78 research outputs found
Parity Separation: A Scientifically Proven Method for Permanent Weight Loss
Given an edge-weighted graph G, let PerfMatch(G) denote the weighted sum over
all perfect matchings M in G, weighting each matching M by the product of
weights of edges in M. If G is unweighted, this plainly counts the perfect
matchings of G.
In this paper, we introduce parity separation, a new method for reducing
PerfMatch to unweighted instances: For graphs G with edge-weights -1 and 1, we
construct two unweighted graphs G1 and G2 such that PerfMatch(G) =
PerfMatch(G1) - PerfMatch(G2). This yields a novel weight removal technique for
counting perfect matchings, in addition to those known from classical
#P-hardness proofs. We derive the following applications:
1. An alternative #P-completeness proof for counting unweighted perfect
matchings.
2. C=P-completeness for deciding whether two given unweighted graphs have the
same number of perfect matchings. To the best of our knowledge, this is the
first C=P-completeness result for the "equality-testing version" of any natural
counting problem that is not already #P-hard under parsimonious reductions.
3. An alternative tight lower bound for counting unweighted perfect matchings
under the counting exponential-time hypothesis #ETH.
Our technique is based upon matchgates and the Holant framework. To make our
#P-hardness proof self-contained, we also apply matchgates for an alternative
#P-hardness proof of PerfMatch on graphs with edge-weights -1 and 1.Comment: 14 page
Smooth Approximations and Relational Width Collapses
We prove that relational structures admitting specific polymorphisms (namely, canonical pseudo-WNU operations of all arities n ? 3) have low relational width. This implies a collapse of the bounded width hierarchy for numerous classes of infinite-domain CSPs studied in the literature. Moreover, we obtain a characterization of bounded width for first-order reducts of unary structures and a characterization of MMSNP sentences that are equivalent to a Datalog program, answering a question posed by Bienvenu et al.. In particular, the bounded width hierarchy collapses in those cases as well
Categoral views on computations on trees (Extended abstract)
Computations on trees form a classical topic in computing. These computations can be described in terms of machines (typically called tree transducers), or in terms of functions. This paper focuses on three flavors of bottom-up computations, of increasing generality. It brings categorical clarity by identifying a category of tree transducers together with two different behavior functors. The first sends a tree transducer to a coKleisli or biKleisli map (describing the contribution of each local node in an input tree to the global transformation) and the second to a tree function (the global tree transformation). The first behavior functor has an adjoint realization functor, like in Goguen’s early work on automata. Further categorical structure, in the form of Hughes’s Arrows, appears in properly parameterized versions of these structures
Depth Two Majority Circuits for Majority and List Expanders
Let MAJ_n denote the Boolean majority function of n input variables. In this paper, we study the construction of depth two circuits computing MAJ_n where each gate in a circuit computes MAJ_m for m < n.
We first give an explicit construction of depth two MAJ_{floor[n/2]+2} o MAJ_{= 7 such that n congruent 3 (mod 4) where MAJ_m and MAJ_{<= m} denote the majority gates that take m and at most m distinct inputs, respectively. A graph theoretic argument developed by Kulikov and Podolskii (STACS \u2717, Article No. 49) shows that there is no MAJ_{<= n-2} o MAJ_{n-2} circuit computing MAJ_n. Hence, our construction reveals that the use of a smaller fan-in gates at the bottom level is essential for the existence of such a circuit. Some computational results are also provided.
We then show that the construction of depth two MAJ_m o MAJ_m circuits computing MAJ_n for m<n can be translated into the construction of a newly introduced version of bipartite expander graphs which we call a list expander. Intuitively, a list expander is a c-leftregular bipartite graph such that for a given d < c, every d-leftregular subgraph of the original graph has a certain expansion property. We formalize this connection and verify that, with high probability, a random bipartite graph is a list expander of certain parameters. However, the parameters obtained are not sufficient to give us a MAJ_{n-c} o MAJ_{n-c} circuit computing MAJ_n for a large constant c
Gaifman Normal Forms for Counting Extensions of First-Order Logic
We consider the extension of first-order logic FO by unary counting quantifiers and generalise the notion of Gaifman normal form from FO to this setting. For formulas that use only ultimately periodic counting quantifiers, we provide an algorithm that computes equivalent formulas in Gaifman normal form. We also show that this is not possible for formulas using at least one quantifier that is not ultimately periodic.
Now let d be a degree bound. We show that for any formula phi with arbitrary counting quantifiers, there is a formula gamma in Gaifman normal form that is equivalent to phi on all finite structures of degree <= d. If the quantifiers of phi are decidable (decidable in elementary time, ultimately periodic), gamma can be constructed effectively (in elementary time, in worst-case optimal 3-fold exponential time).
For the setting with unrestricted degree we show that by using our Gaifman normal form for formulas with only ultimately periodic counting quantifiers, a known fixed-parameter tractability result for FO on classes of structures of bounded local tree-width can be lifted to the extension of FO with ultimately periodic counting quantifiers (a logic equally expressive as FO+MOD, i.e., first-oder logic with modulo-counting quantifiers)
Smaller ACC0 Circuits for Symmetric Functions
What is the power of constant-depth circuits with gates, that can
count modulo ? Can they efficiently compute MAJORITY and other symmetric
functions? When is a constant prime power, the answer is well understood:
Razborov and Smolensky proved in the 1980s that MAJORITY and require
super-polynomial-size circuits, where is any prime power not
dividing . However, relatively little is known about the power of
circuits for non-prime-power . For example, it is still open whether every
problem in can be computed by depth- circuits of polynomial size and
only gates.
We shed some light on the difficulty of proving lower bounds for
circuits, by giving new upper bounds. We construct circuits computing
symmetric functions with non-prime power , with size-depth tradeoffs that
beat the longstanding lower bounds for circuits for prime power .
Our size-depth tradeoff circuits have essentially optimal dependence on and
in the exponent, under a natural circuit complexity hypothesis.
For example, we show for every that every symmetric
function can be computed with depth-3 circuits of
size, for a constant depending only on
. That is, depth- circuits can compute any symmetric
function in \emph{subexponential} size. This demonstrates a significant
difference in the power of depth- circuits, compared to other models:
for certain symmetric functions, depth- circuits require
size [H{\aa}stad 1986], and depth-
circuits (for fixed prime power ) require size
[Smolensky 1987]. Even for depth-two circuits,
lower bounds were known [Barrington Straubing Th\'erien 1990].Comment: 15 pages; abstract edited to fit arXiv requirement
- …