63,209 research outputs found
A System of Interaction and Structure III: The Complexity of BV and Pomset Logic
Pomset logic and BV are both logics that extend multiplicative linear logic
(with Mix) with a third connective that is self-dual and non-commutative.
Whereas pomset logic originates from the study of coherence spaces and proof
nets, BV originates from the study of series-parallel orders, cographs, and
proof systems. Both logics enjoy a cut-admissibility result, but for neither
logic can this be done in the sequent calculus. Provability in pomset logic can
be checked via a proof net correctness criterion and in BV via a deep inference
proof system. It has long been conjectured that these two logics are the same.
In this paper we show that this conjecture is false. We also investigate the
complexity of the two logics, exhibiting a huge gap between the two. Whereas
provability in BV is NP-complete, provability in pomset logic is
-complete. We also make some observations with respect to possible
sequent systems for the two logics
Generalized gaugings and the field-antifield formalism
We discuss the algebra of general gauge theories that are described by the
embedding tensor formalism. We compare the gauge transformations dependent and
independent of an invariant action, and argue that the generic transformations
lead to an infinitely reducible algebra. We connect the embedding tensor
formalism to the field-antifield (or Batalin-Vilkovisky) formalism, which is
the most general formulation known for general gauge theories and their
quantization. The structure equations of the embedding tensor formalism are
included in the master equation of the field-antifield formalism.Comment: 42 pages; v2: some clarifications and 1 reference added; version to
be published in JHE
Complexity of Manipulation, Bribery, and Campaign Management in Bucklin and Fallback Voting
A central theme in computational social choice is to study the extent to
which voting systems computationally resist manipulative attacks seeking to
influence the outcome of elections, such as manipulation (i.e., strategic
voting), control, and bribery. Bucklin and fallback voting are among the voting
systems with the broadest resistance (i.e., NP-hardness) to control attacks.
However, only little is known about their behavior regarding manipulation and
bribery attacks. We comprehensively investigate the computational resistance of
Bucklin and fallback voting for many of the common manipulation and bribery
scenarios; we also complement our discussion by considering several campaign
management problems for Bucklin and fallback.Comment: 28 page
Structure and Complexity in Planning with Unary Operators
Unary operator domains -- i.e., domains in which operators have a single
effect -- arise naturally in many control problems. In its most general form,
the problem of STRIPS planning in unary operator domains is known to be as hard
as the general STRIPS planning problem -- both are PSPACE-complete. However,
unary operator domains induce a natural structure, called the domain's causal
graph. This graph relates between the preconditions and effect of each domain
operator. Causal graphs were exploited by Williams and Nayak in order to
analyze plan generation for one of the controllers in NASA's Deep-Space One
spacecraft. There, they utilized the fact that when this graph is acyclic, a
serialization ordering over any subgoal can be obtained quickly. In this paper
we conduct a comprehensive study of the relationship between the structure of a
domain's causal graph and the complexity of planning in this domain. On the
positive side, we show that a non-trivial polynomial time plan generation
algorithm exists for domains whose causal graph induces a polytree with a
constant bound on its node indegree. On the negative side, we show that even
plan existence is hard when the graph is a directed-path singly connected DAG.
More generally, we show that the number of paths in the causal graph is closely
related to the complexity of planning in the associated domain. Finally we
relate our results to the question of complexity of planning with serializable
subgoals
Tight Kernel Bounds for Problems on Graphs with Small Degeneracy
In this paper we consider kernelization for problems on d-degenerate graphs,
i.e. graphs such that any subgraph contains a vertex of degree at most .
This graph class generalizes many classes of graphs for which effective
kernelization is known to exist, e.g. planar graphs, H-minor free graphs, and
H-topological-minor free graphs. We show that for several natural problems on
d-degenerate graphs the best known kernelization upper bounds are essentially
tight.Comment: Full version of ESA 201
On The Power of Tree Projections: Structural Tractability of Enumerating CSP Solutions
The problem of deciding whether CSP instances admit solutions has been deeply
studied in the literature, and several structural tractability results have
been derived so far. However, constraint satisfaction comes in practice as a
computation problem where the focus is either on finding one solution, or on
enumerating all solutions, possibly projected to some given set of output
variables. The paper investigates the structural tractability of the problem of
enumerating (possibly projected) solutions, where tractability means here
computable with polynomial delay (WPD), since in general exponentially many
solutions may be computed. A general framework based on the notion of tree
projection of hypergraphs is considered, which generalizes all known
decomposition methods. Tractability results have been obtained both for classes
of structures where output variables are part of their specification, and for
classes of structures where computability WPD must be ensured for any possible
set of output variables. These results are shown to be tight, by exhibiting
dichotomies for classes of structures having bounded arity and where the tree
decomposition method is considered
- …