Results 11 - 20
of
144
Monotone Circuits for Matching Require Linear Depth
"... We prove that monotone circuits computing the perfect matching function on n-vertex graphs require\Omega\Gamma n) depth. This implies an exponential gap between the depth of monotone and nonmonotone circuits. ..."
Abstract
-
Cited by 82 (10 self)
- Add to MetaCart
We prove that monotone circuits computing the perfect matching function on n-vertex graphs require\Omega\Gamma n) depth. This implies an exponential gap between the depth of monotone and nonmonotone circuits.
Lower Bounds for Cutting Planes Proofs with Small Coefficients
, 1995
"... We consider small-weight Cutting Planes (CP ) proofs; that is, Cutting Planes (CP ) proofs with coefficients up to P oly(n). We use the well known lower bounds for monotone complexity to prove an exponential lower bound for the length of CP proofs, for a family of tautologies based on the cl ..."
Abstract
-
Cited by 76 (16 self)
- Add to MetaCart
We consider small-weight Cutting Planes (CP ) proofs; that is, Cutting Planes (CP ) proofs with coefficients up to P oly(n). We use the well known lower bounds for monotone complexity to prove an exponential lower bound for the length of CP proofs, for a family of tautologies based on the clique function. Because Resolution is a special case of smallweight CP , our method also gives a new and simpler exponential lower bound for Resolution. We also prove the following two theorems : (1) Tree-like CP proofs cannot polynomially simulate non-tree-like CP proofs. (2) Tree-like CP proofs and Bounded-depth-Frege proofs cannot polynomially simulate each other. Our proofs also work for some generalizations of the CP proof system. In particular, they work for CP with a deduction rule, and also for proof systems that allow any formula with small communication complexity, and any set of sound rules of inference. 1 Introduction One of the most fundamental questions in pro...
The History and Status of the P versus NP Question
, 1992
"... this article, I have attempted to organize and describe this literature, including an occasional opinion about the most fruitful directions, but no technical details. In the first half of this century, work on the power of formal systems led to the formalization of the notion of algorithm and the re ..."
Abstract
-
Cited by 59 (1 self)
- Add to MetaCart
this article, I have attempted to organize and describe this literature, including an occasional opinion about the most fruitful directions, but no technical details. In the first half of this century, work on the power of formal systems led to the formalization of the notion of algorithm and the realization that certain problems are algorithmically unsolvable. At around this time, forerunners of the programmable computing machine were beginning to appear. As mathematicians contemplated the practical capabilities and limitations of such devices, computational complexity theory emerged from the theory of algorithmic unsolvability. Early on, a particular type of computational task became evident, where one is seeking an object which lies
Unprovability of Lower Bounds on the Circuit Size in Certain Fragments of Bounded Arithmetic
- IN IZVESTIYA OF THE RUSSIAN ACADEMY OF SCIENCE, MATHEMATICS
, 1995
"... We show that if strong pseudorandom generators exist then the statement “α encodes a circuit of size n (log ∗ n) for SATISFIABILITY ” is not refutable in S2 2 (α). For refutation in S1 2 (α), this is proven under the weaker assumption of the existence of generators secure against the attack by smal ..."
Abstract
-
Cited by 57 (6 self)
- Add to MetaCart
(Show Context)
We show that if strong pseudorandom generators exist then the statement “α encodes a circuit of size n (log ∗ n) for SATISFIABILITY ” is not refutable in S2 2 (α). For refutation in S1 2 (α), this is proven under the weaker assumption of the existence of generators secure against the attack by small depth circuits, and for another system which is strong enough to prove exponential lower bounds for constant-depth circuits, this is shown without using any unproven hardness assumptions. These results can be also viewed as direct corollaries of interpolation-like theorems for certain “split versions” of classical systems of Bounded Arithmetic introduced in this paper.
Non-uniform ACC circuit lower bounds
, 2010
"... The class ACC consists of circuit families with constant depth over unbounded fan-in AND, OR, NOT, and MODm gates, where m> 1 is an arbitrary constant. We prove: • NTIME[2 n] does not have non-uniform ACC circuits of polynomial size. The size lower bound can be slightly strengthened to quasi-poly ..."
Abstract
-
Cited by 51 (8 self)
- Add to MetaCart
(Show Context)
The class ACC consists of circuit families with constant depth over unbounded fan-in AND, OR, NOT, and MODm gates, where m> 1 is an arbitrary constant. We prove: • NTIME[2 n] does not have non-uniform ACC circuits of polynomial size. The size lower bound can be slightly strengthened to quasi-polynomials and other less natural functions. • ENP, the class of languages recognized in 2O(n) time with an NP oracle, doesn’t have non-uniform ACC circuits of 2no(1) size. The lower bound gives an exponential size-depth tradeoff: for every d there is a δ> 0 such that ENP doesn’t have depth-d ACC circuits of size 2nδ. Previously, it was not known whether EXP NP had depth-3 polynomial size circuits made out of only MOD6 gates. The high-level strategy is to design faster algorithms for the circuit satisfiability problem over ACC circuits, then prove that such algorithms entail the above lower bounds. The algorithm combines known properties of ACC with fast rectangular matrix multiplication and dynamic programming, while the second step requires a subtle strengthening of the author’s prior work [STOC’10]. Supported by the Josef Raviv Memorial Fellowship.
On Interpolation and Automatization for Frege Systems
, 2000
"... The interpolation method has been one of the main tools for proving lower bounds for propositional proof systems. Loosely speaking, if one can prove that a particular proof system has the feasible interpolation property, then a generic reduction can (usually) be applied to prove lower bounds for the ..."
Abstract
-
Cited by 49 (8 self)
- Add to MetaCart
The interpolation method has been one of the main tools for proving lower bounds for propositional proof systems. Loosely speaking, if one can prove that a particular proof system has the feasible interpolation property, then a generic reduction can (usually) be applied to prove lower bounds for the proof system, sometimes assuming a (usually modest) complexity-theoretic assumption. In this paper, we show that this method cannot be used to obtain lower bounds for Frege systems, or even for TC 0 -Frege systems. More specifically, we show that unless factoring (of Blum integers) is feasible, neither Frege nor TC 0 -Frege has the feasible interpolation property. In order to carry out our argument, we show how to carry out proofs of many elementary axioms/theorems of arithmetic in polynomial size TC 0 -Frege. As a corollary, we obtain that TC 0 -Frege as well as any proof system that polynomially simulates it, is not automatizable (under the assumption that factoring of Blum integ...
Separation of the Monotone NC Hierarchy
, 1999
"... We prove tight lower bounds, of up to n ffl , for the monotone depth of functions in monotone-P. As a result we achieve the separation of the following classes. 1. monotone-NC 6= monotone-P. 2. For every i 1, monotone-NC i 6= monotone-NC i+1 . 3. More generally: For any integer function D( ..."
Abstract
-
Cited by 46 (0 self)
- Add to MetaCart
We prove tight lower bounds, of up to n ffl , for the monotone depth of functions in monotone-P. As a result we achieve the separation of the following classes. 1. monotone-NC 6= monotone-P. 2. For every i 1, monotone-NC i 6= monotone-NC i+1 . 3. More generally: For any integer function D(n), up to n ffl (for some ffl ? 0), we give an explicit example of a monotone Boolean function, that can be computed by polynomial size monotone Boolean circuits of depth D(n), but that cannot be computed by any (fan-in 2) monotone Boolean circuits of depth less than Const \Delta D(n) (for some constant Const). Only a separation of monotone-NC 1 from monotone-NC 2 was previously known. Our argument is more general: we define a new class of communication complexity search problems, referred to below as DART games, and we prove a tight lower bound for the communication complexity of every member of this class. As a result we get lower bounds for the monotone depth of many functions. In...
Superpolynomial lower bounds for monotone span programs
, 1996
"... In this paper we obtain the first superpolynomial lower bounds for monotone span programs computing explicit functions. The best previous lower bound was Ω(n 5/2) by Beimel, Gál, Paterson [BGP]; our proof exploits a general combinatorial lower bound criterion from that paper. Our lower bounds are ba ..."
Abstract
-
Cited by 46 (7 self)
- Add to MetaCart
In this paper we obtain the first superpolynomial lower bounds for monotone span programs computing explicit functions. The best previous lower bound was Ω(n 5/2) by Beimel, Gál, Paterson [BGP]; our proof exploits a general combinatorial lower bound criterion from that paper. Our lower bounds are based on an analysis of Paley-type bipartite graphs via Weil’s character sum estimates. We prove an n Ω(log n / log log n) lower bound for the size of monotone span programs for the clique problem. Our results give the first superpolynomial lower bounds for linear secret sharing schemes. We demonstrate the surprising power of monotone span programs by exhibiting a function computable in this model in linear size while requiring superpolynomial size monotone circuits and exponential size monotone formulae. We also show that the perfect matching function can be computed by polynomial size (non-monotone) span programs over arbitrary fields.
Bounded Arithmetic and Lower Bounds in Boolean Complexity
- Feasible Mathematics II
, 1993
"... We study the question of provability of lower bounds on the complexity of explicitly given Boolean functions in weak fragments of Peano Arithmetic. To that end, we analyze what is the right fragment capturing the kind of techniques existing in Boolean complexity at present. We give both formal and i ..."
Abstract
-
Cited by 43 (5 self)
- Add to MetaCart
(Show Context)
We study the question of provability of lower bounds on the complexity of explicitly given Boolean functions in weak fragments of Peano Arithmetic. To that end, we analyze what is the right fragment capturing the kind of techniques existing in Boolean complexity at present. We give both formal and informal arguments supporting the claim that a conceivable answer is V 1 (which, in view of RSUV -isomorphism, is equivalent to S 2 ), although some major results about the complexity of Boolean functions can be proved in (presumably) weaker subsystems like U 1 . As a by-product of this analysis, we give a more constructive version of the proof of Hastad Switching Lemma which probably is interesting in its own right.
Why is Boolean Complexity Theory Difficult?
, 1992
"... this paper we shall assume that S is a commutative ring with identity. Then each instruction f i can be identified with the polynomial that is computed at f i , if\Omega and \Phi are interpreted as the ring operations in the polynomial ring S[x 1 ; \Delta \Delta \Delta ; x n ]. Among natural multiva ..."
Abstract
-
Cited by 39 (0 self)
- Add to MetaCart
this paper we shall assume that S is a commutative ring with identity. Then each instruction f i can be identified with the polynomial that is computed at f i , if\Omega and \Phi are interpreted as the ring operations in the polynomial ring S[x 1 ; \Delta \Delta \Delta ; x n ]. Among natural multivariate polynomials whose complexity in this model is of interest are Hamiltonian circuits (HC), the permanent (PERM) and the determinant (DET). These are defined over a matrix X of indeterminates fx 11 ; \Delta \Delta \Delta ; x nn g where x ij