Exponential Circuit Complexity for NP-Complete Problems • We Shall Prove Exponential Lower Bounds for NP-Complete Problems Using Monotone Circuits

Total Page:16

File Type:pdf, Size:1020Kb

Exponential Circuit Complexity for NP-Complete Problems • We Shall Prove Exponential Lower Bounds for NP-Complete Problems Using Monotone Circuits Exponential Circuit Complexity for NP-Complete Problems ² We shall prove exponential lower bounds for NP-complete problems using monotone circuits. { Monotone circuits are circuits without : gates. ² Note that this does not settle the P vs. NP problem or any of the conjectures on p. 544. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 692 The Power of Monotone Circuits ² Monotone circuits can only compute monotone boolean functions. ² They are powerful enough to solve a P-complete problem, monotone circuit value (p. 266). ² There are NP-complete problems that are not monotone; they cannot be computed by monotone circuits at all. ² There are NP-complete problems that are monotone; they can be computed by monotone circuits. { hamiltonian path and clique. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 693 cliquen;k ² cliquen;k is the boolean function deciding whether a graph G = (V; E) with n nodes has a clique of size k. ¡n¢ ² The input gates are the 2 entries of the adjacency matrix of G. { Gate gij is set to true if the associated undirected edge f i; j g exists. ² cliquen;k is a monotone function. ² Thus it can be computed by a monotone circuit. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 694 Crude Circuits ² One possible circuit for cliquen;k does the following. 1. For each S ⊆ V with jSj = k, there is a circuit with O(k2) ^-gates testing whether S forms a clique. ¡n¢ 2. We then take an or of the outcomes of all the k subsets S1;S2;:::;S n . (k) ¡ ¢ 2 n ² This is a monotone circuit with O(k k ) gates, which is exponentially large unless k or n ¡ k is a constant. ² A crude circuit CC(X1;X2;:::;Xm) tests if any of Xi ⊆ V forms a clique. { The above-mentioned circuit is CC(S1;S2;:::;S n ). (k) °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 695 The Proof: Positive Examples ² Analysis will be applied to only positive examples and negative examples as inputs. ¡k¢ ² A positive example is a graph that has 2 edges connecting k nodes in all possible ways. ¡n¢ ² There are k such graphs. ² They all should elicit a true output from cliquen;k. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 696 The Proof: Negative Examples ² Color the nodes with k ¡ 1 di®erent colors and join by an edge any two nodes that are colored di®erently. ² There are (k ¡ 1)n such graphs. ² They all should elicit a false output from cliquen;k. { Each set of k nodes must have 2 identically colored nodes; hence there is no edge between them. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 697 Positive and Negative Examples with k = 5 $SRVLWLYHH[DPSOH $QHJDWLYHH[DPSOH °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 698 Sunflowers ² Fix p 2 Z+ and ` 2 Z+. ² A sunflower is a family of p sets fP1;P2;:::;Ppg, called petals, each of cardinality at most `. ² Furthermore, all pairs of sets in the family must have the same intersection (called the core of the sunflower). FRUH °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 699 A Sample Sunflower ff1; 2; 3; 5g; f1; 2; 6; 9g; f0; 1; 2; 11g; f1; 2; 12; 13g; f1; 2; 8; 10g; f1; 2; 4; 7gg: É¿³Ì Æ¿³È ÿ³ÄÄ Ç¿³Ê ÄÅ¿³ÄÆ Ë¿³Äà °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 700 The Erd}os-RadoLemma Lemma 83 Let Z be a family of more than M = (p ¡ 1)``! nonempty sets, each of cardinality ` or less. Then Z must contain a sunflower (with p petals). ² Induction on `. ² For ` = 1, p di®erent singletons form a sunflower (with an empty core). ² Suppose ` > 1. ² Consider a maximal subset D ⊆ Z of disjoint sets. { Every set in Z¡D intersects some set in D. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 701 The Proof of the Erd}os-RadoLemma (continued) For example, Z = ff1; 2; 3; 5g; f1; 3; 6; 9g; f0; 4; 8; 11g; f4; 5; 6; 7g; f5; 8; 9; 10g; f6; 7; 9; 11gg; D = ff1; 2; 3; 5g; f0; 4; 8; 11gg: °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 702 The Proof of the Erd}os-RadoLemma (continued) ² Suppose D contains at least p sets. { D constitutes a sunflower with an empty core. ² Suppose D contains fewer than p sets. { Let C be the union of all sets in D. { j C j · (p ¡ 1)`. { C intersects every set in Z by D's maximality. { There is a d 2 C that intersects more than M `¡1 (p¡1)` = (p ¡ 1) (` ¡ 1)! sets in Z. { Consider Z0 = fZ ¡ fdg : Z 2 Z; d 2 Zg. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 703 The Proof of the Erd}os-RadoLemma (concluded) ² (continued) { Z0 has more than M 0 = (p ¡ 1)`¡1(` ¡ 1)! sets. { M 0 is just M with ` replaced with ` ¡ 1. { Z0 contains a sunflower by induction, say fP1;P2;:::;Ppg: { Now, fP1 [ fdg;P2 [ fdg;:::;Pp [ fdgg is a sunflower in Z. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 704 Comments on the Erd}os-RadoLemma ² A family of more than M sets must contain a sunflower. ² Plucking a sunflower means replacing the sets in the sunflower by its core. ² By repeatedly ¯nding a sunflower and plucking it, we can reduce a family with more than M sets to a family with at most M sets. ² If Z is a family of sets, the above result is denoted by pluck(Z). ² Note: pluck(Z) is not unique. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 705 An Example of Plucking ² Recall the sunflower on p. 700: Z = ff1; 2; 3; 5g; f1; 2; 6; 9g; f0; 1; 2; 11g; f1; 2; 12; 13g; f1; 2; 8; 10g; f1; 2; 4; 7gg ² Then pluck(Z) = ff1; 2gg: °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 706 Razborov's Theorem Theorem 84 (Razborov (1985)) There is a constant c such that for large enough n, all monotone circuits for 1=4 cn1=8 cliquen;k with k = n have size at least n . ² We shall approximate any monotone circuit for cliquen;k by a restricted kind of crude circuit. ² The approximation will proceed in steps: one step for each gate of the monotone circuit. ² Each step introduces few errors (false positives and false negatives). ² But the ¯nal crude circuit has exponentially many errors. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 707 The Proof ² Fix k = n1=4. ² Fix ` = n1=8. a ² Note that µ ¶ ` 2 · k ¡ 1: 2 ² p will be ¯xed later to be n1=8 log n. ² Fix M = (p ¡ 1)``!. { Recall the Erd}os-Radolemma (p. 701). aCorrected by Mr. Moustapha Bande (D98922042) on January 05, 2010. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 708 The Proof (continued) ² Each crude circuit used in the approximation process is of the form CC(X1;X2;:::;Xm), where: { Xi ⊆ V . { jXij · `. { m · M. ² It answers true if any Xi is a clique. ² We shall show how to approximate any circuit for cliquen;k by such a crude circuit, inductively. ² The induction basis is straightforward: { Input gate gij is the crude circuit CC(fi; jg). °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 709 The Proof (continued) ² Any monotone circuit can be considered the or or and of two subcircuits. ² We shall show how to build approximators of the overall circuit from the approximators of the two subcircuits. { We are given two crude circuits CC(X ) and CC(Y). { X and Y are two families of at most M sets of nodes, each set containing at most ` nodes. { We construct the approximate or and the approximate and of these subcircuits. { Then show both approximations introduce few errors. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 710 The Proof: or ² CC(X[Y) is equivalent to the or of CC(X ) and CC(Y). { A set of nodes C 2 X [ Y is a clique if and only if C 2 X is a clique or C 2 Y is a clique. ² Violations in using CC(X[Y) occur when jX [ Yj > M. ² Such violations can be eliminated by using CC(pluck(X[Y)) as the approximate or of CC(X ) and CC(Y). °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 711 The Proof: or ² If CC(Z) is true, then CC(pluck(Z)) must be true. { The quick reason: If Y is a clique, then a subset of Y must also be a clique. { For each Y 2 X [ Y, there must exist at least one X 2 pluck(X[Y) such that X ⊆ Y . { If Y is a clique, then this X is also a clique. ² We now bound the number of errors this approximate or makes on the positive and negative examples. °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 712 The Number of False Negatives (concluded) X Y °c 2011 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 713 The Proof: or (concluded) ² CC(pluck(X[Y)) introduces a false positive if a negative example makes both CC(X ) and CC(Y) return false but makes CC(pluck(X[Y)) return true. ² CC(pluck(X[Y)) introduces a false negative if a positive example makes either CC(X ) or CC(Y) return true but makes CC(pluck(X[Y)) return false.
Recommended publications
  • On Uniformity Within NC
    On Uniformity Within NC David A Mix Barrington Neil Immerman HowardStraubing University of Massachusetts University of Massachusetts Boston Col lege Journal of Computer and System Science Abstract In order to study circuit complexity classes within NC in a uniform setting we need a uniformity condition which is more restrictive than those in common use Twosuch conditions stricter than NC uniformity RuCo have app eared in recent research Immermans families of circuits dened by rstorder formulas ImaImb and a unifor mity corresp onding to Buss deterministic logtime reductions Bu We show that these two notions are equivalent leading to a natural notion of uniformity for lowlevel circuit complexity classes Weshow that recent results on the structure of NC Ba still hold true in this very uniform setting Finallyweinvestigate a parallel notion of uniformity still more restrictive based on the regular languages Here we givecharacterizations of sub classes of the regular languages based on their logical expressibility extending recentwork of Straubing Therien and Thomas STT A preliminary version of this work app eared as BIS Intro duction Circuit Complexity Computer scientists have long tried to classify problems dened as Bo olean predicates or functions by the size or depth of Bo olean circuits needed to solve them This eort has Former name David A Barrington Supp orted by NSF grant CCR Mailing address Dept of Computer and Information Science U of Mass Amherst MA USA Supp orted by NSF grants DCR and CCR Mailing address Dept of
    [Show full text]
  • On the NP-Completeness of the Minimum Circuit Size Problem
    On the NP-Completeness of the Minimum Circuit Size Problem John M. Hitchcock∗ A. Pavany Department of Computer Science Department of Computer Science University of Wyoming Iowa State University Abstract We study the Minimum Circuit Size Problem (MCSP): given the truth-table of a Boolean function f and a number k, does there exist a Boolean circuit of size at most k computing f? This is a fundamental NP problem that is not known to be NP-complete. Previous work has studied consequences of the NP-completeness of MCSP. We extend this work and consider whether MCSP may be complete for NP under more powerful reductions. We also show that NP-completeness of MCSP allows for amplification of circuit complexity. We show the following results. • If MCSP is NP-complete via many-one reductions, the following circuit complexity amplifi- Ω(1) cation result holds: If NP\co-NP requires 2n -size circuits, then ENP requires 2Ω(n)-size circuits. • If MCSP is NP-complete under truth-table reductions, then EXP 6= NP \ SIZE(2n ) for some > 0 and EXP 6= ZPP. This result extends to polylog Turing reductions. 1 Introduction Many natural NP problems are known to be NP-complete. Ladner's theorem [14] tells us that if P is different from NP, then there are NP-intermediate problems: problems that are in NP, not in P, but also not NP-complete. The examples arising out of Ladner's theorem come from diagonalization and are not natural. A canonical candidate example of a natural NP-intermediate problem is the Graph Isomorphism (GI) problem.
    [Show full text]
  • Week 1: an Overview of Circuit Complexity 1 Welcome 2
    Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes).
    [Show full text]
  • The Complexity Zoo
    The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/.
    [Show full text]
  • University Microfilms International 300 North Zeeb Road Ann Arbor, Michigan 48106 USA St John's Road
    INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependant upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1. The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You w ill find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material. It is customary to begin photoing at the upper left hand corner of a large sheet and to continue photoing from left to right in equal sections with a small overlap. If necessary, sectioning is continued again — beginning below the first row and continuing on until complete. 4. The majority of users indicate that the textual content is of greatest value, however, a somewhat higher quality reproduction could be made from "photographs" if essential to the understanding of the dissertation.
    [Show full text]
  • The Correlation Among Software Complexity Metrics with Case Study
    International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277-7970) Volume-4 Number-2 Issue-15 June-2014 The Correlation among Software Complexity Metrics with Case Study Yahya Tashtoush1, Mohammed Al-Maolegi2, Bassam Arkok3 Abstract software product attributes such as functionality, quality, complexity, efficiency, reliability or People demand for software quality is growing maintainability. For example, a higher number of increasingly, thus different scales for the software code lines will lead to greater software complexity are growing fast to handle the quality of software. and so on. The software complexity metric is one of the measurements that use some of the internal The complexity of software effects on maintenance attributes or characteristics of software to know how activities like software testability, reusability, they effect on the software quality. In this paper, we understandability and modifiability. Software cover some of more efficient software complexity complexity is defined as ―the degree to which a metrics such as Cyclomatic complexity, line of code system or component has a design or implementation and Hallstead complexity metric. This paper that is difficult to understand and verify‖ [1]. All the presents their impacts on the software quality. It factors that make program difficult to understand are also discusses and analyzes the correlation between responsible for complexity. So it is necessary to find them. It finally reveals their relation with the measurements for software to reduce the impacts of number of errors using a real dataset as a case the complexity and guarantee the quality at the same study. time as much as possible.
    [Show full text]
  • On the Computational Complexity of Maintaining GPS Clock in Packet Scheduling
    On the Computational Complexity of Maintaining GPS Clock in Packet Scheduling Qi (George) Zhao Jun (Jim) Xu College of Computing Georgia Institute of Technology qzhao, jx ¡ @cc.gatech.edu Abstract— Packet scheduling is an important mechanism to selects the one with the lowest GPS virtual finish time provide QoS guarantees in data networks. A scheduling algorithm among the packets currently in queue to serve next. generally consists of two functions: one estimates how the GPS We study an open problem concerning the complexity lower (General Processor Sharing) clock progresses with respect to the real time; the other decides the order of serving packets based bound for computing the GPS virtual finish times of the ' on an estimation of their GPS start/finish times. In this work, we packets. This complexity has long been believed to be 01%2 answer important open questions concerning the computational per packe [11], [12], [3], [9], where 2 is the number of complexity of performing the first function. We systematically sessions. For this reason, many scheduling algorithms such study the complexity of computing the GPS virtual start/finish 89,/. ,4,/. 8!:1,/. as +-,435.76 [2], [7], [11], and [6] times of the packets, which has long been believed to be ¢¤£¦¥¨§ per packet but has never been either proved or refuted. We only approximate the GPS clock (with certain error), trading also answer several other related questions such as “whether accuracy for lower complexity. However, it has never been the complexity can be lower if the only thing that needs to be carefully studied whether the complexity lower bound of computed is the relative order of the GPS finish times of the ' tracking GPS clock perfectly is indeed 01;2 per packet.
    [Show full text]
  • Glossary of Complexity Classes
    App endix A Glossary of Complexity Classes Summary This glossary includes selfcontained denitions of most complexity classes mentioned in the b o ok Needless to say the glossary oers a very minimal discussion of these classes and the reader is re ferred to the main text for further discussion The items are organized by topics rather than by alphab etic order Sp ecically the glossary is partitioned into two parts dealing separately with complexity classes that are dened in terms of algorithms and their resources ie time and space complexity of Turing machines and complexity classes de ned in terms of nonuniform circuits and referring to their size and depth The algorithmic classes include timecomplexity based classes such as P NP coNP BPP RP coRP PH E EXP and NEXP and the space complexity classes L NL RL and P S P AC E The non k uniform classes include the circuit classes P p oly as well as NC and k AC Denitions and basic results regarding many other complexity classes are available at the constantly evolving Complexity Zoo A Preliminaries Complexity classes are sets of computational problems where each class contains problems that can b e solved with sp ecic computational resources To dene a complexity class one sp ecies a mo del of computation a complexity measure like time or space which is always measured as a function of the input length and a b ound on the complexity of problems in the class We follow the tradition of fo cusing on decision problems but refer to these problems using the terminology of promise problems
    [Show full text]
  • CS 6505: Computability & Algorithms Lecture Notes for Week 5, Feb 8-12 P, NP, PSPACE, and PH a Deterministic TM Is Said to B
    CS 6505: Computability & Algorithms Lecture Notes for Week 5, Feb 8-12 P, NP, PSPACE, and PH A deterministic TM is said to be in SP ACE (s (n)) if it uses space O (s (n)) on inputs of length n. Additionally, the TM is in TIME(t (n)) if it uses time O(t (n)) on such inputs. A language L is polynomial-time decidable if ∃k and a TM M to decide L such that M ∈ TIME(nk). (Note that k is independent of n.) For example, consider the langage P AT H, which consists of all graphsdoes there exist a path between A and B in a given graph G. The language P AT H has a polynomial-time decider. We can think of other problems with polynomial-time decider: finding a median, calculating a min/max weight spanning tree, etc. P is the class of languages with polynomial time TMs. In other words, k P = ∪kTIME(n ) Now, do all decidable languages belong to P? Let’s consider a couple of lan- guages: HAM PATH: Does there exist a path from s to t that visits every vertex in G exactly once? SAT: Given a Boolean formula, does there exist a setting of its variables that makes the formula true? For example, we could have the following formula F : F = (x1 ∨ x2 ∨ x3) ∧ (x1 ∨ x2 ∨ x3) ∧ (x1 ∨ x2 ∨ x3) The assignment x1 = 1, x2 = 0, x3 = 0 is a satisfying assignment. No polynomial time algorithms are known for these problems – such algorithms may or may not exist.
    [Show full text]
  • A Study of the NEXP Vs. P/Poly Problem and Its Variants by Barıs
    A Study of the NEXP vs. P/poly Problem and Its Variants by Barı¸sAydınlıoglu˘ A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Sciences) at the UNIVERSITY OF WISCONSIN–MADISON 2017 Date of final oral examination: August 15, 2017 This dissertation is approved by the following members of the Final Oral Committee: Eric Bach, Professor, Computer Sciences Jin-Yi Cai, Professor, Computer Sciences Shuchi Chawla, Associate Professor, Computer Sciences Loris D’Antoni, Asssistant Professor, Computer Sciences Joseph S. Miller, Professor, Mathematics © Copyright by Barı¸sAydınlıoglu˘ 2017 All Rights Reserved i To Azadeh ii acknowledgments I am grateful to my advisor Eric Bach, for taking me on as his student, for being a constant source of inspiration and guidance, for his patience, time, and for our collaboration in [9]. I have a story to tell about that last one, the paper [9]. It was a late Monday night, 9:46 PM to be exact, when I e-mailed Eric this: Subject: question Eric, I am attaching two lemmas. They seem simple enough. Do they seem plausible to you? Do you see a proof/counterexample? Five minutes past midnight, Eric responded, Subject: one down, one to go. I think the first result is just linear algebra. and proceeded to give a proof from The Book. I was ecstatic, though only for fifteen minutes because then he sent a counterexample refuting the other lemma. But a third lemma, inspired by his counterexample, tied everything together. All within three hours. On a Monday midnight. I only wish that I had asked to work with him sooner.
    [Show full text]
  • A Short History of Computational Complexity
    The Computational Complexity Column by Lance FORTNOW NEC Laboratories America 4 Independence Way, Princeton, NJ 08540, USA [email protected] http://www.neci.nj.nec.com/homepages/fortnow/beatcs Every third year the Conference on Computational Complexity is held in Europe and this summer the University of Aarhus (Denmark) will host the meeting July 7-10. More details at the conference web page http://www.computationalcomplexity.org This month we present a historical view of computational complexity written by Steve Homer and myself. This is a preliminary version of a chapter to be included in an upcoming North-Holland Handbook of the History of Mathematical Logic edited by Dirk van Dalen, John Dawson and Aki Kanamori. A Short History of Computational Complexity Lance Fortnow1 Steve Homer2 NEC Research Institute Computer Science Department 4 Independence Way Boston University Princeton, NJ 08540 111 Cummington Street Boston, MA 02215 1 Introduction It all started with a machine. In 1936, Turing developed his theoretical com- putational model. He based his model on how he perceived mathematicians think. As digital computers were developed in the 40's and 50's, the Turing machine proved itself as the right theoretical model for computation. Quickly though we discovered that the basic Turing machine model fails to account for the amount of time or memory needed by a computer, a critical issue today but even more so in those early days of computing. The key idea to measure time and space as a function of the length of the input came in the early 1960's by Hartmanis and Stearns.
    [Show full text]
  • Multiparty Communication Complexity and Threshold Circuit Size of AC^0
    2009 50th Annual IEEE Symposium on Foundations of Computer Science Multiparty Communication Complexity and Threshold Circuit Size of AC0 Paul Beame∗ Dang-Trinh Huynh-Ngoc∗y Computer Science and Engineering Computer Science and Engineering University of Washington University of Washington Seattle, WA 98195-2350 Seattle, WA 98195-2350 [email protected] [email protected] Abstract— We prove an nΩ(1)=4k lower bound on the random- that the Generalized Inner Product function in ACC0 requires ized k-party communication complexity of depth 4 AC0 functions k-party NOF communication complexity Ω(n=4k) which is in the number-on-forehead (NOF) model for up to Θ(log n) polynomial in n for k up to Θ(log n). players. These are the first non-trivial lower bounds for general 0 NOF multiparty communication complexity for any AC0 function However, for AC functions much less has been known. for !(log log n) players. For non-constant k the bounds are larger For the communication complexity of the set disjointness than all previous lower bounds for any AC0 function even for function with k players (which is in AC0) there are lower simultaneous communication complexity. bounds of the form Ω(n1=(k−1)=(k−1)) in the simultaneous Our lower bounds imply the first superpolynomial lower bounds NOF [24], [5] and nΩ(1=k)=kO(k) in the one-way NOF for the simulation of AC0 by MAJ ◦ SYMM ◦ AND circuits, showing that the well-known quasipolynomial simulations of AC0 model [26]. These are sub-polynomial lower bounds for all by such circuits are qualitatively optimal, even for formulas of non-constant values of k and, at best, polylogarithmic when small constant depth.
    [Show full text]