首页 > 最新文献

ACM Transactions on Computation Theory (TOCT)最新文献

英文 中文
Exact Perfect Matching in Complete Graphs 完全图中的精确完美匹配
Pub Date : 2017-04-27 DOI: 10.1145/3041402
R. Gurjar, A. Korwar, J. Messner, T. Thierauf
A red-blue graph is a graph where every edge is colored either red or blue. The exact perfect matching problem asks for a perfect matching in a red-blue graph that has exactly a given number of red edges. We show that for complete and bipartite complete graphs, the exact perfect matching problem is logspace equivalent to the perfect matching problem. Hence, an efficient parallel algorithm for perfect matching would carry over to the exact perfect matching problem for this class of graphs. We also report some progress in extending the result to arbitrary graphs.
红蓝图是指每条边都涂上红色或蓝色的图。精确完美匹配问题要求在一个红蓝图中得到一个完美匹配,这个图有给定数量的红边。我们证明了对于完全图和二部完全图,完全匹配问题在对数空间上等价于完全匹配问题。因此,一种高效的完美匹配并行算法将适用于这类图的精确完美匹配问题。我们还报道了将结果推广到任意图的一些进展。
{"title":"Exact Perfect Matching in Complete Graphs","authors":"R. Gurjar, A. Korwar, J. Messner, T. Thierauf","doi":"10.1145/3041402","DOIUrl":"https://doi.org/10.1145/3041402","url":null,"abstract":"A red-blue graph is a graph where every edge is colored either red or blue. The exact perfect matching problem asks for a perfect matching in a red-blue graph that has exactly a given number of red edges. We show that for complete and bipartite complete graphs, the exact perfect matching problem is logspace equivalent to the perfect matching problem. Hence, an efficient parallel algorithm for perfect matching would carry over to the exact perfect matching problem for this class of graphs. We also report some progress in extending the result to arbitrary graphs.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128061684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Complexity of Boolean Surjective General-Valued CSPs 布尔满射一般值csp的复杂度
Pub Date : 2017-02-16 DOI: 10.1145/3282429
Peter Fulla, Hannes Uppman, Stanislav Živný
Valued constraint satisfaction problems (VCSPs) are discrete optimisation problems with a (Q ∪ {∞ })-valued objective function given as a sum of fixed-arity functions. In Boolean surjective VCSPs, variables take on labels from D = {0,1}, and an optimal assignment is required to use both labels from D. Examples include the classical global Min-Cut problem in graphs and the Minimum Distance problem studied in coding theory. We establish a dichotomy theorem and thus give a complete complexity classification of Boolean surjective VCSPs with respect to exact solvability. Our work generalises the dichotomy for {0, ∞}-valued constraint languages (corresponding to surjective decision CSPs) obtained by Creignou and Hébrard. For the maximisation problem of Q≥0-valued surjective VCSPs, we also establish a dichotomy theorem with respect to approximability. Unlike in the case of Boolean surjective (decision) CSPs, there appears a novel tractable class of languages that is trivial in the non-surjective setting. This newly discovered tractable class has an interesting mathematical structure related to downsets and upsets. Our main contribution is identifying this class and proving that it lies on the borderline of tractability. A crucial part of our proof is a polynomial-time algorithm for enumerating all near-optimal solutions to a generalised Min-Cut problem, which might be of independent interest.
有值约束满足问题(VCSPs)是具有(Q∪{∞})值目标函数作为定值函数和的离散优化问题。在布尔满射vcsp中,变量取D ={0,1}的标签,需要同时使用D中的两个标签进行最优分配。例子包括图中的经典全局最小切问题和编码理论中研究的最小距离问题。我们建立了一个二分定理,从而给出了布尔满射vcsp关于精确可解的完全复杂度分类。我们的工作推广了由Creignou和hsambrard得到的{0,∞}值约束语言(对应于满射决策csp)的二分法。对于Q≥0值满射vcsp的最大化问题,我们还建立了关于逼近性的二分定理。与布尔满射(决策)csp的情况不同,出现了一种新的可处理的语言类别,它在非满射设置中是微不足道的。这个新发现的易于处理的类有一个有趣的数学结构,与低落和沮丧有关。我们的主要贡献是确定这类并证明它位于可处理性的边缘。我们证明的关键部分是一个多项式时间算法,用于枚举广义最小切问题的所有近最优解,这可能是独立的兴趣。
{"title":"The Complexity of Boolean Surjective General-Valued CSPs","authors":"Peter Fulla, Hannes Uppman, Stanislav Živný","doi":"10.1145/3282429","DOIUrl":"https://doi.org/10.1145/3282429","url":null,"abstract":"Valued constraint satisfaction problems (VCSPs) are discrete optimisation problems with a (Q ∪ {∞ })-valued objective function given as a sum of fixed-arity functions. In Boolean surjective VCSPs, variables take on labels from D = {0,1}, and an optimal assignment is required to use both labels from D. Examples include the classical global Min-Cut problem in graphs and the Minimum Distance problem studied in coding theory. We establish a dichotomy theorem and thus give a complete complexity classification of Boolean surjective VCSPs with respect to exact solvability. Our work generalises the dichotomy for {0, ∞}-valued constraint languages (corresponding to surjective decision CSPs) obtained by Creignou and Hébrard. For the maximisation problem of Q≥0-valued surjective VCSPs, we also establish a dichotomy theorem with respect to approximability. Unlike in the case of Boolean surjective (decision) CSPs, there appears a novel tractable class of languages that is trivial in the non-surjective setting. This newly discovered tractable class has an interesting mathematical structure related to downsets and upsets. Our main contribution is identifying this class and proving that it lies on the borderline of tractability. A crucial part of our proof is a polynomial-time algorithm for enumerating all near-optimal solutions to a generalised Min-Cut problem, which might be of independent interest.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On Hardness of Multilinearization and VNP-Completeness in Characteristic 2 多线性化的硬度和特征2的vnp完备性
Pub Date : 2016-12-26 DOI: 10.1145/2940323
P. Hrubes
For a Boolean function f: {0, 1}n → {0, 1}, let fˆ be the unique multilinear polynomial such that f(x) = fˆ(x) holds for every x ˆ {0, 1}n. We show that, assuming VP ≠ VNP, there exists a polynomial-time computable f such that fˆ requires superpolynomial arithmetic circuits. In fact, this f can be taken as a monotone 2-CNF, or a product of affine functions. This holds over any field. To prove the results in characteristic 2, we design new VNP-complete families in this characteristic. This includes the polynomial ECn counting edge covers in a graph and the polynomial mcliquen counting cliques in a graph with deleted perfect matching. They both correspond to polynomial-time decidable problems, a phenomenon previously encountered only in characteristic ≠ 2.
对于布尔函数f: {0,1}n→{0,1},设f -是唯一的多元线性多项式,使得f(x) = f - (x)对每个x - {0,1}n都成立。我们证明,假设VP≠VNP,存在一个多项式时间可计算的f,使得f -需要超多项式算术电路。事实上,这个f可以看作是单调的2-CNF,或者是仿射函数的乘积。这适用于任何领域。为了证明特征2中的结果,我们在该特征上设计了新的vnp -完全族。这包括图中的多项式ECn计数边盖和图中删除完美匹配的多项式mcliquen计数团。它们都对应于多项式时间可决定的问题,这种现象以前只在特征≠2时遇到过。
{"title":"On Hardness of Multilinearization and VNP-Completeness in Characteristic 2","authors":"P. Hrubes","doi":"10.1145/2940323","DOIUrl":"https://doi.org/10.1145/2940323","url":null,"abstract":"For a Boolean function f: {0, 1}n → {0, 1}, let fˆ be the unique multilinear polynomial such that f(x) = fˆ(x) holds for every x ˆ {0, 1}n. We show that, assuming VP ≠ VNP, there exists a polynomial-time computable f such that fˆ requires superpolynomial arithmetic circuits. In fact, this f can be taken as a monotone 2-CNF, or a product of affine functions. This holds over any field. To prove the results in characteristic 2, we design new VNP-complete families in this characteristic. This includes the polynomial ECn counting edge covers in a graph and the polynomial mcliquen counting cliques in a graph with deleted perfect matching. They both correspond to polynomial-time decidable problems, a phenomenon previously encountered only in characteristic ≠ 2.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fractal Intersections and Products via Algorithmic Dimension 基于算法维数的分形相交与积
Pub Date : 2016-12-06 DOI: 10.1145/3460948
Neil Lutz
Algorithmic fractal dimensions quantify the algorithmic information density of individual points and may be defined in terms of Kolmogorov complexity. This work uses these dimensions to bound the classical Hausdorff and packing dimensions of intersections and Cartesian products of fractals in Euclidean spaces. This approach shows that two prominent, fundamental results about the dimension of Borel or analytic sets also hold for arbitrary sets.
算法分形维数量化了单个点的算法信息密度,可以用柯尔莫哥洛夫复杂度来定义。这项工作使用这些维数来约束欧几里德空间中交叉点和分形的笛卡尔积的经典豪斯多夫和包装维数。这种方法表明了关于Borel或解析集的维数的两个重要的基本结果也适用于任意集。
{"title":"Fractal Intersections and Products via Algorithmic Dimension","authors":"Neil Lutz","doi":"10.1145/3460948","DOIUrl":"https://doi.org/10.1145/3460948","url":null,"abstract":"Algorithmic fractal dimensions quantify the algorithmic information density of individual points and may be defined in terms of Kolmogorov complexity. This work uses these dimensions to bound the classical Hausdorff and packing dimensions of intersections and Cartesian products of fractals in Euclidean spaces. This approach shows that two prominent, fundamental results about the dimension of Borel or analytic sets also hold for arbitrary sets.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132931149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Nondeterminism and An Abstract Formulation of Nečiporuk’s Lower Bound Method 不确定性与ne<e:1> iporuk下界方法的抽象表述
Pub Date : 2016-08-05 DOI: 10.1145/3013516
P. Beame, Nathan Grosshans, P. McKenzie, L. Segoufin
A formulation of Nečiporuk’s lower bound method slightly more inclusive than the usual complexity-measure-specific formulation is presented. Using this general formulation, limitations to lower bounds achievable by the method are obtained for several computation models, such as branching programs and Boolean formulas having access to a sublinear number of nondeterministic bits. In particular, it is shown that any lower bound achievable by the method of Nečiporuk for the size of nondeterministic and parity branching programs is at most O(n3/2/logn).
提出了一种比通常的复杂性测量特定公式更具包容性的ne iporuk下界方法的公式。利用这一一般公式,得到了几种计算模型可达到的下界的限制,如分支程序和布尔公式具有访问次线性数目的不确定性位。特别地,证明了用ne iporuk方法对不确定性和奇偶性分支规划的大小所能达到的下界不超过O(n3/2/logn)。
{"title":"Nondeterminism and An Abstract Formulation of Nečiporuk’s Lower Bound Method","authors":"P. Beame, Nathan Grosshans, P. McKenzie, L. Segoufin","doi":"10.1145/3013516","DOIUrl":"https://doi.org/10.1145/3013516","url":null,"abstract":"A formulation of Nečiporuk’s lower bound method slightly more inclusive than the usual complexity-measure-specific formulation is presented. Using this general formulation, limitations to lower bounds achievable by the method are obtained for several computation models, such as branching programs and Boolean formulas having access to a sublinear number of nondeterministic bits. In particular, it is shown that any lower bound achievable by the method of Nečiporuk for the size of nondeterministic and parity branching programs is at most O(n3/2/logn).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130534729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the Sensitivity Complexity of k-Uniform Hypergraph Properties 关于k-一致超图性质的灵敏度复杂度
Pub Date : 2016-08-01 DOI: 10.1145/3448643
Qian Li, Xiaoming Sun
In this article, we investigate the sensitivity complexity of hypergraph properties. We present a k-uniform hypergraph property with sensitivity complexity O(n(⌈k/3⌉) for any k≥3, where n is the number of vertices. Moreover, we can do better when k≡1 (mod 3) by presenting a k-uniform hypergraph property with sensitivity O(n⌈k/3⌉-1/2). This result disproves a conjecture of Babai, which conjectures that the sensitivity complexity of k-uniform hypergraph properties is at least Ω (nk/2). We also investigate the sensitivity complexity of other symmetric functions and show that for many classes of transitive Boolean functions the minimum achievable sensitivity complexity can be O(N1/3), where N is the number of variables.
在本文中,我们研究了超图属性的敏感性复杂度。对于任意k≥3,我们给出了一个灵敏度复杂度为O(n(≤k/3))的k-一致超图性质,其中n为顶点数。此外,当k≡1 (mod 3)时,我们可以通过提出灵敏度为O(n≤k/3≤1/2)的k-均匀超图性质来做得更好。这一结果反驳了Babai关于k-一致超图性质的灵敏度复杂度至少为Ω (nk/2)的猜想。我们还研究了其他对称函数的灵敏度复杂度,并证明了对于许多类传递布尔函数,最小可达到的灵敏度复杂度可以是O(N /3),其中N是变量的数目。
{"title":"On the Sensitivity Complexity of k-Uniform Hypergraph Properties","authors":"Qian Li, Xiaoming Sun","doi":"10.1145/3448643","DOIUrl":"https://doi.org/10.1145/3448643","url":null,"abstract":"In this article, we investigate the sensitivity complexity of hypergraph properties. We present a k-uniform hypergraph property with sensitivity complexity O(n(⌈k/3⌉) for any k≥3, where n is the number of vertices. Moreover, we can do better when k≡1 (mod 3) by presenting a k-uniform hypergraph property with sensitivity O(n⌈k/3⌉-1/2). This result disproves a conjecture of Babai, which conjectures that the sensitivity complexity of k-uniform hypergraph properties is at least Ω (nk/2). We also investigate the sensitivity complexity of other symmetric functions and show that for many classes of transitive Boolean functions the minimum achievable sensitivity complexity can be O(N1/3), where N is the number of variables.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114663349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tolerant Junta Testing and the Connection to Submodular Optimization and Function Isomorphism 容忍军政府测试及其与子模优化和函数同构的联系
Pub Date : 2016-07-13 DOI: 10.1145/3337789
Eric Blais, C. Canonne, T. Eden, Amit Levi, D. Ron
A function f:{ −1,1}n → { −1,1} is a k-junta if it depends on at most k of its variables. We consider the problem of tolerant testing of k-juntas, where the testing algorithm must accept any function that is ε-close to some k-junta and reject any function that is ε′-far from every k′-junta for some ε′ = O(ε) and k′ = O(k). Our first result is an algorithm that solves this problem with query complexity polynomial in k and 1/ε. This result is obtained via a new polynomial-time approximation algorithm for submodular function minimization (SFM) under large cardinality constraints, which holds even when only given an approximate oracle access to the function. Our second result considers the case where k′ = k. We show how to obtain a smooth tradeoff between the amount of tolerance and the query complexity in this setting. Specifically, we design an algorithm that, given ρ ∈ (0,1), accepts any function that is ε ρ/16-close to some k-junta and rejects any function that is ε-far from every k-junta. The query complexity of the algorithm is O (k log k/ε ρ (1-ρ)k. Finally, we show how to apply the second result to the problem of tolerant isomorphism testing between two unknown Boolean functions f and g. We give an algorithm for this problem whose query complexity only depends on the (unknown) smallest k such that either f or g is close to being a k-junta.
一个函数f:{−1,1}n→{−1,1}是一个k-军政府,如果它依赖于它的最多k个变量。考虑k-簇的容限测试问题,其中对于ε ' = O(ε)和k ' = O(k),测试算法必须接受ε ' -接近某个k '簇的任何函数,拒绝ε ' -远离每个k ' -簇的任何函数。我们的第一个结果是一个用k和1/ε的查询复杂度多项式来解决这个问题的算法。这个结果是通过在大基数约束下的子模函数最小化(SFM)的新的多项式时间近似算法获得的,即使只给函数一个近似的oracle访问,该算法也有效。我们的第二个结果考虑了k ' = k的情况。我们展示了如何在这种设置中获得容忍度和查询复杂性之间的平滑权衡。具体地说,我们设计了一个算法,给定ρ∈(0,1),接受任何接近某个k-军政府的ε ρ/16函数,拒绝任何远离每个k-军政府的ε-函数。算法的查询复杂度为O (k log k/ε ρ (1-ρ)k。最后,我们展示了如何将第二个结果应用于两个未知布尔函数f和g之间的容容同构测试问题。我们给出了该问题的查询复杂度仅依赖于(未知的)最小k的算法,使得f和g中的任何一个都接近于k-军政府。
{"title":"Tolerant Junta Testing and the Connection to Submodular Optimization and Function Isomorphism","authors":"Eric Blais, C. Canonne, T. Eden, Amit Levi, D. Ron","doi":"10.1145/3337789","DOIUrl":"https://doi.org/10.1145/3337789","url":null,"abstract":"A function f:{ −1,1}n → { −1,1} is a k-junta if it depends on at most k of its variables. We consider the problem of tolerant testing of k-juntas, where the testing algorithm must accept any function that is ε-close to some k-junta and reject any function that is ε′-far from every k′-junta for some ε′ = O(ε) and k′ = O(k). Our first result is an algorithm that solves this problem with query complexity polynomial in k and 1/ε. This result is obtained via a new polynomial-time approximation algorithm for submodular function minimization (SFM) under large cardinality constraints, which holds even when only given an approximate oracle access to the function. Our second result considers the case where k′ = k. We show how to obtain a smooth tradeoff between the amount of tolerance and the query complexity in this setting. Specifically, we design an algorithm that, given ρ ∈ (0,1), accepts any function that is ε ρ/16-close to some k-junta and rejects any function that is ε-far from every k-junta. The query complexity of the algorithm is O (k log k/ε ρ (1-ρ)k. Finally, we show how to apply the second result to the problem of tolerant isomorphism testing between two unknown Boolean functions f and g. We give an algorithm for this problem whose query complexity only depends on the (unknown) smallest k such that either f or g is close to being a k-junta.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123572266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Tight Lower Bounds for the Complexity of Multicoloring 多色复杂性的紧下界
Pub Date : 2016-07-01 DOI: 10.1145/3313906
Marthe Bonamy, Lukasz Kowalik, Michal Pilipczuk, Arkadiusz Socala, Marcin Wrochna
In the multicoloring problem, also known as (a:b)-coloring or b-fold coloring, we are given a graph G and a set of a colors, and the task is to assign a subset of b colors to each vertex of G so that adjacent vertices receive disjoint color subsets. This natural generalization of the classic coloring problem (the b=1 case) is equivalent to finding a homomorphism to the Kneser graph KGa,b and gives relaxations approaching the fractional chromatic number. We study the complexity of determining whether a graph has an (a:b)-coloring. Our main result is that this problem does not admit an algorithm with runtime f(b)ċ 2o(log b)ċ n for any computable f(b) unless the Exponential Time Hypothesis (ETH) fails. A (b+1)nċ poly(n)-time algorithm due to Nederlof [33] shows that this is tight. A direct corollary of our result is that the graph homomorphism problem does not admit a 2O(n+h) algorithm unless the ETH fails even if the target graph is required to be a Kneser graph. This refines the understanding given by the recent lower bound of Cygan et al. [9]. The crucial ingredient in our hardness reduction is the usage of detecting matrices of Lindström [28], which is a combinatorial tool that, to the best of our knowledge, has not yet been used for proving complexity lower bounds. As a side result, we prove that the runtime of the algorithms of Abasi et al. [1] and of Gabizon et al. [14] for the r-monomial detection problem are optimal under the ETH.
在多重着色问题中,也称为(a:b)-着色或b-折叠着色,我们给定一个图G和一组颜色,任务是为G的每个顶点分配b种颜色的子集,使相邻顶点接收不相交的颜色子集。经典着色问题(b=1的情况)的这种自然推广等同于找到Kneser图KGa,b的同态,并给出接近分数色数的松弛。我们研究了判定图是否有(a:b)着色的复杂性。我们的主要结果是,除非指数时间假设(ETH)失败,否则对于任何可计算的f(b),该问题不允许运行时间为f(b) * 20 (log b) * n的算法。Nederlof[33]提出的A (b+1) nvidia poly(n) time算法表明这是紧的。我们的结果的一个直接推论是,图同态问题不允许20 (n+h)算法,除非ETH失败,即使目标图被要求是Kneser图。这改进了Cygan等人[9]最近给出的下界的理解。我们降低硬度的关键因素是使用Lindström[28]的检测矩阵,这是一个组合工具,据我们所知,尚未用于证明复杂性下界。作为附带结果,我们证明了Abasi等人[1]和Gabizon等人[14]的算法在ETH下的r-单项检测问题的运行时间是最优的。
{"title":"Tight Lower Bounds for the Complexity of Multicoloring","authors":"Marthe Bonamy, Lukasz Kowalik, Michal Pilipczuk, Arkadiusz Socala, Marcin Wrochna","doi":"10.1145/3313906","DOIUrl":"https://doi.org/10.1145/3313906","url":null,"abstract":"In the multicoloring problem, also known as (a:b)-coloring or b-fold coloring, we are given a graph G and a set of a colors, and the task is to assign a subset of b colors to each vertex of G so that adjacent vertices receive disjoint color subsets. This natural generalization of the classic coloring problem (the b=1 case) is equivalent to finding a homomorphism to the Kneser graph KGa,b and gives relaxations approaching the fractional chromatic number. We study the complexity of determining whether a graph has an (a:b)-coloring. Our main result is that this problem does not admit an algorithm with runtime f(b)ċ 2o(log b)ċ n for any computable f(b) unless the Exponential Time Hypothesis (ETH) fails. A (b+1)nċ poly(n)-time algorithm due to Nederlof [33] shows that this is tight. A direct corollary of our result is that the graph homomorphism problem does not admit a 2O(n+h) algorithm unless the ETH fails even if the target graph is required to be a Kneser graph. This refines the understanding given by the recent lower bound of Cygan et al. [9]. The crucial ingredient in our hardness reduction is the usage of detecting matrices of Lindström [28], which is a combinatorial tool that, to the best of our knowledge, has not yet been used for proving complexity lower bounds. As a side result, we prove that the runtime of the algorithms of Abasi et al. [1] and of Gabizon et al. [14] for the r-monomial detection problem are optimal under the ETH.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124878891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Space-Efficient Approximations for Subset Sum 子集和的空间效率逼近
Pub Date : 2016-06-29 DOI: 10.1145/2894843
A. Gál, Jing-Tang Jang, N. Limaye, M. Mahajan, Karteek Sreenivasaiah
SubsetSum is a well-known NP-complete problem: given t ∈ Z+ and a set S of m positive integers, output YES if and only if there is a subset S′⊆S such that the sum of all numbers in S′ equals t. The problem and its search and optimization versions are known to be solvable in pseudopolynomial time in general. We develop a one-pass deterministic streaming algorithm that uses space O(log t / ε) and decides if some subset of the input stream adds up to a value in the range {(1 ± ϵ)t}. Using this algorithm, we design space-efficient fully polynomial-time approximation schemes (FPTAS) solving the search and optimization versions of SubsetSum. Our algorithms run in O(1 / ϵ m2) time and O(1 / ϵ) space on unit-cost RAMs, where 1 + ϵ is the approximation factor. This implies constant space quadratic time FPTAS on unit-cost RAMs when ϵ is a constant. Previous FPTAS used space linear in m. In addition, we show that on certain inputs, when a solution is located within a short prefix of the input sequence, our algorithms may run in sublinear time. We apply our techniques to the problem of finding balanced separators, and we extend our results to some other variants of the more general knapsack problem. When the input numbers are encoded in unary, the decision version has been known to be in log space. We give streaming space lower and upper bounds for unary SubsetSum (USS). If the input length is N when the numbers are encoded in unary, we show that randomized s-pass streaming algorithms for exact SubsetSum need space Ω (√N/s) and give a simple deterministic two-pass streaming algorithm using O(√N log N) space. Finally, we formulate an encoding under which USS is monotone and show that the exact and approximate versions in this formulation have monotone O(log2t) depth Boolean circuits. We also show that any circuit using ε-approximator gates for SubsetSum under this encoding needs Ω(n/logn) gates to compute the disjointness function.
SubsetSum是一个著名的np完全问题:给定t∈Z+,有一个m个正整数的集合S,当且仅当存在一个子集S’≥t且S’中所有数的和等于t时,输出YES。该问题及其搜索优化版本已知在一般伪多项式时间内可解。我们开发了一种单遍确定性流算法,它使用空间O(log t / ε),并决定输入流的某个子集是否加起来等于{(1±λ)t}范围内的值。利用该算法,我们设计了空间高效的全多项式时间近似方案(FPTAS)来解决SubsetSum的搜索和优化版本。我们的算法在单位成本ram上运行在O(1 /御柱m2)时间和O(1 /御柱)空间中,其中1 +御柱是近似因子。这意味着当λ为常数时,单位成本ram上的常数空间二次时间FPTAS。以前的FPTAS在m中使用空间线性。此外,我们表明,在某些输入上,当一个解位于输入序列的短前缀内时,我们的算法可能在亚线性时间内运行。我们将我们的技术应用于寻找平衡分隔符的问题,并将我们的结果扩展到更一般的背包问题的一些其他变体。当输入数字以一元编码时,决策版本已知在日志空间中。我们给出一元SubsetSum (USS)的流空间下界和上界。如果输入长度为N,当数字以一元编码时,我们证明了精确SubsetSum的随机s-pass流算法需要Ω(√N/s)空间,并给出了一个简单的确定性两通道流算法,使用O(√N log N)空间。最后,我们给出了USS为单调的编码,并证明了该编码的精确和近似版本具有单调的O(log2t)深度布尔电路。我们还证明,在这种编码下,任何对SubsetSum使用ε-近似门的电路都需要Ω(n/logn)门来计算不相交函数。
{"title":"Space-Efficient Approximations for Subset Sum","authors":"A. Gál, Jing-Tang Jang, N. Limaye, M. Mahajan, Karteek Sreenivasaiah","doi":"10.1145/2894843","DOIUrl":"https://doi.org/10.1145/2894843","url":null,"abstract":"SubsetSum is a well-known NP-complete problem: given t ∈ Z+ and a set S of m positive integers, output YES if and only if there is a subset S′⊆S such that the sum of all numbers in S′ equals t. The problem and its search and optimization versions are known to be solvable in pseudopolynomial time in general. We develop a one-pass deterministic streaming algorithm that uses space O(log t / ε) and decides if some subset of the input stream adds up to a value in the range {(1 ± ϵ)t}. Using this algorithm, we design space-efficient fully polynomial-time approximation schemes (FPTAS) solving the search and optimization versions of SubsetSum. Our algorithms run in O(1 / ϵ m2) time and O(1 / ϵ) space on unit-cost RAMs, where 1 + ϵ is the approximation factor. This implies constant space quadratic time FPTAS on unit-cost RAMs when ϵ is a constant. Previous FPTAS used space linear in m. In addition, we show that on certain inputs, when a solution is located within a short prefix of the input sequence, our algorithms may run in sublinear time. We apply our techniques to the problem of finding balanced separators, and we extend our results to some other variants of the more general knapsack problem. When the input numbers are encoded in unary, the decision version has been known to be in log space. We give streaming space lower and upper bounds for unary SubsetSum (USS). If the input length is N when the numbers are encoded in unary, we show that randomized s-pass streaming algorithms for exact SubsetSum need space Ω (√N/s) and give a simple deterministic two-pass streaming algorithm using O(√N log N) space. Finally, we formulate an encoding under which USS is monotone and show that the exact and approximate versions in this formulation have monotone O(log2t) depth Boolean circuits. We also show that any circuit using ε-approximator gates for SubsetSum under this encoding needs Ω(n/logn) gates to compute the disjointness function.","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132289049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-Party Protocols, Information Complexity and Privacy 多方协议,信息复杂性和隐私
Pub Date : 2016-06-22 DOI: 10.1145/3313230
Iordanis Kerenidis, A. Rosén, Florent Urrutia
We introduce a new information-theoretic measure, which we call Public Information Complexity (PIC), as a tool for the study of multi-party computation protocols, and of quantities such as their communication complexity, or the amount of randomness they require in the context of information-theoretic private computations. We are able to use this measure directly in the natural asynchronous message-passing peer-to-peer model and show a number of interesting properties and applications of our new notion: The Public Information Complexity is a lower bound on the Communication Complexity and an upper bound on the Information Complexity; the difference between the Public Information Complexity and the Information Complexity provides a lower bound on the amount of randomness used in a protocol; any communication protocol can be compressed to its Public Information Cost; and an explicit calculation of the zero-error Public Information Complexity of the k-party, n-bit Parity function, where a player outputs the bitwise parity of the inputs. The latter result also establishes that the amount of randomness needed by a private protocol that computes this function is Ω (n).
我们引入了一种新的信息论度量,我们称之为公共信息复杂性(PIC),作为研究多方计算协议的工具,以及它们的通信复杂性或它们在信息论私有计算环境中所需的随机性量。我们能够在自然异步消息传递的点对点模型中直接使用这一度量,并展示了我们的新概念的一些有趣的特性和应用:公共信息复杂性是通信复杂性的下界和信息复杂性的上界;公共信息复杂度和信息复杂度之间的差异提供了协议中使用的随机性量的下限;任何通信协议都可以压缩到其公共信息成本;以及明确计算k方的零错误公共信息复杂性,n位奇偶校验函数,其中玩家输出输入的按位奇偶校验。后一个结果还确定了计算此函数的私有协议所需的随机性量为Ω (n)。
{"title":"Multi-Party Protocols, Information Complexity and Privacy","authors":"Iordanis Kerenidis, A. Rosén, Florent Urrutia","doi":"10.1145/3313230","DOIUrl":"https://doi.org/10.1145/3313230","url":null,"abstract":"We introduce a new information-theoretic measure, which we call Public Information Complexity (PIC), as a tool for the study of multi-party computation protocols, and of quantities such as their communication complexity, or the amount of randomness they require in the context of information-theoretic private computations. We are able to use this measure directly in the natural asynchronous message-passing peer-to-peer model and show a number of interesting properties and applications of our new notion: The Public Information Complexity is a lower bound on the Communication Complexity and an upper bound on the Information Complexity; the difference between the Public Information Complexity and the Information Complexity provides a lower bound on the amount of randomness used in a protocol; any communication protocol can be compressed to its Public Information Cost; and an explicit calculation of the zero-error Public Information Complexity of the k-party, n-bit Parity function, where a player outputs the bitwise parity of the inputs. The latter result also establishes that the amount of randomness needed by a private protocol that computes this function is Ω (n).","PeriodicalId":198744,"journal":{"name":"ACM Transactions on Computation Theory (TOCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
ACM Transactions on Computation Theory (TOCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1