61,527 research outputs found
A Quantum Adiabatic Evolution Algorithm Applied to Random Instances of an NP-Complete Problem
A quantum system will stay near its instantaneous ground state if the
Hamiltonian that governs its evolution varies slowly enough. This quantum
adiabatic behavior is the basis of a new class of algorithms for quantum
computing. We test one such algorithm by applying it to randomly generated,
hard, instances of an NP-complete problem. For the small examples that we can
simulate, the quantum adiabatic algorithm works well, and provides evidence
that quantum computers (if large ones can be built) may be able to outperform
ordinary computers on hard sets of instances of NP-complete problems.Comment: 15 pages, 6 figures, email correspondence to [email protected] ; a
shorter version of this article appeared in the April 20, 2001 issue of
Science; see http://www.sciencemag.org/cgi/content/full/292/5516/47
Many Hard Examples in Exact Phase Transitions with Application to Generating Hard Satisfiable Instances
This paper first analyzes the resolution complexity of two random CSP models
(i.e. Model RB/RD) for which we can establish the existence of phase
transitions and identify the threshold points exactly. By encoding CSPs into
CNF formulas, it is proved that almost all instances of Model RB/RD have no
tree-like resolution proofs of less than exponential size. Thus, we not only
introduce new families of CNF formulas hard for resolution, which is a central
task of Proof-Complexity theory, but also propose models with both many hard
instances and exact phase transitions. Then, the implications of such models
are addressed. It is shown both theoretically and experimentally that an
application of Model RB/RD might be in the generation of hard satisfiable
instances, which is not only of practical importance but also related to some
open problems in cryptography such as generating one-way functions.
Subsequently, a further theoretical support for the generation method is shown
by establishing exponential lower bounds on the complexity of solving random
satisfiable and forced satisfiable instances of RB/RD near the threshold.
Finally, conclusions are presented, as well as a detailed comparison of Model
RB/RD with the Hamiltonian cycle problem and random 3-SAT, which, respectively,
exhibit three different kinds of phase transition behavior in NP-complete
problems.Comment: 19 pages, corrected mistakes in Theorems 5 and
The Complexity of Computing Optimal Assignments of Generalized Propositional Formulae
We consider the problems of finding the lexicographically minimal (or
maximal) satisfying assignment of propositional formulae for different
restricted formula classes. It turns out that for each class from our
framework, the above problem is either polynomial time solvable or complete for
OptP. We also consider the problem of deciding if in the optimal assignment the
largest variable gets value 1. We show that this problem is either in P or P^NP
complete.Comment: 17 pages, 1 figur
On the complexity of probabilistic trials for hidden satisfiability problems
What is the minimum amount of information and time needed to solve 2SAT? When
the instance is known, it can be solved in polynomial time, but is this also
possible without knowing the instance? Bei, Chen and Zhang (STOC '13)
considered a model where the input is accessed by proposing possible
assignments to a special oracle. This oracle, on encountering some constraint
unsatisfied by the proposal, returns only the constraint index. It turns out
that, in this model, even 1SAT cannot be solved in polynomial time unless P=NP.
Hence, we consider a model in which the input is accessed by proposing
probability distributions over assignments to the variables. The oracle then
returns the index of the constraint that is most likely to be violated by this
distribution. We show that the information obtained this way is sufficient to
solve 1SAT in polynomial time, even when the clauses can be repeated. For 2SAT,
as long as there are no repeated clauses, in polynomial time we can even learn
an equivalent formula for the hidden instance and hence also solve it.
Furthermore, we extend these results to the quantum regime. We show that in
this setting 1QSAT can be solved in polynomial time up to constant precision,
and 2QSAT can be learnt in polynomial time up to inverse polynomial precision.Comment: 24 pages, 2 figures. To appear in the 41st International Symposium on
Mathematical Foundations of Computer Scienc
On the random satisfiable process
In this work we suggest a new model for generating random satisfiable k-CNF
formulas. To generate such formulas -- randomly permute all 2^k\binom{n}{k}
possible clauses over the variables x_1, ..., x_n, and starting from the empty
formula, go over the clauses one by one, including each new clause as you go
along if after its addition the formula remains satisfiable. We study the
evolution of this process, namely the distribution over formulas obtained after
scanning through the first m clauses (in the random permutation's order).
Random processes with conditioning on a certain property being respected are
widely studied in the context of graph properties. This study was pioneered by
Ruci\'nski and Wormald in 1992 for graphs with a fixed degree sequence, and
also by Erd\H{o}s, Suen, and Winkler in 1995 for triangle-free and bipartite
graphs. Since then many other graph properties were studied such as planarity
and H-freeness. Thus our model is a natural extension of this approach to the
satisfiability setting.
Our main contribution is as follows. For m \geq cn, c=c(k) a sufficiently
large constant, we are able to characterize the structure of the solution space
of a typical formula in this distribution. Specifically, we show that typically
all satisfying assignments are essentially clustered in one cluster, and all
but e^{-\Omega(m/n)} n of the variables take the same value in all satisfying
assignments. We also describe a polynomial time algorithm that finds with high
probability a satisfying assignment for such formulas
Honest signaling in zero-sum games is hard, and lying is even harder
We prove that, assuming the exponential time hypothesis, finding an
\epsilon-approximately optimal symmetric signaling scheme in a two-player
zero-sum game requires quasi-polynomial time. This is tight by [Cheng et al.,
FOCS'15] and resolves an open question of [Dughmi, FOCS'14]. We also prove that
finding a multiplicative approximation is NP-hard.
We also introduce a new model where a dishonest signaler may publicly commit
to use one scheme, but post signals according to a different scheme. For this
model, we prove that even finding a (1-2^{-n})-approximately optimal scheme is
NP-hard
Existence versus Exploitation: The Opacity of Backbones and Backdoors Under a Weak Assumption
Backdoors and backbones of Boolean formulas are hidden structural properties.
A natural goal, already in part realized, is that solver algorithms seek to
obtain substantially better performance by exploiting these structures.
However, the present paper is not intended to improve the performance of SAT
solvers, but rather is a cautionary paper. In particular, the theme of this
paper is that there is a potential chasm between the existence of such
structures in the Boolean formula and being able to effectively exploit them.
This does not mean that these structures are not useful to solvers. It does
mean that one must be very careful not to assume that it is computationally
easy to go from the existence of a structure to being able to get one's hands
on it and/or being able to exploit the structure.
For example, in this paper we show that, under the assumption that P
NP, there are easily recognizable families of Boolean formulas with strong
backdoors that are easy to find, yet for which it is hard (in fact,
NP-complete) to determine whether the formulas are satisfiable. We also show
that, also under the assumption P NP, there are easily recognizable sets
of Boolean formulas for which it is hard (in fact, NP-complete) to determine
whether they have a large backbone
- …