82 research outputs found

    Detecting and counting small subgraphs, and evaluating a parameterized Tutte polynomial: lower bounds via toroidal grids and Cayley graph expanders

    Get PDF
    Given a graph property Φ\Phi, we consider the problem EdgeSub(Φ)\mathtt{EdgeSub}(\Phi), where the input is a pair of a graph GG and a positive integer kk, and the task is to decide whether GG contains a kk-edge subgraph that satisfies Φ\Phi. Specifically, we study the parameterized complexity of EdgeSub(Φ)\mathtt{EdgeSub}(\Phi) and of its counting problem #EdgeSub(Φ)\#\mathtt{EdgeSub}(\Phi) with respect to both approximate and exact counting. We obtain a complete picture for minor-closed properties Φ\Phi: the decision problem EdgeSub(Φ)\mathtt{EdgeSub}(\Phi) always admits an FPT algorithm and the counting problem #EdgeSub(Φ)\#\mathtt{EdgeSub}(\Phi) always admits an FPTRAS. For exact counting, we present an exhaustive and explicit criterion on the property Φ\Phi which, if satisfied, yields fixed-parameter tractability and otherwise #W[1]\#\mathsf{W[1]}-hardness. Additionally, most of our hardness results come with an almost tight conditional lower bound under the so-called Exponential Time Hypothesis, ruling out algorithms for #EdgeSub(Φ)\#\mathtt{EdgeSub}(\Phi) that run in time f(k)Go(k/logk)f(k)\cdot|G|^{o(k/\log k)} for any computable function ff. As a main technical result, we gain a complete understanding of the coefficients of toroidal grids and selected Cayley graph expanders in the homomorphism basis of #EdgeSub(Φ)\#\mathtt{EdgeSub}(\Phi). This allows us to establish hardness of exact counting using the Complexity Monotonicity framework due to Curticapean, Dell and Marx (STOC'17). Our methods can also be applied to a parameterized variant of the Tutte Polynomial TGkT^k_G of a graph GG, to which many known combinatorial interpretations of values of the (classical) Tutte Polynomial can be extended. As an example, TGk(2,1)T^k_G(2,1) corresponds to the number of kk-forests in the graph GG. Our techniques allow us to completely understand the parametrized complexity of computing the evaluation of TGkT^k_G at every pair of rational coordinates (x,y)(x,y)

    Adversarially Robust Property-Preserving Hash Functions

    Get PDF
    Property-preserving hashing is a method of compressing a large input x into a short hash h(x) in such a way that given h(x) and h(y), one can compute a property P(x, y) of the original inputs. The idea of property-preserving hash functions underlies sketching, compressed sensing and locality-sensitive hashing. Property-preserving hash functions are usually probabilistic: they use the random choice of a hash function from a family to achieve compression, and as a consequence, err on some inputs. Traditionally, the notion of correctness for these hash functions requires that for every two inputs x and y, the probability that h(x) and h(y) mislead us into a wrong prediction of P(x, y) is negligible. As observed in many recent works (incl. Mironov, Naor and Segev, STOC 2008; Hardt and Woodruff, STOC 2013; Naor and Yogev, CRYPTO 2015), such a correctness guarantee assumes that the adversary (who produces the offending inputs) has no information about the hash function, and is too weak in many scenarios. We initiate the study of adversarial robustness for property-preserving hash functions, provide definitions, derive broad lower bounds due to a simple connection with communication complexity, and show the necessity of computational assumptions to construct such functions. Our main positive results are two candidate constructions of property-preserving hash functions (achieving different parameters) for the (promise) gap-Hamming property which checks if x and y are "too far" or "too close". Our first construction relies on generic collision-resistant hash functions, and our second on a variant of the syndrome decoding assumption on low-density parity check codes

    Lower Bounds for Combinatorial Algorithms for Boolean Matrix Multiplication

    Get PDF
    In this paper we propose models of combinatorial algorithms for the Boolean Matrix Multiplication (BMM), and prove lower bounds on computing BMM in these models. First, we give a relatively relaxed combinatorial model which is an extension of the model by Angluin (1976), and we prove that the time required by any algorithm for the BMM is at least Omega(n^3 / 2^{O( sqrt{ log n })}). Subsequently, we propose a more general model capable of simulating the "Four Russian Algorithm". We prove a lower bound of Omega(n^{7/3} / 2^{O(sqrt{ log n })}) for the BMM under this model. We use a special class of graphs, called (r,t)-graphs, originally discovered by Rusza and Szemeredi (1978), along with randomization, to construct matrices that are hard instances for our combinatorial models

    Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations

    Get PDF
    We study the complexity of approximating the number of answers to a small query \varphi in a large database D. We establish an exhaustive classification into tractable and intractable cases if \varphi is a conjunctive query possibly including disequalities and negations: - If there is a constant bound on the arity of \varphi, and if the randomised Exponential Time Hypothesis (rETH) holds, then the problem has a fixed-parameter tractable approximation scheme (FPTRAS) if and only if the treewidth of \varphi is bounded. - If the arity is unbounded and \varphi does not have negations, then the problem has an FPTRAS if and only if the adaptive width of \varphi (a width measure strictly more general than treewidth) is bounded; the lower bound relies on the rETH as well. Additionally we show that our results cannot be strengthened to achieve a fully polynomial randomised approximation scheme (FPRAS): We observe that, unless NP =RP, there is no FPRAS even if the treewidth (and the adaptive width) is 1. However, if there are neither disequalities nor negations, we prove the existence of an FPRAS for queries of bounded fractional hypertreewidth, strictly generalising the recently established FPRAS for conjunctive queries with bounded hypertreewidth due to Arenas, Croquevielle, Jayaram and Riveros (STOC 2021)

    Answering UCQs under Updates and in the Presence of Integrity Constraints

    Get PDF
    We investigate the query evaluation problem for fixed queries over fully dynamic databases where tuples can be inserted or deleted. The task is to design a dynamic data structure that can immediately report the new result of a fixed query after every database update. We consider unions of conjunctive queries (UCQs) and focus on the query evaluation tasks testing (decide whether an input tuple belongs to the query result), enumeration (enumerate, without repetition, all tuples in the query result), and counting (output the number of tuples in the query result). We identify three increasingly restrictive classes of UCQs which we call t-hierarchical, q-hierarchical, and exhaustively q-hierarchical UCQs. Our main results provide the following dichotomies: If the query\u27s homomorphic core is t-hierarchical (q-hierarchical, exhaustively q-hierarchical), then the testing (enumeration, counting) problem can be solved with constant update time and constant testing time (delay, counting time). Otherwise, it cannot be solved with sublinear update time and sublinear testing time (delay, counting time), unless the OV-conjecture and/or the OMv-conjecture fails. We also study the complexity of query evaluation in the dynamic setting in the presence of integrity constraints, and we obtain similar dichotomy results for the special case of small domain constraints (i.e., constraints which state that all values in a particular column of a relation belong to a fixed domain of constant size)

    Structure and Complexity of Bag Consistency

    Get PDF
    Since the early days of relational databases, it was realized that acyclic hypergraphs give rise to database schemas with desirable structural and algorithmic properties. In a by-now classical paper, Beeri, Fagin, Maier, and Yannakakis established several different equivalent characterizations of acyclicity; in particular, they showed that the sets of attributes of a schema form an acyclic hypergraph if and only if the local-to-global consistency property for relations over that schema holds, which means that every collection of pairwise consistent relations over the schema is globally consistent. Even though real-life databases consist of bags (multisets), there has not been a study of the interplay between local consistency and global consistency for bags. We embark on such a study here and we first show that the sets of attributes of a schema form an acyclic hypergraph if and only if the local-to global consistency property for bags over that schema holds. After this, we explore algorithmic aspects of global consistency for bags by analyzing the computational complexity of the global consistency problem for bags: given a collection of bags, are these bags globally consistent? We show that this problem is in NP, even when the schema is part of the input. We then establish the following dichotomy theorem for fixed schemas: if the schema is acyclic, then the global consistency problem for bags is solvable in polynomial time, while if the schema is cyclic, then the global consistency problem for bags is NP-complete. The latter result contrasts sharply with the state of affairs for relations, where, for each fixed schema, the global consistency problem for relations is solvable in polynomial time
    corecore