238 research outputs found
The Complexity of Bisimulation and Simulation on Finite Systems
In this paper the computational complexity of the (bi)simulation problem over
restricted graph classes is studied. For trees given as pointer structures or
terms the (bi)simulation problem is complete for logarithmic space or NC,
respectively. This solves an open problem from Balc\'azar, Gabarr\'o, and
S\'antha. Furthermore, if only one of the input graphs is required to be a
tree, the bisimulation (simulation) problem is contained in AC (LogCFL). In
contrast, it is also shown that the simulation problem is P-complete already
for graphs of bounded path-width
Leader Election for Anonymous Asynchronous Agents in Arbitrary Networks
We study the problem of leader election among mobile agents operating in an
arbitrary network modeled as an undirected graph. Nodes of the network are
unlabeled and all agents are identical. Hence the only way to elect a leader
among agents is by exploiting asymmetries in their initial positions in the
graph. Agents do not know the graph or their positions in it, hence they must
gain this knowledge by navigating in the graph and share it with other agents
to accomplish leader election. This can be done using meetings of agents, which
is difficult because of their asynchronous nature: an adversary has total
control over the speed of agents. When can a leader be elected in this
adversarial scenario and how to do it? We give a complete answer to this
question by characterizing all initial configurations for which leader election
is possible and by constructing an algorithm that accomplishes leader election
for all configurations for which this can be done
Quantum Space, Ground Space Traversal, and How to Embed Multi-Prover Interactive Proofs into Unentanglement
Savitch's theorem states that NPSPACE computations can be simulated in
PSPACE. We initiate the study of a quantum analogue of NPSPACE, denoted
Streaming-QCMASPACE (SQCMASPACE), where an exponentially long classical proof
is streamed to a poly-space quantum verifier. Besides two main results, we also
show that a quantum analogue of Savitch's theorem is unlikely to hold, as
SQCMASPACE=NEXP. For completeness, we introduce Streaming-QMASPACE (SQMASPACE)
with an exponentially long streamed quantum proof, and show SQMASPACE=QMA_EXP
(quantum analogue of NEXP). Our first main result shows, in contrast to the
classical setting, the solution space of a quantum constraint satisfaction
problem (i.e. a local Hamiltonian) is always connected when exponentially long
proofs are permitted. For this, we show how to simulate any Lipschitz
continuous path on the unit hypersphere via a sequence of local unitary gates,
at the expense of blowing up the circuit size. This shows quantum
error-correcting codes can be unable to detect one codeword erroneously
evolving to another if the evolution happens sufficiently slowly, and answers
an open question of [Gharibian, Sikora, ICALP 2015] regarding the Ground State
Connectivity problem. Our second main result is that any SQCMASPACE computation
can be embedded into "unentanglement", i.e. into a quantum constraint
satisfaction problem with unentangled provers. Formally, we show how to embed
SQCMASPACE into the Sparse Separable Hamiltonian problem of [Chailloux,
Sattath, CCC 2012] (QMA(2)-complete for 1/poly promise gap), at the expense of
scaling the promise gap with the streamed proof size. As a corollary, we obtain
the first systematic construction for obtaining QMA(2)-type upper bounds on
arbitrary multi-prover interactive proof systems, where the QMA(2) promise gap
scales exponentially with the number of bits of communication in the
interactive proof.Comment: 60 pages, 4 figure
Parameterized Complexity of Binary CSP: Vertex Cover, Treedepth, and Related Parameters
We investigate the parameterized complexity of Binary CSP parameterized by the vertex cover number and the treedepth of the constraint graph, as well as by a selection of related modulator-based parameters. The main findings are as follows:
- Binary CSP parameterized by the vertex cover number is W[3]-complete. More generally, for every positive integer d, Binary CSP parameterized by the size of a modulator to a treedepth-d graph is W[2d+1]-complete. This provides a new family of natural problems that are complete for odd levels of the W-hierarchy.
- We introduce a new complexity class XSLP, defined so that Binary CSP parameterized by treedepth is complete for this class. We provide two equivalent characterizations of XSLP: the first one relates XSLP to a model of an alternating Turing machine with certain restrictions on conondeterminism and space complexity, while the second one links XSLP to the problem of model-checking first-order logic with suitably restricted universal quantification. Interestingly, the proof of the machine characterization of XSLP uses the concept of universal trees, which are prominently featured in the recent work on parity games.
- We describe a new complexity hierarchy sandwiched between the W-hierarchy and the A-hierarchy: For every odd t, we introduce a parameterized complexity class S[t] with W[t] ? S[t] ? A[t], defined using a parameter that interpolates between the vertex cover number and the treedepth. We expect that many of the studied classes will be useful in the future for pinpointing the complexity of various structural parameterizations of graph problems
Tree-like Queries in OWL 2 QL: Succinctness and Complexity Results
This paper investigates the impact of query topology on the difficulty of
answering conjunctive queries in the presence of OWL 2 QL ontologies. Our first
contribution is to clarify the worst-case size of positive existential (PE),
non-recursive Datalog (NDL), and first-order (FO) rewritings for various
classes of tree-like conjunctive queries, ranging from linear queries to
bounded treewidth queries. Perhaps our most surprising result is a
superpolynomial lower bound on the size of PE-rewritings that holds already for
linear queries and ontologies of depth 2. More positively, we show that
polynomial-size NDL-rewritings always exist for tree-shaped queries with a
bounded number of leaves (and arbitrary ontologies), and for bounded treewidth
queries paired with bounded depth ontologies. For FO-rewritings, we equate the
existence of polysize rewritings with well-known problems in Boolean circuit
complexity. As our second contribution, we analyze the computational complexity
of query answering and establish tractability results (either NL- or
LOGCFL-completeness) for a range of query-ontology pairs. Combining our new
results with those from the literature yields a complete picture of the
succinctness and complexity landscapes for the considered classes of queries
and ontologies.Comment: This is an extended version of a paper accepted at LICS'15. It
contains both succinctness and complexity results and adopts FOL notation.
The appendix contains proofs that had to be omitted from the conference
version for lack of space. The previous arxiv version (a long version of our
DL'14 workshop paper) only contained the succinctness results and used
description logic notatio
Finite Blaschke products: a survey
A finite Blaschke product is a product of finitely many automorphisms of the unit disk. This brief survey covers some of the main topics in the area, including characterizations of Blaschke products, approximation theorems, derivatives and residues of Blaschke products, geometric localization of zeros, and selected other topics
Beyond Worst-Case Analysis for Joins with Minesweeper
We describe a new algorithm, Minesweeper, that is able to satisfy stronger
runtime guarantees than previous join algorithms (colloquially, `beyond
worst-case guarantees') for data in indexed search trees. Our first
contribution is developing a framework to measure this stronger notion of
complexity, which we call {\it certificate complexity}, that extends notions of
Barbay et al. and Demaine et al.; a certificate is a set of propositional
formulae that certifies that the output is correct. This notion captures a
natural class of join algorithms. In addition, the certificate allows us to
define a strictly stronger notion of runtime complexity than traditional
worst-case guarantees. Our second contribution is to develop a dichotomy
theorem for the certificate-based notion of complexity. Roughly, we show that
Minesweeper evaluates -acyclic queries in time linear in the certificate
plus the output size, while for any -cyclic query there is some instance
that takes superlinear time in the certificate (and for which the output is no
larger than the certificate size). We also extend our certificate-complexity
analysis to queries with bounded treewidth and the triangle query.Comment: [This is the full version of our PODS'2014 paper.
- …