724 research outputs found
Bounds on the diameter of Cayley graphs of the symmetric group
In this paper we are concerned with the conjecture that, for any set of
generators S of the symmetric group of degree n, the word length in terms of S
of every permutation is bounded above by a polynomial of n. We prove this
conjecture for sets of generators containing a permutation fixing at least 37%
of the points.Comment: 17 pages, 6 table
On the orders of primitive groups with restricted nonabelian composition factors
AbstractWe prove that, given c0, there exists c such that the following holds. If G is a primitive permutation group of degree n, no composition factor of which is an alternating group of degree greater than c0 or a classical group of dimension greater than c0, then ¦G¦⩽nc. In particular, if the nonabelian composition factors of G have bounded order, then ¦G¦ is polynomially bounded
A Protocol for Generating Random Elements with their Probabilities
We give an AM protocol that allows the verifier to sample elements x from a
probability distribution P, which is held by the prover. If the prover is
honest, the verifier outputs (x, P(x)) with probability close to P(x). In case
the prover is dishonest, one may hope for the following guarantee: if the
verifier outputs (x, p), then the probability that the verifier outputs x is
close to p. Simple examples show that this cannot be achieved. Instead, we show
that the following weaker condition holds (in a well defined sense) on average:
If (x, p) is output, then p is an upper bound on the probability that x is
output. Our protocol yields a new transformation to turn interactive proofs
where the verifier uses private random coins into proofs with public coins. The
verifier has better running time compared to the well-known Goldwasser-Sipser
transformation (STOC, 1986). For constant-round protocols, we only lose an
arbitrarily small constant in soundness and completeness, while our public-coin
verifier calls the private-coin verifier only once
Baby-Step Giant-Step Algorithms for the Symmetric Group
We study discrete logarithms in the setting of group actions. Suppose that
is a group that acts on a set . When , a solution
to can be thought of as a kind of logarithm. In this paper, we study
the case where , and develop analogs to the Shanks baby-step /
giant-step procedure for ordinary discrete logarithms. Specifically, we compute
two sets such that every permutation of can be
written as a product of elements and . Our
deterministic procedure is optimal up to constant factors, in the sense that
and can be computed in optimal asymptotic complexity, and and
are a small constant from in size. We also analyze randomized
"collision" algorithms for the same problem
Fast Monte Carlo Algorithms for Permutation Groups
AbstractWe introduce new, elementary Monte Carlo methods to speed up and greatly simplify the manipulation of permutation groups (given by a list of generators). The methods are of a combinatorial character, using only elementary group theory. The key idea is that under certain conditions, "random subproducts" of the generators successfully emulate truly random elements of a group. We achieve a nearly optimal O(n3 logcn) asymptotic running time for membership testing, where n is the size of the permutation domain. This is an improvement of two orders of magnitude compared to known elementary algorithms and one order of magnitude compared to algorithms which depend on heavy use of group theory. An even greater asymptotic speedup is achieved for normal closures, a key ingredient in group-theoretic computation, now constructible in Monte Carlo time O(n2 logcn), i.e., essentially linear time (as a function of the input length). Some of the new techniques are sufficiently general to allow polynomial-time implementations in the very general model of "black box groups" (group operations are performed by an oracle). In particular, the normal closure algorithm has a number of applications to matrix-group computation. It should be stressed that our randomized algorithms are not heuristic: the probability of error is guaranteed not to exceed a bound ϵ > 0, prescribed by the user. The cost of this requirement is a factor of |log ϵ| in the running time
Characterization of Binary Constraint System Games
We consider a class of nonlocal games that are related to binary constraint
systems (BCSs) in a manner similar to the games implicit in the work of Mermin
[N.D. Mermin, "Simple unified form for the major no-hidden-variables theorems,"
Phys. Rev. Lett., 65(27):3373-3376, 1990], but generalized to n binary
variables and m constraints. We show that, whenever there is a perfect
entangled protocol for such a game, there exists a set of binary observables
with commutations and products similar to those exhibited by Mermin. We also
show how to derive upper bounds strictly below 1 for the the maximum entangled
success probability of some BCS games. These results are partial progress
towards a larger project to determine the computational complexity of deciding
whether a given instance of a BCS game admits a perfect entangled strategy or
not.Comment: Revised version corrects an error in the previous version of the
proof of Theorem 1 that arises in the case of POVM measurement
Graphs Identified by Logics with Counting
We classify graphs and, more generally, finite relational structures that are
identified by C2, that is, two-variable first-order logic with counting. Using
this classification, we show that it can be decided in almost linear time
whether a structure is identified by C2. Our classification implies that for
every graph identified by this logic, all vertex-colored versions of it are
also identified. A similar statement is true for finite relational structures.
We provide constructions that solve the inversion problem for finite
structures in linear time. This problem has previously been shown to be
polynomial time solvable by Martin Otto. For graphs, we conclude that every
C2-equivalence class contains a graph whose orbits are exactly the classes of
the C2-partition of its vertex set and which has a single automorphism
witnessing this fact.
For general k, we show that such statements are not true by providing
examples of graphs of size linear in k which are identified by C3 but for which
the orbit partition is strictly finer than the Ck-partition. We also provide
identified graphs which have vertex-colored versions that are not identified by
Ck.Comment: 33 pages, 8 Figure
Quantum Weakly Nondeterministic Communication Complexity
We study the weakest model of quantum nondeterminism in which a classical
proof has to be checked with probability one by a quantum protocol. We show the
first separation between classical nondeterministic communication complexity
and this model of quantum nondeterministic communication complexity for a total
function. This separation is quadratic.Comment: 12 pages. v3: minor correction
Implementation of higher-order absorbing boundary conditions for the Einstein equations
We present an implementation of absorbing boundary conditions for the
Einstein equations based on the recent work of Buchman and Sarbach. In this
paper, we assume that spacetime may be linearized about Minkowski space close
to the outer boundary, which is taken to be a coordinate sphere. We reformulate
the boundary conditions as conditions on the gauge-invariant
Regge-Wheeler-Zerilli scalars. Higher-order radial derivatives are eliminated
by rewriting the boundary conditions as a system of ODEs for a set of auxiliary
variables intrinsic to the boundary. From these we construct boundary data for
a set of well-posed constraint-preserving boundary conditions for the Einstein
equations in a first-order generalized harmonic formulation. This construction
has direct applications to outer boundary conditions in simulations of isolated
systems (e.g., binary black holes) as well as to the problem of
Cauchy-perturbative matching. As a test problem for our numerical
implementation, we consider linearized multipolar gravitational waves in TT
gauge, with angular momentum numbers l=2 (Teukolsky waves), 3 and 4. We
demonstrate that the perfectly absorbing boundary condition B_L of order L=l
yields no spurious reflections to linear order in perturbation theory. This is
in contrast to the lower-order absorbing boundary conditions B_L with L<l,
which include the widely used freezing-Psi_0 boundary condition that imposes
the vanishing of the Newman-Penrose scalar Psi_0.Comment: 25 pages, 9 figures. Minor clarifications. Final version to appear in
Class. Quantum Grav
On SAT representations of XOR constraints
We study the representation of systems S of linear equations over the
two-element field (aka xor- or parity-constraints) via conjunctive normal forms
F (boolean clause-sets). First we consider the problem of finding an
"arc-consistent" representation ("AC"), meaning that unit-clause propagation
will fix all forced assignments for all possible instantiations of the
xor-variables. Our main negative result is that there is no polysize
AC-representation in general. On the positive side we show that finding such an
AC-representation is fixed-parameter tractable (fpt) in the number of
equations. Then we turn to a stronger criterion of representation, namely
propagation completeness ("PC") --- while AC only covers the variables of S,
now all the variables in F (the variables in S plus auxiliary variables) are
considered for PC. We show that the standard translation actually yields a PC
representation for one equation, but fails so for two equations (in fact
arbitrarily badly). We show that with a more intelligent translation we can
also easily compute a translation to PC for two equations. We conjecture that
computing a representation in PC is fpt in the number of equations.Comment: 39 pages; 2nd v. improved handling of acyclic systems, free-standing
proof of the transformation from AC-representations to monotone circuits,
improved wording and literature review; 3rd v. updated literature,
strengthened treatment of monotonisation, improved discussions; 4th v. update
of literature, discussions and formulations, more details and examples;
conference v. to appear LATA 201
- …