681 research outputs found
Faster Deterministic Algorithms for Packing, Matching and -Dominating Set Problems
In this paper, we devise three deterministic algorithms for solving the
-set -packing, -dimensional -matching, and -dominating set
problems in time , and ,
respectively. Although recently there has been remarkable progress on
randomized solutions to those problems, our bounds make good improvements on
the best known bounds for deterministic solutions to those problems.Comment: ISAAC13 Submission. arXiv admin note: substantial text overlap with
arXiv:1303.047
Jacobian hits circuits: Hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits
We present a single, common tool to strictly subsume all known cases of
polynomial time blackbox polynomial identity testing (PIT) that have been
hitherto solved using diverse tools and techniques. In particular, we show that
polynomial time hitting-set generators for identity testing of the two
seemingly different and well studied models - depth-3 circuits with bounded top
fanin, and constant-depth constant-read multilinear formulas - can be
constructed using one common algebraic-geometry theme: Jacobian captures
algebraic independence. By exploiting the Jacobian, we design the first
efficient hitting-set generators for broad generalizations of the
above-mentioned models, namely:
(1) depth-3 (Sigma-Pi-Sigma) circuits with constant transcendence degree of
the polynomials computed by the product gates (no bounded top fanin
restriction), and (2) constant-depth constant-occur formulas (no multilinear
restriction).
Constant-occur of a variable, as we define it, is a much more general concept
than constant-read. Also, earlier work on the latter model assumed that the
formula is multilinear. Thus, our work goes further beyond the results obtained
by Saxena & Seshadhri (STOC 2011), Saraf & Volkovich (STOC 2011), Anderson et
al. (CCC 2011), Beecken et al. (ICALP 2011) and Grenet et al. (FSTTCS 2011),
and brings them under one unifying technique.
In addition, using the same Jacobian based approach, we prove exponential
lower bounds for the immanant (which includes permanent and determinant) on the
same depth-3 and depth-4 models for which we give efficient PIT algorithms. Our
results reinforce the intimate connection between identity testing and lower
bounds by exhibiting a concrete mathematical tool - the Jacobian - that is
equally effective in solving both the problems on certain interesting and
previously well-investigated (but not well understood) models of computation
On Some Computations on Sparse Polynomials
In arithmetic circuit complexity the standard operations are +,x. Yet, in some scenarios exponentiation gates are considered as well. In this paper we study the question of efficiently evaluating a polynomial given an oracle access to its power. Among applications, we show that:
* A reconstruction algorithm for a circuit class c can be extended to handle f^e for f in C.
* There exists an efficient deterministic algorithm for factoring sparse multiquadratic polynomials.
* There is a deterministic algorithm for testing a factorization of sparse polynomials, with constant individual degrees, into sparse irreducible factors. That is, testing if f = g_1 x ... x g_m when f has constant individual degrees and g_i-s are irreducible.
* There is a deterministic reconstruction algorithm for multilinear depth-4 circuits with two multiplication gates.
* There exists an efficient deterministic algorithm for testing whether two powers of sparse polynomials are equal. That is, f^d = g^e when f and g are sparse
Complete Derandomization of Identity Testing and Reconstruction of Read-Once Formulas
In this paper we study the identity testing problem of arithmetic read-once formulas (ROF) and some related models. A read-once formula is formula (a circuit whose underlying graph is a tree) in which the operations are {+,x} and such that every input variable labels at most one leaf. We obtain the first polynomial-time deterministic identity testing algorithm that operates in the black-box setting for read-once formulas, as well as some other related models. As an application, we obtain the first polynomial-time deterministic reconstruction algorithm for such formulas. Our results are obtained by improving and extending the analysis of the algorithm of [Shpilka-Volkovich, 2015
Sparse multivariate polynomial interpolation in the basis of Schubert polynomials
Schubert polynomials were discovered by A. Lascoux and M. Sch\"utzenberger in
the study of cohomology rings of flag manifolds in 1980's. These polynomials
generalize Schur polynomials, and form a linear basis of multivariate
polynomials. In 2003, Lenart and Sottile introduced skew Schubert polynomials,
which generalize skew Schur polynomials, and expand in the Schubert basis with
the generalized Littlewood-Richardson coefficients.
In this paper we initiate the study of these two families of polynomials from
the perspective of computational complexity theory. We first observe that skew
Schubert polynomials, and therefore Schubert polynomials, are in \CountP
(when evaluating on non-negative integral inputs) and \VNP.
Our main result is a deterministic algorithm that computes the expansion of a
polynomial of degree in in the basis of Schubert
polynomials, assuming an oracle computing Schubert polynomials. This algorithm
runs in time polynomial in , , and the bit size of the expansion. This
generalizes, and derandomizes, the sparse interpolation algorithm of symmetric
polynomials in the Schur basis by Barvinok and Fomin (Advances in Applied
Mathematics, 18(3):271--285). In fact, our interpolation algorithm is general
enough to accommodate any linear basis satisfying certain natural properties.
Applications of the above results include a new algorithm that computes the
generalized Littlewood-Richardson coefficients.Comment: 20 pages; some typos correcte
Reconstruction of Full Rank Algebraic Branching Programs
An algebraic branching program (ABP) A can be modelled as a product expression X_1 X_2 ... X_d, where X_1 and X_d are 1 x w and w x 1 matrices respectively, and every other X_k is a w x w matrix; the entries of these matrices are linear forms in m variables over a field F (which we assume to be either Q or a field of characteristic poly(m)). The polynomial computed by A is the entry of the 1 x 1 matrix obtained from the product X_1 X_2 ... X_d. We say A is a full rank ABP if the w^2(d-2) + 2w linear forms occurring in the matrices X_1, X_2, ...X_d are F-linearly independent. Our main result is a randomized reconstruction algorithm for full rank ABPs: Given blackbox access to an m-variate polynomial f of degree at most m, the algorithm outputs a full rank ABP computing f if such an ABP exists, or outputs \u27no full rank ABP exists\u27 (with high probability). The running time of the algorithm is polynomial in m and b, where b is the bit length of the coefficients of f. The algorithm works even if X_k is a w_{k-1} x w_k matrix (with w_0 = w_d = 1), and v = (w_1, ..., w_{d-1}) is unknown.
The result is obtained by designing a randomized polynomial time equivalence test for the family of iterated matrix multiplication polynomial IMM_{v,d}, the (1,1)-th entry of a product of d rectangular symbolic matrices whose dimensions are according to v in N^{d-1}. At its core, the algorithm exploits a connection between the irreducible invariant subspaces of the Lie algebra of the group of symmetries of a polynomial f that is equivalent to IMM_{v,d} and the \u27layer spaces\u27 of a full rank ABP computing f. This connection also helps determine the group of symmetries of IMM_{v,d} and show that IMM_{v,d} is characterized by its group of symmetries
- …