78 research outputs found

    Parity Separation: A Scientifically Proven Method for Permanent Weight Loss

    Get PDF
    Given an edge-weighted graph G, let PerfMatch(G) denote the weighted sum over all perfect matchings M in G, weighting each matching M by the product of weights of edges in M. If G is unweighted, this plainly counts the perfect matchings of G. In this paper, we introduce parity separation, a new method for reducing PerfMatch to unweighted instances: For graphs G with edge-weights -1 and 1, we construct two unweighted graphs G1 and G2 such that PerfMatch(G) = PerfMatch(G1) - PerfMatch(G2). This yields a novel weight removal technique for counting perfect matchings, in addition to those known from classical #P-hardness proofs. We derive the following applications: 1. An alternative #P-completeness proof for counting unweighted perfect matchings. 2. C=P-completeness for deciding whether two given unweighted graphs have the same number of perfect matchings. To the best of our knowledge, this is the first C=P-completeness result for the "equality-testing version" of any natural counting problem that is not already #P-hard under parsimonious reductions. 3. An alternative tight lower bound for counting unweighted perfect matchings under the counting exponential-time hypothesis #ETH. Our technique is based upon matchgates and the Holant framework. To make our #P-hardness proof self-contained, we also apply matchgates for an alternative #P-hardness proof of PerfMatch on graphs with edge-weights -1 and 1.Comment: 14 page

    Smooth Approximations and Relational Width Collapses

    Get PDF
    We prove that relational structures admitting specific polymorphisms (namely, canonical pseudo-WNU operations of all arities n ? 3) have low relational width. This implies a collapse of the bounded width hierarchy for numerous classes of infinite-domain CSPs studied in the literature. Moreover, we obtain a characterization of bounded width for first-order reducts of unary structures and a characterization of MMSNP sentences that are equivalent to a Datalog program, answering a question posed by Bienvenu et al.. In particular, the bounded width hierarchy collapses in those cases as well

    Categoral views on computations on trees (Extended abstract)

    Get PDF
    Computations on trees form a classical topic in computing. These computations can be described in terms of machines (typically called tree transducers), or in terms of functions. This paper focuses on three flavors of bottom-up computations, of increasing generality. It brings categorical clarity by identifying a category of tree transducers together with two different behavior functors. The first sends a tree transducer to a coKleisli or biKleisli map (describing the contribution of each local node in an input tree to the global transformation) and the second to a tree function (the global tree transformation). The first behavior functor has an adjoint realization functor, like in Goguen’s early work on automata. Further categorical structure, in the form of Hughes’s Arrows, appears in properly parameterized versions of these structures

    Depth Two Majority Circuits for Majority and List Expanders

    Get PDF
    Let MAJ_n denote the Boolean majority function of n input variables. In this paper, we study the construction of depth two circuits computing MAJ_n where each gate in a circuit computes MAJ_m for m < n. We first give an explicit construction of depth two MAJ_{floor[n/2]+2} o MAJ_{= 7 such that n congruent 3 (mod 4) where MAJ_m and MAJ_{<= m} denote the majority gates that take m and at most m distinct inputs, respectively. A graph theoretic argument developed by Kulikov and Podolskii (STACS \u2717, Article No. 49) shows that there is no MAJ_{<= n-2} o MAJ_{n-2} circuit computing MAJ_n. Hence, our construction reveals that the use of a smaller fan-in gates at the bottom level is essential for the existence of such a circuit. Some computational results are also provided. We then show that the construction of depth two MAJ_m o MAJ_m circuits computing MAJ_n for m<n can be translated into the construction of a newly introduced version of bipartite expander graphs which we call a list expander. Intuitively, a list expander is a c-leftregular bipartite graph such that for a given d < c, every d-leftregular subgraph of the original graph has a certain expansion property. We formalize this connection and verify that, with high probability, a random bipartite graph is a list expander of certain parameters. However, the parameters obtained are not sufficient to give us a MAJ_{n-c} o MAJ_{n-c} circuit computing MAJ_n for a large constant c

    Gaifman Normal Forms for Counting Extensions of First-Order Logic

    Get PDF
    We consider the extension of first-order logic FO by unary counting quantifiers and generalise the notion of Gaifman normal form from FO to this setting. For formulas that use only ultimately periodic counting quantifiers, we provide an algorithm that computes equivalent formulas in Gaifman normal form. We also show that this is not possible for formulas using at least one quantifier that is not ultimately periodic. Now let d be a degree bound. We show that for any formula phi with arbitrary counting quantifiers, there is a formula gamma in Gaifman normal form that is equivalent to phi on all finite structures of degree <= d. If the quantifiers of phi are decidable (decidable in elementary time, ultimately periodic), gamma can be constructed effectively (in elementary time, in worst-case optimal 3-fold exponential time). For the setting with unrestricted degree we show that by using our Gaifman normal form for formulas with only ultimately periodic counting quantifiers, a known fixed-parameter tractability result for FO on classes of structures of bounded local tree-width can be lifted to the extension of FO with ultimately periodic counting quantifiers (a logic equally expressive as FO+MOD, i.e., first-oder logic with modulo-counting quantifiers)

    Packing Cycles Faster Than Erdos-Posa

    Get PDF

    Smaller ACC0 Circuits for Symmetric Functions

    Get PDF
    What is the power of constant-depth circuits with MODmMOD_m gates, that can count modulo mm? Can they efficiently compute MAJORITY and other symmetric functions? When mm is a constant prime power, the answer is well understood: Razborov and Smolensky proved in the 1980s that MAJORITY and MODmMOD_m require super-polynomial-size MODqMOD_q circuits, where qq is any prime power not dividing mm. However, relatively little is known about the power of MODmMOD_m circuits for non-prime-power mm. For example, it is still open whether every problem in EXPEXP can be computed by depth-33 circuits of polynomial size and only MOD6MOD_6 gates. We shed some light on the difficulty of proving lower bounds for MODmMOD_m circuits, by giving new upper bounds. We construct MODmMOD_m circuits computing symmetric functions with non-prime power mm, with size-depth tradeoffs that beat the longstanding lower bounds for AC0[m]AC^0[m] circuits for prime power mm. Our size-depth tradeoff circuits have essentially optimal dependence on mm and dd in the exponent, under a natural circuit complexity hypothesis. For example, we show for every ε>0\varepsilon > 0 that every symmetric function can be computed with depth-3 MODmMOD_m circuits of exp(O(nε))\exp(O(n^{\varepsilon})) size, for a constant mm depending only on ε>0\varepsilon > 0. That is, depth-33 CC0CC^0 circuits can compute any symmetric function in \emph{subexponential} size. This demonstrates a significant difference in the power of depth-33 CC0CC^0 circuits, compared to other models: for certain symmetric functions, depth-33 AC0AC^0 circuits require 2Ω(n)2^{\Omega(\sqrt{n})} size [H{\aa}stad 1986], and depth-33 AC0[pk]AC^0[p^k] circuits (for fixed prime power pkp^k) require 2Ω(n1/6)2^{\Omega(n^{1/6})} size [Smolensky 1987]. Even for depth-two MODpMODmMOD_p \circ MOD_m circuits, 2Ω(n)2^{\Omega(n)} lower bounds were known [Barrington Straubing Th\'erien 1990].Comment: 15 pages; abstract edited to fit arXiv requirement
    corecore