An important consequence of our results is that, to show NL = UL, it suffices to design log-space computable min-poly (or max-poly) weighting schemes for layered DAGs.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124427959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Universal Tree Balancing Theorem 一个通用树平衡定理
Pub Date : 2017-04-27 DOI: 10.1145/3278158
Moses Ganardi, Markus Lohrey
We present a general framework for balancing expressions (terms) in the form of so-called tree straight-line programs. The latter can be seen as circuits over the free term algebra extended by contexts (terms with a hole) and the operations, which insert terms/contexts into contexts. In Ref. [16], it was shown that one can compute for a given term of size n in logspace a tree straight-line program of depth O(log n) and size O(n/ log n). In the present article, it is shown that the conversion can be done in DLOGTIME-uniform TC0. This allows reducing the term evaluation problem over an arbitrary algebra A to the term evaluation problem over a derived two-sorted algebra F (A). Three applications are presented: (i) an alternative proof for a recent result by Krebs et al. [25] on the expression evaluation problem is given; (ii) it is shown that expressions for an arbitrary (possibly non-commutative) semiring can be transformed in DLOGTIME-uniform TC0 into equivalent circuits of logarithmic depth and size O(n/ log n); and, (iii) a corresponding result for regular expressions is shown.
我们以所谓的树式直线规划的形式提出了平衡表达式(项)的一般框架。后者可以看作是由上下文(带孔的项)和将项/上下文插入上下文的操作扩展的自由项代数上的电路。在文献[16]中,证明了对于给定的大小为n的对数空间项,可以计算深度为O(log n),大小为O(n/ log n)的树状直线程序。在本文中,证明了这种转换可以在DLOGTIME-uniform TC0中完成。这允许将任意代数A上的项评估问题简化为派生的二排序代数F (A)上的项评估问题。提出了三种应用:(i)对Krebs等人[25]最近的结果给出了另一种证明;(ii)证明了任意半环的表达式(可能是非交换的)可以在DLOGTIME-uniform TC0中转换成对数深度和大小为O(n/ log n)的等效电路;(iii)显示正则表达式的相应结果。
{"title":"A Universal Tree Balancing Theorem","authors":"Moses Ganardi, Markus Lohrey","doi":"10.1145/3278158","DOIUrl":"https://doi.org/10.1145/3278158","url":null,"abstract":"We present a general framework for balancing expressions (terms) in the form of so-called tree straight-line programs. The latter can be seen as circuits over the free term algebra extended by contexts (terms with a hole) and the operations, which insert terms/contexts into contexts. In Ref. [16], it was shown that one can compute for a given term of size n in logspace a tree straight-line program of depth O(log n) and size O(n/ log n). In the present article, it is shown that the conversion can be done in DLOGTIME-uniform TC0. This allows reducing the term evaluation problem over an arbitrary algebra A to the term evaluation problem over a derived two-sorted algebra F (A). Three applications are presented: (i) an alternative proof for a recent result by Krebs et al. [25] on the expression evaluation problem is given; (ii) it is shown that expressions for an arbitrary (possibly non-commutative) semiring can be transformed in DLOGTIME-uniform TC0 into equivalent circuits of logarithmic depth and size O(n/ log n); and, (iii) a corresponding result for regular expressions is shown.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134575991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Pseudorandom Generators with Optimal Seed Length for Non-Boolean Poly-Size Circuits 非布尔多尺寸电路的最优种子长度伪随机发生器
Pub Date : 2017-04-27 DOI: 10.1145/3018057
Sergei Artemenko, Ronen Shaltiel
A sampling procedure for a distribution P over {0, 1}ℓ is a function C: {0, 1}n → {0, 1}ℓ such that the distribution C(Un) (obtained by applying C on the uniform distribution Un) is the “desired distribution” P. Let n > r ≥ ℓ = nΩ(1). An ε-nb-PRG (defined by Dubrov and Ishai [2006]) is a function G: {0, 1}r → {0, 1}n such that for every C: {0, 1}n → {0, 1}ℓ in some class of “interesting sampling procedures,” C′(Ur) = C(G(Ur)) is ε-close to C(Un) in statistical distance. We construct poly-time computable nb-PRGs with r = O(ℓ) for poly-size circuits relying on the assumption that there exists β > 0 and a problem L in E = DTIME(2O(n)) such that for every large enough n, nondeterministic circuits of size 2βn that have NP-gates cannot solve L on inputs of lengthn. This assumption is a scaled nonuniform analog of (the widely believed) EXP ≠ Σ2P, and similar assumptions appear in various contexts in derandomization. Previous nb-PRGs of Dubrov and Ishai have r = Ω(ℓ2) and are based on very strong cryptographic assumptions or, alternatively, on nonstandard assumptions regarding incompressibility of functions on random inputs. When restricting to poly-size circuits C: {0, 1}n → {0, 1}ℓ with Shannon entropy H(C(Un)) ⩽ k, for ℓ > k = nΩ(1), our nb-PRGs have r = O(k). The nb-PRGs of Dubrov and Ishai use seed length r = Ω(k2) and require that the probability distribution of C(Un) is efficiently computable. Our nb-PRGs follow from a notion of “conditional PRGs,” which may be of independent interest. These are PRGs where G(Ur) remains pseudorandom even when conditioned on a “large” event {A(G(Ur)) = 1}, for an arbitrary poly-size circuit A. A related notion was considered by Shaltiel and Umans [2005] in a different setting, and our proofs use ideas from that paper, as well as ideas of Dubrov and Ishai. We also give an unconditional construction of poly-time computable nb-PRGs for poly(n)-size, depth d circuits C: {0, 1}n → {0, 1}ℓ with r = O(ℓ · log d + O(1)n). This improves upon the previous work of Dubrov and Ishai that has r ≥ ℓ2. This result follows by adapting a recent PRG construction of Trevisan and Xue [2013] to the case of nb-PRGs. We also show that this PRG can be implemented by a uniform family of constant-depth circuits with slightly increased seed length.
对于一个分布P /{0,1},其抽样过程是一个函数C: {0,1}n→{0,1},使得分布C(Un)(由C作用于均匀分布Un得到)是“期望分布”P,设n > r≥r = nΩ(1)。由Dubrov和Ishai[2006]定义的ε-nb-PRG是一个函数G: {0,1}r→{0,1}n,使得对于某一类“有趣抽样过程”中的每一个C: {0,1}n→{0,1}n, C′(Ur) = C(G(Ur))在统计距离上ε-接近C(Un)。基于假设存在β > 0和E = DTIME(2O(n))中的问题L,我们构造了具有r = O(r)的多时间可计算nb-PRGs,使得对于每一个足够大的n,具有np门的2βn大小的不确定性电路不能在长度为n的输入上求解L。这个假设是(普遍认为的)EXP≠Σ2P的缩放非均匀模拟,类似的假设出现在非随机化的各种环境中。Dubrov和Ishai先前的nb-PRGs有r = Ω(2),并且基于非常强的密码学假设,或者基于关于随机输入上函数的不可压缩性的非标准假设。当约束于多尺度电路C: {0,1}n→{0,1}r, Shannon熵H(C(Un))≥k时,当r > k = nΩ(1)时,我们的nb-PRGs具有r = O(k)。Dubrov和Ishai的nb-PRGs使用种子长度r = Ω(k2),并要求C(Un)的概率分布是可有效计算的。我们的nb-PRGs遵循“有条件PRGs”的概念,这可能是独立的兴趣。这些是prg,其中G(Ur)即使在“大”事件{a (G(Ur)) = 1}的条件下仍然是伪随机的,对于任意多尺寸电路a, Shaltiel和human[2005]在不同的设置中考虑了一个相关的概念,我们的证明使用了该论文中的思想,以及Dubrov和Ishai的思想。我们还给出了poly(n)-size, depth d电路C: {0,1}n→{0,1}r, r = O(r·log d + O(1)n)时多时间可计算nb-PRGs的无条件构造。这改进了Dubrov和Ishai先前的r≥2的工作。这一结果是根据Trevisan和Xue[2013]最近对nb-PRGs的PRG构建进行调整得出的。我们还表明,该PRG可以通过一组均匀的等深度电路来实现,并稍微增加种子长度。
{"title":"Pseudorandom Generators with Optimal Seed Length for Non-Boolean Poly-Size Circuits","authors":"Sergei Artemenko, Ronen Shaltiel","doi":"10.1145/3018057","DOIUrl":"https://doi.org/10.1145/3018057","url":null,"abstract":"A sampling procedure for a distribution P over {0, 1}ℓ is a function C: {0, 1}n → {0, 1}ℓ such that the distribution C(Un) (obtained by applying C on the uniform distribution Un) is the “desired distribution” P. Let n > r ≥ ℓ = nΩ(1). An ε-nb-PRG (defined by Dubrov and Ishai [2006]) is a function G: {0, 1}r → {0, 1}n such that for every C: {0, 1}n → {0, 1}ℓ in some class of “interesting sampling procedures,” C′(Ur) = C(G(Ur)) is ε-close to C(Un) in statistical distance. We construct poly-time computable nb-PRGs with r = O(ℓ) for poly-size circuits relying on the assumption that there exists β > 0 and a problem L in E = DTIME(2O(n)) such that for every large enough n, nondeterministic circuits of size 2βn that have NP-gates cannot solve L on inputs of lengthn. This assumption is a scaled nonuniform analog of (the widely believed) EXP ≠ Σ2P, and similar assumptions appear in various contexts in derandomization. Previous nb-PRGs of Dubrov and Ishai have r = Ω(ℓ2) and are based on very strong cryptographic assumptions or, alternatively, on nonstandard assumptions regarding incompressibility of functions on random inputs. When restricting to poly-size circuits C: {0, 1}n → {0, 1}ℓ with Shannon entropy H(C(Un)) ⩽ k, for ℓ > k = nΩ(1), our nb-PRGs have r = O(k). The nb-PRGs of Dubrov and Ishai use seed length r = Ω(k2) and require that the probability distribution of C(Un) is efficiently computable. Our nb-PRGs follow from a notion of “conditional PRGs,” which may be of independent interest. These are PRGs where G(Ur) remains pseudorandom even when conditioned on a “large” event {A(G(Ur)) = 1}, for an arbitrary poly-size circuit A. A related notion was considered by Shaltiel and Umans [2005] in a different setting, and our proofs use ideas from that paper, as well as ideas of Dubrov and Ishai. We also give an unconditional construction of poly-time computable nb-PRGs for poly(n)-size, depth d circuits C: {0, 1}n → {0, 1}ℓ with r = O(ℓ · log d + O(1)n). This improves upon the previous work of Dubrov and Ishai that has r ≥ ℓ2. This result follows by adapting a recent PRG construction of Trevisan and Xue [2013] to the case of nb-PRGs. We also show that this PRG can be implemented by a uniform family of constant-depth circuits with slightly increased seed length.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124699520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
ACM Transactions on Computation Theory (TOCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1