首页 > 最新文献

Proceedings 16th Annual IEEE Conference on Computational Complexity最新文献

英文 中文
Bounded query functions with limited output bits 具有有限输出位的有限查询函数
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933876
Richard Chang, J. Squire
The paper explores the difference between parallel and serial queries to an NP-complete oracle, SAT, from the perspective of functions with a limited number of output bits. For polynomial-time bounded query language classes, which can be considered as functions with 1 bit output, previous work has shown that 2 serial queries to SAT is equivalent to 3 parallel queries to SAT. In contrast, for function classes with no limit on the number of output bits, previous work has shown that there exists a function that can be computed in polynomial time using 3 parallel queries to SAT, but cannot be computed using 2 serial queries to SAT, unless P=NP. The results show that there exists a function with 2 bit output that can be computed using 3 parallel queries to SAT, but cannot be computed using 2 serial queries to SAT, unless the polynomial hierarchy collapses.
本文从具有有限输出位的函数的角度探讨了对np完全oracle (SAT)的并行查询和串行查询之间的区别。多项式时间有限的查询语言类的,可以认为是与1位输出功能,以前的工作表明,2串行查询坐在相当于3并行查询来坐。相比之下,函数类的数量没有限制输出位,先前的研究已经表明,存在一个函数,可以在多项式时间内计算使用3并行查询来坐,但不能计算使用2串行查询来坐,除非P = NP。结果表明,存在一个具有2位输出的函数,该函数可以使用对SAT的3个并行查询来计算,但不能使用对SAT的2个串行查询来计算,除非多项式层次结构崩溃。
{"title":"Bounded query functions with limited output bits","authors":"Richard Chang, J. Squire","doi":"10.1109/CCC.2001.933876","DOIUrl":"https://doi.org/10.1109/CCC.2001.933876","url":null,"abstract":"The paper explores the difference between parallel and serial queries to an NP-complete oracle, SAT, from the perspective of functions with a limited number of output bits. For polynomial-time bounded query language classes, which can be considered as functions with 1 bit output, previous work has shown that 2 serial queries to SAT is equivalent to 3 parallel queries to SAT. In contrast, for function classes with no limit on the number of output bits, previous work has shown that there exists a function that can be computed in polynomial time using 3 parallel queries to SAT, but cannot be computed using 2 serial queries to SAT, unless P=NP. The results show that there exists a function with 2 bit output that can be computed using 3 parallel queries to SAT, but cannot be computed using 2 serial queries to SAT, unless the polynomial hierarchy collapses.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Logical operations and Kolmogorov complexity. II 逻辑运算和柯尔莫哥洛夫复杂度。2
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933892
A. Muchnik, N. Vereshchagin
For Part I, see Theoretical Computer Science (to be published). Investigates the Kolmogorov complexity of the problem (a/spl rarr/c)/spl and/(b/spl rarr/d), defined as the minimum length of a program that, given a, outputs c and, given b, outputs d. We prove that, unlike all known problems of this kind, its complexity is not expressible in terms of the Kolmogorov complexity of a, b, c and d, their pairs, triples, etc. This solves the problem posed in Part I. We then consider the following theorem: there are two strings, whose mutual information is large but which have no common information in a strong sense. This theorem was proven by A. Muchnik et al. (1999) via a non-constructive argument. We present a constructive proof, thus solving a problem posed by Muchnik et al. We give also an interpretation of both results in terms of Shannon entropy.
第一部分,见理论计算机科学(即将出版)。研究问题(a/spl rarr/c)/spl和/(b/spl rarr/d)的Kolmogorov复杂度,定义为给定a输出c和给定b输出d的程序的最小长度。我们证明,与所有已知的此类问题不同,它的复杂度不能用a、b、c和d及其对、三元组等的Kolmogorov复杂度来表示。这就解决了第一部分提出的问题。然后我们考虑以下定理:存在两个字符串,它们的互信息很大,但在强意义上没有共同信息。a . Muchnik等人(1999)通过非建设性论证证明了这一定理。我们提出了一个建设性的证明,从而解决了Muchnik等人提出的问题。我们还根据香农熵给出了这两个结果的解释。
{"title":"Logical operations and Kolmogorov complexity. II","authors":"A. Muchnik, N. Vereshchagin","doi":"10.1109/CCC.2001.933892","DOIUrl":"https://doi.org/10.1109/CCC.2001.933892","url":null,"abstract":"For Part I, see Theoretical Computer Science (to be published). Investigates the Kolmogorov complexity of the problem (a/spl rarr/c)/spl and/(b/spl rarr/d), defined as the minimum length of a program that, given a, outputs c and, given b, outputs d. We prove that, unlike all known problems of this kind, its complexity is not expressible in terms of the Kolmogorov complexity of a, b, c and d, their pairs, triples, etc. This solves the problem posed in Part I. We then consider the following theorem: there are two strings, whose mutual information is large but which have no common information in a strong sense. This theorem was proven by A. Muchnik et al. (1999) via a non-constructive argument. We present a constructive proof, thus solving a problem posed by Muchnik et al. We give also an interpretation of both results in terms of Shannon entropy.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"55 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Separation of NP-completeness notions np完备性概念的分离
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933875
A. Pavan, A. Selman
We use hypotheses of structural complexity theory to separate various NP-completeness notions. In particular, we introduce a hypothesis from which we describe a set in NP that is /spl les//sub T//sup P/-complete but not /spl les//sub tt//sup P/-complete. We provide fairly thorough analyses of the hypotheses that we introduce.
我们使用结构复杂性理论的假设来分离各种np完备性概念。特别地,我们引入了一个假设,从这个假设中我们描述了一个NP中的集合,它是/spl les//sub T//sup P/-完全,而不是/spl les//sub tt//sup P/-完全。我们对所引入的假设进行了相当彻底的分析。
{"title":"Separation of NP-completeness notions","authors":"A. Pavan, A. Selman","doi":"10.1109/CCC.2001.933875","DOIUrl":"https://doi.org/10.1109/CCC.2001.933875","url":null,"abstract":"We use hypotheses of structural complexity theory to separate various NP-completeness notions. In particular, we introduce a hypothesis from which we describe a set in NP that is /spl les//sub T//sup P/-complete but not /spl les//sub tt//sup P/-complete. We provide fairly thorough analyses of the hypotheses that we introduce.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132311381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Affine projections of symmetric polynomials 对称多项式的仿射投影
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933883
Amir Shpilka
We introduce a new model for computing polynomials-a depth 2 circuit with a symmetric gate at the top and plus gates at the bottom, i.e. the circuit computes a symmetric function in linear functions-S/sub m//sup d/(l/sub 1/, l/sub 2/, ..., l/sub m/) (S/sub m//sup d/ is the d'th elementary symmetric polynomial in m variables, and the l/sub i/'s are linear functions). We refer to this model as the symmetric model. This new model is related to standard models of arithmetic circuits, especially to depth 3 circuits. In particular we show that, in order to improve the results of Shpilka and Wigderson (1999), i.e. to prove super-quadratic lower bounds for depth 3 circuits, one must first prove a super-linear lower bound for the symmetric model. We prove two nontrivial linear lower bounds for our model. The first lower bound is for computing the determinant, and the second is for computing the sum of two monomials. The main technical contribution relates the maximal dimension of linear subspaces on which S/sub m//sup d/ vanishes, and lower bounds to the symmetric model. In particular we show that an answer of the following problem (which is very natural, and of independent interest) will imply lower bounds on symmetric circuits for many polynomials: "what is the maximal dimension of a linear subspace of C/sup m/, on which S/sub m//sup d/ vanishes?" We give two partial solutions to the problem above, each enables us to prove a different lower bound.
我们介绍了一种新的计算多项式的模型——一个深度为2的电路,上面有一个对称门,下面有多个门,即电路在线性函数中计算对称函数s /sub m//sup d/(l/sub 1/, l/sub 2/,…, l/下标m/) (S/下标m//sup d/是包含m个变量的第d个初等对称多项式,l/下标i/' S是线性函数)。我们把这个模型称为对称模型。该模型与算术电路的标准模型,特别是深度电路的标准模型有关。我们特别指出,为了改进Shpilka和Wigderson(1999)的结果,即为了证明深度3电路的超二次下界,必须首先证明对称模型的超线性下界。我们证明了该模型的两个非平凡线性下界。第一个下界是用来计算行列式的,第二个下界是用来计算两个单项式和的。主要的技术贡献涉及S/sub m//sup d/消失的线性子空间的最大维数,以及对称模型的下界。特别地,我们证明了以下问题的答案(这是非常自然的,并且是独立的兴趣)将暗示许多多项式的对称电路的下界:“C/sup m/的线性子空间的最大维数是多少,S/ sup m//sup d/在其上消失?”我们给出了上述问题的两个部分解,每个解都能证明一个不同的下界。
{"title":"Affine projections of symmetric polynomials","authors":"Amir Shpilka","doi":"10.1109/CCC.2001.933883","DOIUrl":"https://doi.org/10.1109/CCC.2001.933883","url":null,"abstract":"We introduce a new model for computing polynomials-a depth 2 circuit with a symmetric gate at the top and plus gates at the bottom, i.e. the circuit computes a symmetric function in linear functions-S/sub m//sup d/(l/sub 1/, l/sub 2/, ..., l/sub m/) (S/sub m//sup d/ is the d'th elementary symmetric polynomial in m variables, and the l/sub i/'s are linear functions). We refer to this model as the symmetric model. This new model is related to standard models of arithmetic circuits, especially to depth 3 circuits. In particular we show that, in order to improve the results of Shpilka and Wigderson (1999), i.e. to prove super-quadratic lower bounds for depth 3 circuits, one must first prove a super-linear lower bound for the symmetric model. We prove two nontrivial linear lower bounds for our model. The first lower bound is for computing the determinant, and the second is for computing the sum of two monomials. The main technical contribution relates the maximal dimension of linear subspaces on which S/sub m//sup d/ vanishes, and lower bounds to the symmetric model. In particular we show that an answer of the following problem (which is very natural, and of independent interest) will imply lower bounds on symmetric circuits for many polynomials: \"what is the maximal dimension of a linear subspace of C/sup m/, on which S/sub m//sup d/ vanishes?\" We give two partial solutions to the problem above, each enables us to prove a different lower bound.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134113134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A linear lower bound on the unbounded error probabilistic communication complexity 无界误差概率通信复杂度的线性下界
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933877
J. Forster
We prove a general lower bound on the complexity of unbounded error probabilistic communication protocols. This result improves on a lower bound for bounded error protocols from Krause (1996). As a simple consequence we get the, to our knowledge, first linear lower bound on the complexity of unbounded error probabilistic communication protocols for the functions defined by Hadamard matrices. We also give an upper bound on the margin of any embedding of a concept class in half spaces.
我们证明了无界错误概率通信协议复杂度的一般下界。这个结果改进了Krause(1996)给出的有界错误协议的下界。作为一个简单的结果,我们得到了,据我们所知,对于由Hadamard矩阵定义的函数,无界误差概率通信协议的复杂度的第一个线性下界。我们还给出了概念类在半空间内任意嵌入的边界的上界。
{"title":"A linear lower bound on the unbounded error probabilistic communication complexity","authors":"J. Forster","doi":"10.1109/CCC.2001.933877","DOIUrl":"https://doi.org/10.1109/CCC.2001.933877","url":null,"abstract":"We prove a general lower bound on the complexity of unbounded error probabilistic communication protocols. This result improves on a lower bound for bounded error protocols from Krause (1996). As a simple consequence we get the, to our knowledge, first linear lower bound on the complexity of unbounded error probabilistic communication protocols for the functions defined by Hadamard matrices. We also give an upper bound on the margin of any embedding of a concept class in half spaces.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132627799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 208
On the complexity of approximating the VC dimension 关于VC维近似的复杂度
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933889
Elchanan Mossel, C. Umans
We study the complexity of approximating the VC dimension of a collection of sets, when the sets are encoded succinctly by a small circuit. We show that this problem is: /spl Sigma//sub 3//sup p/-hard to approximate to within a factor 2-/spl epsiv/ for any /spl epsiv/>0; approximable in A/spl Mscr/ to within a factor 2; and A/spl Mscr/-hard to approximate to within a factor N/sup /spl epsiv// for some constant /spl epsiv/>0. To obtain the /spl Sigma//sub 3//sup 9/-hardness results we solve a randomness extraction problem using list-decodable binary codes; for the positive results we utilize the Sauer-Shelah(-Perles) Lemma. The exact value of /spl epsiv/ in the A/spl Mscr/-hardness result depends on the degree achievable by explicit disperser constructions.
研究了当集合被一个小电路简洁地编码时,逼近集合集合VC维的复杂度。我们证明这个问题是:/spl Sigma//sub 3//sup p/-难以在因子2内近似-/spl epsiv/对于任何/spl epsiv/>0;在A/spl Mscr/中近似于因子2以内;和A/spl Mscr/-难以近似到因子N/sup /spl epsiv//对于某些常数/spl epsiv/>0。为了获得/spl Sigma// sub3 //sup 9/-硬度结果,我们使用列表可解码的二进制码解决了随机抽取问题;对于正结果,我们利用Sauer-Shelah(-Perles)引理。A/spl Mscr/-硬度结果中/spl epsiv/的确切值取决于明确分散剂结构所能达到的程度。
{"title":"On the complexity of approximating the VC dimension","authors":"Elchanan Mossel, C. Umans","doi":"10.1109/CCC.2001.933889","DOIUrl":"https://doi.org/10.1109/CCC.2001.933889","url":null,"abstract":"We study the complexity of approximating the VC dimension of a collection of sets, when the sets are encoded succinctly by a small circuit. We show that this problem is: /spl Sigma//sub 3//sup p/-hard to approximate to within a factor 2-/spl epsiv/ for any /spl epsiv/>0; approximable in A/spl Mscr/ to within a factor 2; and A/spl Mscr/-hard to approximate to within a factor N/sup /spl epsiv// for some constant /spl epsiv/>0. To obtain the /spl Sigma//sub 3//sup 9/-hardness results we solve a randomness extraction problem using list-decodable binary codes; for the positive results we utilize the Sauer-Shelah(-Perles) Lemma. The exact value of /spl epsiv/ in the A/spl Mscr/-hardness result depends on the degree achievable by explicit disperser constructions.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132451056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
On the power of nonlinear secret-sharing 关于非线性秘密共享的力量
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933886
A. Beimel, Y. Ishai
A secret-sharing scheme enables a dealer to distribute a secret among no parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f: {0, 1}/sup n//spl rarr/{0, 1}. A family of secret-sharing schemes is called efficient if the total length of the n shares is polynomial in n. Most previously known secret-sharing schemes belonged to a class of linear schemes, whose complexity coincides with the monotone span program size of their access structure. Prior to this work there was no evidence that nonlinear schemes can be significantly more efficient than linear schemes, and in particular there were no candidates for schemes efficiently realizing access structures which do not lie in NC. The main contribution of this work is the construction of two efficient nonlinear schemes: (1) A scheme with perfect privacy whose access structure is conjectured not to lie in NC; (2) A scheme with statistical privacy whose access structure is conjectured not to lie to P/poly. Another contribution is the study of a class of nonlinear schemes, termed quasi-linear schemes, obtained by composing linear schemes over different fields. We show that while these schemes are possibly (super-polynomially) more powerful than linear schemes, they cannot efficiently realize access structures outside NC.
秘密共享方案使经销商能够在没有任何参与方的情况下分发秘密,这样只有一些预定义的授权参与方能够从他们的共享中重建秘密。授权集的(单调)集合称为存取结构,它用其特征单调函数f: {0,1}/sup n//spl rarr/{0,1}自由识别。如果n个共享的总长度是n的多项式,则称为有效的秘密共享方案族。大多数已知的秘密共享方案属于一类线性方案,其复杂度与其访问结构的单调跨度规划大小一致。在此工作之前,没有证据表明非线性方案比线性方案更有效,特别是没有方案可以有效地实现不在NC中的访问结构。本文的主要贡献是构造了两个有效的非线性格式:(1)一个具有完美隐私的格式,其访问结构被推测不在NC中;(2)一个具有统计隐私的方案,其访问结构被推测为不依赖于P/poly。另一个贡献是研究了一类非线性格式,称为拟线性格式,由不同域上的线性格式组合得到。我们表明,虽然这些方案可能(超多项式)比线性方案更强大,但它们不能有效地实现NC外的访问结构。
{"title":"On the power of nonlinear secret-sharing","authors":"A. Beimel, Y. Ishai","doi":"10.1109/CCC.2001.933886","DOIUrl":"https://doi.org/10.1109/CCC.2001.933886","url":null,"abstract":"A secret-sharing scheme enables a dealer to distribute a secret among no parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f: {0, 1}/sup n//spl rarr/{0, 1}. A family of secret-sharing schemes is called efficient if the total length of the n shares is polynomial in n. Most previously known secret-sharing schemes belonged to a class of linear schemes, whose complexity coincides with the monotone span program size of their access structure. Prior to this work there was no evidence that nonlinear schemes can be significantly more efficient than linear schemes, and in particular there were no candidates for schemes efficiently realizing access structures which do not lie in NC. The main contribution of this work is the construction of two efficient nonlinear schemes: (1) A scheme with perfect privacy whose access structure is conjectured not to lie in NC; (2) A scheme with statistical privacy whose access structure is conjectured not to lie to P/poly. Another contribution is the study of a class of nonlinear schemes, termed quasi-linear schemes, obtained by composing linear schemes over different fields. We show that while these schemes are possibly (super-polynomially) more powerful than linear schemes, they cannot efficiently realize access structures outside NC.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Hausdorff dimension in exponential time 指数时间下的豪斯多夫维数
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933888
K. Ambos-Spies, W. Merkle, Jan Reimann, F. Stephan
In this paper we investigate effective versions of Hausdorff dimension which have been recently introduced by Lutz. We focus on dimension in the class E of sets computable in linear exponential time. We determine the dimension of various classes related to fundamental structural properties including different types of autoreducibility and immunity. By a new general invariance theorem for resource-bounded dimension we show that the class of p-m-complete sets for E has dimension 1 in E. Moreover, we show that there are p-m-lower spans in E of dimension /spl Hscr/(/spl beta/) for any rational /spl beta/ between 0 and 1, where /spl Hscr/(/spl beta/) is the binary entropy function. This leads to a new general completeness notion for E that properly extends Lutz's concept of weak completeness. Finally we characterize resource-bounded dimension in terms of martingales with restricted betting ratios and in terms of prediction functions.
本文研究了最近由卢茨引入的豪斯多夫维数的有效版本。我们关注线性指数时间下可计算集合E类的维数。我们确定了与基本结构性质相关的各种类别的维度,包括不同类型的自约性和免疫。利用一个新的资源有界维数的一般不变性定理,证明了E的p-m完备集类在E中具有1维数,并且证明了在0和1之间的任意有理/spl β /,在E中存在p-m维/spl Hscr/(/spl β /)的下跨,其中/spl Hscr/(/spl β /)是二元熵函数。这导致了E的一个新的一般完备性概念,它适当地扩展了卢茨的弱完备性概念。最后,我们用限制投注比率的鞅和预测函数来描述资源边界维度。
{"title":"Hausdorff dimension in exponential time","authors":"K. Ambos-Spies, W. Merkle, Jan Reimann, F. Stephan","doi":"10.1109/CCC.2001.933888","DOIUrl":"https://doi.org/10.1109/CCC.2001.933888","url":null,"abstract":"In this paper we investigate effective versions of Hausdorff dimension which have been recently introduced by Lutz. We focus on dimension in the class E of sets computable in linear exponential time. We determine the dimension of various classes related to fundamental structural properties including different types of autoreducibility and immunity. By a new general invariance theorem for resource-bounded dimension we show that the class of p-m-complete sets for E has dimension 1 in E. Moreover, we show that there are p-m-lower spans in E of dimension /spl Hscr/(/spl beta/) for any rational /spl beta/ between 0 and 1, where /spl Hscr/(/spl beta/) is the binary entropy function. This leads to a new general completeness notion for E that properly extends Lutz's concept of weak completeness. Finally we characterize resource-bounded dimension in terms of martingales with restricted betting ratios and in terms of prediction functions.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115025635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Lower bounds for approximations by low degree polynomials over Z/sub m/ Z/下标m/上的低次多项式近似的下界
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933885
N. Alon, R. Beigel
We use a Ramsey-theoretic argument to obtain the first lower bounds for approximations over Z/sub m/ by nonlinear polynomials: (i) A degree-2 polynomial over Z/sub m/ (m odd) must differ from the parity function on at least a 1/2-1/2((log n)/sup /spl Omega/(1)/) fraction of all points in the Boolean n-cube. A degree-O(1) polynomial over Z/sub m/ (m odd) must differ from the parity function on at least a 1/2-o(1) fraction of all points in the Boolean n-cube. These nonapproximability results imply the first known lower bounds on the top fanin of MAJoMOD/sub m/oAND/sub O(1)/ circuits (i.e., circuits with a single majority-gate at the output node, MOD/sub m/-gates at the middle level, and constant-fanin AND-gates at the input level) that compute parity: (i) MAJoMOD/sub m/oAND/sub 2/ circuits that compute parity must have top fanin 2((log n)/sup /spl Omega/(1)/). (ii) Parity cannot be computed by MAJoMODmoAND/sub O(1)/ circuits with top fanin O(1). Similar results hold for the MOD/sub q/ function as well.
我们使用ramsey理论论证来获得非线性多项式在Z/sub m/上近似的第一下界:(i)在Z/sub m/ (m奇数)上的2次多项式必须与奇偶函数至少在布尔n立方中所有点的1/2-1/2((log n)/sup /spl Omega/(1)/)分数上不同。在Z/下标m/ (m奇数)上的o(1)次多项式必须在布尔n立方中所有点的至少1/2-o(1)个分数上与奇偶校验函数不同。这些非近似性结果意味着计算奇偶性的MAJoMOD/sub m/oAND/sub O(1)/电路(即输出节点具有单个多数门,中间电平具有MOD/sub m/-门,输入电平具有恒定fanin and门的电路)的顶部fanin的第一个已知下界:(i)计算奇偶性的MAJoMOD/sub m/oAND/sub 2/电路必须具有顶部fanin 2((log n)/sup /spl Omega/(1)/)。(ii)通过MAJoMODmoAND/sub O(1)/ top fanin O(1)电路无法计算奇偶校验。类似的结果也适用于MOD/ subq /函数。
{"title":"Lower bounds for approximations by low degree polynomials over Z/sub m/","authors":"N. Alon, R. Beigel","doi":"10.1109/CCC.2001.933885","DOIUrl":"https://doi.org/10.1109/CCC.2001.933885","url":null,"abstract":"We use a Ramsey-theoretic argument to obtain the first lower bounds for approximations over Z/sub m/ by nonlinear polynomials: (i) A degree-2 polynomial over Z/sub m/ (m odd) must differ from the parity function on at least a 1/2-1/2((log n)/sup /spl Omega/(1)/) fraction of all points in the Boolean n-cube. A degree-O(1) polynomial over Z/sub m/ (m odd) must differ from the parity function on at least a 1/2-o(1) fraction of all points in the Boolean n-cube. These nonapproximability results imply the first known lower bounds on the top fanin of MAJoMOD/sub m/oAND/sub O(1)/ circuits (i.e., circuits with a single majority-gate at the output node, MOD/sub m/-gates at the middle level, and constant-fanin AND-gates at the input level) that compute parity: (i) MAJoMOD/sub m/oAND/sub 2/ circuits that compute parity must have top fanin 2((log n)/sup /spl Omega/(1)/). (ii) Parity cannot be computed by MAJoMODmoAND/sub O(1)/ circuits with top fanin O(1). Similar results hold for the MOD/sub q/ function as well.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
On separators, segregators and time versus space 关于分隔器,分隔器和时间与空间
Pub Date : 2001-06-18 DOI: 10.1109/CCC.2001.933895
R. Santhanam
Gives an extension of the result due to Paul, Pippenger, Szemeredi and Trotter (1983) that deterministic linear time (DTIME) is distinct from nondeterministic linear time (NTIME). We show that NTIME[n/spl radic/log*(n)] /spl ne/ DTIME[n/spl radic/log*(n)]. We show that if the class of multi-pushdown graphs has {o(n), o[n/log(n)]} segregators, then NTIME[n log(n)] /spl ne/ DTIME[n log(n)]. We also show that at least one of the following facts holds: (1) P /spl ne/ L, and (2) for all polynomially bounded constructible time bounds t, NTIME(t) /spl ne/ DTIME(t). We consider the problem of whether NTIME(t) is distinct from NSPACE(t) for constructible time bounds t. A pebble game on graphs is defined such that the existence of a "good" strategy for the pebble game on multi-pushdown graphs implies a "good" simulation of nondeterministic time-bounded machines by nondeterministic space-bounded machines. It is shown that there exists a "good" strategy for the pebble game on multi-pushdown graphs if the graphs have sublinear separators. Finally, we show that nondeterministic time-bounded Turing machines can be simulated by /spl Sigma//sub 4/ machines with an asymptotically smaller time bound, under the assumption that the class of multi-pushdown graphs has sublinear separators.
对Paul、Pippenger、Szemeredi和Trotter(1983)关于确定性线性时间(DTIME)区别于非确定性线性时间(NTIME)的结论进行了推广。我们证明了NTIME[n/spl radic/log*(n)] /spl ne/ DTIME[n/spl radic/log*(n)]。我们证明了如果多下推图类有{o(n), o[n/log(n)]}个分离器,那么NTIME[n log(n)] /spl ne/ DTIME[n log(n)]。我们还证明了以下至少一个事实成立:(1)P /spl ne/ L,(2)对于所有多项式有界的可构造时间界t, NTIME(t) /spl ne/ DTIME(t)。对于可构造的时间边界t,我们考虑NTIME(t)是否与NSPACE(t)不同的问题。定义了图上的一个卵石博弈,使得多下推图上卵石博弈的“好”策略的存在意味着非确定性空间有界机器对非确定性时间有界机器的“好”模拟。证明了在具有次线性分隔符的多下推图上,存在一个“好”的卵石博弈策略。最后,在假定多下推图类具有次线性分隔符的情况下,我们证明了具有渐近小时间界的/spl Sigma//sub - 4/机器可以模拟非确定性有界图灵机。
{"title":"On separators, segregators and time versus space","authors":"R. Santhanam","doi":"10.1109/CCC.2001.933895","DOIUrl":"https://doi.org/10.1109/CCC.2001.933895","url":null,"abstract":"Gives an extension of the result due to Paul, Pippenger, Szemeredi and Trotter (1983) that deterministic linear time (DTIME) is distinct from nondeterministic linear time (NTIME). We show that NTIME[n/spl radic/log*(n)] /spl ne/ DTIME[n/spl radic/log*(n)]. We show that if the class of multi-pushdown graphs has {o(n), o[n/log(n)]} segregators, then NTIME[n log(n)] /spl ne/ DTIME[n log(n)]. We also show that at least one of the following facts holds: (1) P /spl ne/ L, and (2) for all polynomially bounded constructible time bounds t, NTIME(t) /spl ne/ DTIME(t). We consider the problem of whether NTIME(t) is distinct from NSPACE(t) for constructible time bounds t. A pebble game on graphs is defined such that the existence of a \"good\" strategy for the pebble game on multi-pushdown graphs implies a \"good\" simulation of nondeterministic time-bounded machines by nondeterministic space-bounded machines. It is shown that there exists a \"good\" strategy for the pebble game on multi-pushdown graphs if the graphs have sublinear separators. Finally, we show that nondeterministic time-bounded Turing machines can be simulated by /spl Sigma//sub 4/ machines with an asymptotically smaller time bound, under the assumption that the class of multi-pushdown graphs has sublinear separators.","PeriodicalId":240268,"journal":{"name":"Proceedings 16th Annual IEEE Conference on Computational Complexity","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127314528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
Proceedings 16th Annual IEEE Conference on Computational Complexity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1