+ All Categories
Home > Documents > Fall 2013 CMU CS 15-855 Computational Complexity

Fall 2013 CMU CS 15-855 Computational Complexity

Date post: 16-Feb-2016
Category:
Upload: lamya
View: 38 times
Download: 0 times
Share this document with a friend
Description:
Fall 2013 CMU CS 15-855 Computational Complexity. Definition of SL, circuits – non-uniformity. Lecture 6. These slides are mostly a resequencing of Chris Umans ’ slides From CS 151: Complexity Theory (Spring 2013) at CalTech . Last time. Savitch’s Theorem : - PowerPoint PPT Presentation
47
Fall 2013 CMU CS 15- 855 Computational Complexity Lecture 6 efinition of SL, circuits – non-unifor se slides are mostly a resequencing of Chris Umans’ slides m CS 151: Complexity Theory (Spring 2013) at CalTech. 9/26/2013
Transcript
Page 1: Fall 2013 CMU CS 15-855 Computational Complexity

Fall 2013 CMU CS 15-855Computational Complexity

Lecture 6

Definition of SL, circuits – non-uniformity..

These slides are mostly a resequencing of Chris Umans’ slides From CS 151: Complexity Theory (Spring 2013) at CalTech.

9/26/2013

Page 2: Fall 2013 CMU CS 15-855 Computational Complexity

Last time

Savitch’s Theorem: STCONN SPACE(log2 n)• Corollary: NL SPACE(log2n)• Corollary: NPSPACE = PSPACEImmerman/Szelepscényi ’87/’88:

NL = coNLopen question:

NL = L?9/26/2013

Page 3: Fall 2013 CMU CS 15-855 Computational Complexity

Savitch’s Theorem

Theorem: STCONN SPACE(log2 n)

• Corollary: NL SPACE(log2n)

• Corollary: NPSPACE = PSPACE

9/24/2013

Page 4: Fall 2013 CMU CS 15-855 Computational Complexity

Proof of Theorem– input: G = (V, E), two nodes s and t– recursive algorithm:

/* return true iff path from x to y of length at most 2i */PATH(x, y, i) if i = 0 return ( x = y or (x, y) E ) /* base case */ for z in V if PATH(x, z, i-1) and PATH(z, y, i-1) return(true); return(false);end

9/24/2013

Page 5: Fall 2013 CMU CS 15-855 Computational Complexity

Proof of Theorem– answer to STCONN: PATH(s, t, log n)– space used:

• (depth of recursion) x (size of “stack record”)– depth = log n– claim stack record: “(x, y, i)” sufficient

• size O(log n)– when return from PATH(a, b, i) can figure out

what to do next from record (a, b, i) and previous record

9/24/2013

Page 6: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem

Theorem: ST-NON-CONN NL• Proof: slightly tricky setup:

– input: G = (V, E), two nodes s, t

t

s“yes”

t

s“no”

9/26/2013

Page 7: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem– observation: given count of # nodes

reachable from s, can solve problem• for each v V, guess if it is reachable• if yes, guess path from s to v

– if guess doesn’t lead to v, reject. – if v = t, reject. – else counter++

• if counter = count accept

9/26/2013

Page 8: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem– R(i) = # nodes reachable from s in at most i

steps– R(0) = 1: node s

– we will compute R(i+1) from R(i) using O(log n) space and nondeterminism

– computation paths with “bad guesses” all lead to reject

9/26/2013

Page 9: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem– Outline: in n phases, compute

R(1), R(2), R(3), … R(n) – only O(log n) bits of storage between phases– in end, lots of computation paths that lead to

reject– only computation paths that survive have

computed correct value of R(n)– apply observation.

9/26/2013

Page 10: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem– computing R(i+1) from R(i):

– Initialize R(i+1) = 0– For each v V, guess if v reachable from s in

at most i+1 steps

R(i) = R(2) = 6

9/26/2013

Page 11: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem– if “yes”, guess path from s to v of at most i+1

steps. Increment R(i+1)– if “no”, visit R(i) nodes reachable in at most i

steps, check that none is v or adjacent to v• for u V guess if reachable in ≤ i steps;

guess path to u; counter++• KEY: if counter ≠ R(i), reject• at this point: can be sure v not reachable

9/26/2013

Page 12: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem

• correctness of procedure:• two types of errors we can make • (1) might guess v is reachable in at most

i+1 steps when it is not– won’t be able to guess path from s to v of

correct length, so we will reject.

“easy” type of error

9/26/2013

Page 13: Fall 2013 CMU CS 15-855 Computational Complexity

I-S Theorem• (2) might guess v is not reachable in at

most i+1 steps when it is – then must not see v or neighbor of v while

visiting nodes reachable in i steps.– but forced to visit R(i) distinct nodes– therefore must try to visit node v that is not

reachable in ≤ i steps– won’t be able to guess path from s to v of

correct length, so we will reject.“easy” type of error9/26/2013

Page 14: Fall 2013 CMU CS 15-855 Computational Complexity

Undirect STConnectivity?USTCONN

• GEM result of Omer Reingold:

• USTCONN is in LOGSPAACE

• Complete for SL • SL NTM that are reversible – any legal

transition might be undone in the next move.

9/26/2013

Page 15: Fall 2013 CMU CS 15-855 Computational Complexity

Introduction

Power from an unexpected source?• we know P ≠ EXP, which implies no poly-

time algorithm for Succinct CVAL • poly-size Boolean circuits for Succinct

CVAL ??

Does NP have linear-size, log-depth Boolean circuits ??

9/26/2013

Page 16: Fall 2013 CMU CS 15-855 Computational Complexity

Outline

• Boolean circuits and formulas

• uniformity and advice

• the NC hierarchy and parallel computation

• the quest for circuit lower bounds

• a lower bound for formulas

9/26/2013

Page 17: Fall 2013 CMU CS 15-855 Computational Complexity

Boolean circuits

• C computes function f:{0,1}n {0,1} in natural way – identify C with function f it computes

• circuit C– directed acyclic graph– nodes: AND (); OR ();

NOT (); variables xi

x1 x2

x3 … xn

9/26/2013

Page 18: Fall 2013 CMU CS 15-855 Computational Complexity

Boolean circuits

• size = # gates• depth = longest path from input to output• formula (or expression): graph is a tree

• every function f:{0,1}n {0,1} computable by a circuit of size at most O(n2n)

– AND of n literals for each x such that f(x) = 1– OR of up to 2n such terms

9/26/2013

Page 19: Fall 2013 CMU CS 15-855 Computational Complexity

Circuit families

• circuit works for specific input length• we’re used to f:∑*! {0,1}• circuit family : a circuit for each input

length C1, C2, C3, … = “{Cn}”• “{Cn} computes f” iff for all x

C|x|(x) = f(x)• “{Cn} decides L”, where L is the language

associated with f 9/26/2013

Page 20: Fall 2013 CMU CS 15-855 Computational Complexity

Connection to TMs

• given TM M running in time t(n) decides language L

• can build circuit family {Cn} that decides L – size of Cn = O(t(n)2)– Proof: CVAL construction

• Conclude: L P implies family of polynomial-size circuits that decides L

9/26/2013

Page 21: Fall 2013 CMU CS 15-855 Computational Complexity

Connection to TMs

• other direction?

• A poly-size circuit family:– Cn = (x1 x1) if Mn halts– Cn = (x1 x1) if Mn loops

• decides (unary version of) HALT!• oops…9/26/2013

Page 22: Fall 2013 CMU CS 15-855 Computational Complexity

Uniformity

• Strange aspect of circuit family:– can “encode” (potentially uncomputable)

information in family specification• solution: uniformity – require specification

is simple to computeDefinition: circuit family {Cn} is logspace

uniform iff TM M outputs Cn on input 1n and runs in O(log n) space

9/26/2013

Page 23: Fall 2013 CMU CS 15-855 Computational Complexity

Uniformity

Theorem: P = languages decidable by logspace uniform, polynomial-size circuit families {Cn}.

• Proof:– already saw ()– () on input x, generate C|x|, evaluate it and

accept iff output = 1

9/26/2013

Page 24: Fall 2013 CMU CS 15-855 Computational Complexity

TMs that take advice

• family {Cn} without uniformity constraint is called “non-uniform”

• regard “non-uniformity” as a limited resource just like time, space, as follows:– add read-only “advice” tape to TM M– M “decides L with advice A(n)” iff

M(x, A(|x|)) accepts x L– note: A(n) depends only on |x|

9/26/2013

Page 25: Fall 2013 CMU CS 15-855 Computational Complexity

TMs that take advice

• Definition: TIME(t(n))/f(n) = the set of those languages L for which: – there exists A(n) s.t. |A(n)| ≤ f(n)–TM M decides L with advice A(n) in time

t(n)• most important such class:

P/poly = k TIME(nk)/nk

9/26/2013

Page 26: Fall 2013 CMU CS 15-855 Computational Complexity

TMs that take advice

Theorem: L P/poly iff L decided by family of (non-uniform) polynomial size circuits.

• Proof:– () Cn from CVAL construction; hardwire

advice A(n)– () define A(n) = description of Cn; on input x,

TM simulates C|x|(x)

9/26/2013

Page 27: Fall 2013 CMU CS 15-855 Computational Complexity

Approach to P/NP

• Believe NP P– equivalent: “NP does not have uniform,

polynomial-size circuits” • Even believe NP P/poly

– equivalent: “NP (or, e.g. SAT) does not have polynomial-size circuits”

– implies P ≠ NP– many believe: best hope for P ≠ NP

9/26/2013

Page 28: Fall 2013 CMU CS 15-855 Computational Complexity

Parallelism

• uniform circuits allow refinement of polynomial time:

circuit C

depth parallel time

size parallel work

9/26/2013

Page 29: Fall 2013 CMU CS 15-855 Computational Complexity

Parallelism

• the NC (“Nick’s Class”) Hierarchy (of logspace uniform circuits):

NCk = O(logk n) depth, poly(n) sizeNC = k NCk

• captures “efficiently parallelizable problems”

• not realistic? overly generous• OK for proving non-parallelizable9/26/2013

Page 30: Fall 2013 CMU CS 15-855 Computational Complexity

Matrix Multiplication

• what is the parallel complexity of this problem?– work = poly(n) – time = logk(n)? (which k?)

n x n matrix A

n x n matrix B =

n x n matrix AB

9/26/2013

Page 31: Fall 2013 CMU CS 15-855 Computational Complexity

Matrix Multiplication

• two details– arithmetic matrix multiplication…

A = (ai, k) B = (bk, j) (AB)i,j = Σk (ai,k x bk, j)

… vs. Boolean matrix multiplication:A = (ai, k) B = (bk, j) (AB)i,j = k (ai,k bk, j)

– single output bit: to make matrix multiplication a language: on input A, B, (i, j) output (AB)i,j

9/26/2013

Page 32: Fall 2013 CMU CS 15-855 Computational Complexity

Matrix Multiplication

• Boolean Matrix Multiplication is in NC1

– level 1: compute n ANDS: ai,k bk, j

– next log n levels: tree of ORS

– n2 subtrees for all pairs (i, j)– select correct one and output

9/26/2013

Page 33: Fall 2013 CMU CS 15-855 Computational Complexity

Boolean formulas and NC1

• Previous circuit is actually a formula. This is no accident:

Theorem: L NC1 iff decidable by polynomial-size uniform family of Boolean formulas.

Note: we measure formula size by leaf-size.9/26/2013

Page 34: Fall 2013 CMU CS 15-855 Computational Complexity

Boolean formulas and NC1

• Proof: – () convert NC1 circuit into formula

• recursively:

• note: logspace transformation (stack depth log n, stack record 1 bit – “left” or “right”)

9/26/2013

Page 35: Fall 2013 CMU CS 15-855 Computational Complexity

Boolean formulas and NC1

– () convert formula of size n into formula of depth O(log n) • note: size ≤ 2depth, so new formula has

poly(n) size

D

C C1

1

C0

0

D

D

key transformation

9/26/2013

Page 36: Fall 2013 CMU CS 15-855 Computational Complexity

Boolean formulas and NC1

– D any minimal subtree with size at least n/3 • implies size(D) ≤ 2n/3

– define T(n) = maximum depth required for any size n formula

– C1, C0, D all size ≤ 2n/3T(n) ≤ T(2n/3) + 3

implies T(n) ≤ O(log n)

9/26/2013

Page 37: Fall 2013 CMU CS 15-855 Computational Complexity

Relation to other classes

• Clearly NCµ P– recall P uniform poly-size circuits

• NC1 µ L– on input x, compose logspace algorithms for:

• generating C|x|

• converting to formula• FVAL

9/26/2013

Page 38: Fall 2013 CMU CS 15-855 Computational Complexity

Relation to other classes• NL µ NC2: S-T-CONN NC2

– given G = (V, E), vertices s, t– A = adjacency matrix (with self-loops)– (A2)i, j = 1 iff path of length ≤ 2 from node i to

node j– (An)i, j = 1 iff path of length ≤ n from node i to

node j– compute with depth log n tree of Boolean

matrix multiplications, output entry s, t – log2 n depth total

9/26/2013

Page 39: Fall 2013 CMU CS 15-855 Computational Complexity

S-T-CONN NC2

• G = (V, E), vertices s, t– A = adjacency matrix (with self-loops)– (A2)i, j = 1 iff path of length ≤ 2 from node i to

node j– (An)i, j = 1 iff path of length ≤ n from node i to

node j

– Boolean Matrix Squaring NC1– SQUARE A logn times. – A -> A2 -> A4 -> A8 -> … -> -> An

9/26/2013

Page 40: Fall 2013 CMU CS 15-855 Computational Complexity

Repeated Squaring of a matrix is isomorphic to Savitch’s algorithm.

– Boolean Matrix Squaring L– SQUARE A logn times. – A -> A2 -> A4 -> A8 -> … -> -> An

A has rows and columns given by all the possible configurations of logspace machine on a fixed input with a 1 iff configi and configj are equal or one legal transition apart.

9/26/2013

Page 41: Fall 2013 CMU CS 15-855 Computational Complexity

NC vs. P• can every efficient algorithm be efficiently

parallelized?

NC = P• P-complete problems least-likely to be

parallelizable– if P-complete problem is in NC, then P = NC – Why?

we use logspace reductions to show problem P-complete; L in NC

?

9/26/2013

Page 42: Fall 2013 CMU CS 15-855 Computational Complexity

NC vs. P• can every uniform, poly-size Boolean

circuit family be converted into a uniform, poly-size Boolean formula family?

NC1 = P?

9/26/2013

Page 43: Fall 2013 CMU CS 15-855 Computational Complexity

NC Hierarchy Collapse

NC1 µ NC2 µ NC3 µ NC4 µ … µ NC

Exerciseif NCi = NCi+1, then NC = NCi

(prove for non-uniform versions of classes)

9/26/2013

Page 44: Fall 2013 CMU CS 15-855 Computational Complexity

Lower bounds

• Recall: “NP does not have polynomial-size circuits” (NP P/poly) implies P ≠ NP

• major goal: prove lower bounds on (non-uniform) circuit size for problems in NP– believe exponential – super-polynomial enough for P ≠ NP – best bound known: 4.5n– don’t even have super-polynomial bounds for

problems in NEXP9/26/2013

Page 45: Fall 2013 CMU CS 15-855 Computational Complexity

Shannon’s counting argument

• frustrating fact: almost all functions require huge circuits

Theorem (Shannon): With probability at least 1 – o(1), a random function

f:{0,1}n {0,1} requires a circuit of size Ω(2n/n).

9/26/2013

Page 46: Fall 2013 CMU CS 15-855 Computational Complexity

Shannon’s counting argument

• Proof (counting):– B(n) = 22n = # functions f:{0,1}n {0,1} – # circuits with n inputs + size s, is at most

C(n, s) ≤ ((n+3)s2)s

s gates

n+3 gate types 2 inputs per gate

9/26/2013

Page 47: Fall 2013 CMU CS 15-855 Computational Complexity

Shannon’s counting argument

–C(n, c2n/n) < ((2n)c222n/n2)(c2n/n)

< o(1)22c2n

< o(1)22n (if c ≤ ½)

–probability a random function has a circuit of size s = (½)2n/n is at most

C(n, s)/B(n) < o(1)

C(n, s) ≤ ((n+3)s2)s

9/26/2013


Recommended