A Framework of Quantum Strong Exponential-Time Hypotheses
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Thesis Is Owed to Him, Either Directly Or Indirectly
UvA-DARE (Digital Academic Repository) Quantum Computing and Communication Complexity de Wolf, R.M. Publication date 2001 Document Version Final published version Link to publication Citation for published version (APA): de Wolf, R. M. (2001). Quantum Computing and Communication Complexity. Institute for Logic, Language and Computation. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:30 Sep 2021 Quantum Computing and Communication Complexity Ronald de Wolf Quantum Computing and Communication Complexity ILLC Dissertation Series 2001-06 For further information about ILLC-publications, please contact Institute for Logic, Language and Computation Universiteit van Amsterdam Plantage Muidergracht 24 1018 TV Amsterdam phone: +31-20-525 6051 fax: +31-20-525 5206 e-mail: [email protected] homepage: http://www.illc.uva.nl/ Quantum Computing and Communication Complexity Academisch Proefschrift ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magni¯cus prof.dr. -
The Complexity Zoo
The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/. -
User's Guide for Complexity: a LATEX Package, Version 0.80
User’s Guide for complexity: a LATEX package, Version 0.80 Chris Bourke April 12, 2007 Contents 1 Introduction 2 1.1 What is complexity? ......................... 2 1.2 Why a complexity package? ..................... 2 2 Installation 2 3 Package Options 3 3.1 Mode Options .............................. 3 3.2 Font Options .............................. 4 3.2.1 The small Option ....................... 4 4 Using the Package 6 4.1 Overridden Commands ......................... 6 4.2 Special Commands ........................... 6 4.3 Function Commands .......................... 6 4.4 Language Commands .......................... 7 4.5 Complete List of Class Commands .................. 8 5 Customization 15 5.1 Class Commands ............................ 15 1 5.2 Language Commands .......................... 16 5.3 Function Commands .......................... 17 6 Extended Example 17 7 Feedback 18 7.1 Acknowledgements ........................... 19 1 Introduction 1.1 What is complexity? complexity is a LATEX package that typesets computational complexity classes such as P (deterministic polynomial time) and NP (nondeterministic polynomial time) as well as sets (languages) such as SAT (satisfiability). In all, over 350 commands are defined for helping you to typeset Computational Complexity con- structs. 1.2 Why a complexity package? A better question is why not? Complexity theory is a more recent, though mature area of Theoretical Computer Science. Each researcher seems to have his or her own preferences as to how to typeset Complexity Classes and has built up their own personal LATEX commands file. This can be frustrating, to say the least, when it comes to collaborations or when one has to go through an entire series of files changing commands for compatibility or to get exactly the look they want (or what may be required). -
Noise in Quantum and Classical Computation & Non-Locality
Noise in Quantum and Classical Computation & Non-locality Falk Unger Noise in Quantum and Classical Computation & Non-locality ILLC Dissertation Series DS-2008-06 For further information about ILLC-publications, please contact Institute for Logic, Language and Computation Universiteit van Amsterdam Plantage Muidergracht 24 1018 TV Amsterdam phone: +31-20-525 6051 fax: +31-20-525 5206 e-mail: [email protected] homepage: http://www.illc.uva.nl/ Noise in Quantum and Classical Computation & Non-locality Academisch Proefschrift ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof. dr. D.C. van den Boom ten overstaan van een door het college voor promoties ingestelde commissie, in het openbaar te verdedigen in de Agnietenkapel op donderdag 18 september 2008, te 10.00 uur door Falk Peter Unger geboren te Dresden, Duitsland. Promotiecommissie: Promotor: prof. dr. H.M. Buhrman Overige Leden: prof. dr. R.E. Cleve prof. dr. R.D. Gill prof. dr. A. Schrijver dr. L. Torenvliet dr. R.M. de Wolf Faculteit der Natuurwetenschappen, Wiskunde en Informatica The investigations were financially supported by the EU project QAP (IST- 2005-15848) and by the Netherlands Organisation for Scientific Research (NWO) in the framework of the Innovational Research Incentives Scheme (in Dutch: Vernieuwingsimpuls), Vici-project 639.023.302. Copyright c 2008 by Falk Unger Printed and bound by PrintPartners Ipskamp. ISBN: 90-6196-547-0 The results in this thesis are based on the following articles Chapter 3 The results -
Space Complexity
Chapter 3 Space complexity “(our) construction... also suggests that what makes “games” harder than “puzzles” (e.g. NP-complete problems) is the fact that the initiative (“the move”) can shift back and forth between the players.” Shimon Even and Robert Tarjan, 1976 In this chapter we will study the memory requirements of computational tasks. To do this we define space-bounded computation, which has to be per- formed by the TM using a restricted number of tape cells, the number being a function of the input size. We also study nondeterministic space-bounded TMs. As in the chapter on NP, our goal in introducing a complexity class is to “capture” interesting computational phenomena— in other words, iden- tify an interesting set of computational problems that lie in the complexity class and are complete for it. One phenomenon we will “capture” this way (see Section 3.3.2) concerns computation of winning strategies in 2-person games, which seems inherently different from (and possibly more difficult than) solving NP problems such as SAT, as alluded to in the above quote. The formal definition of deterministic and non-deterministic space bounded computation is as follows (see also Figure 3.1): Definition 3.1 (Space-bounded computation.) ∗ Let S : N → N and L ⊆ {0, 1} . We say that L ∈ SPACE(s(n)) (resp. L ∈ NSPACE(s(n))) if there is a constant c and TM (resp. NDTM) M deciding L such that on every input x ∈ {0, 1}∗, the total number of locations that are at some point non-blank during M’s execution on x is at most c·s(|x|). -
PSPACE-Completeness & Savitch's Theorem 1 Recap
CSE 200 Computability and Complexity Wednesday, April 24, 2013 Lecture 8: PSPACE-Completeness & Savitch's Theorem Instructor: Professor Shachar Lovett Scribe: Dongcai Shen 1 Recap: Space Complexity Recall the following definitions on space complexity we learned in the last class: SPACE(S(n))def= \languages computable by a TM where input tape is readonly and work tape size S(n)" LOGSPACEdef= SPACE(O(log n)) def c PSPACE = [c≥1 SPACE(n ) For example, nowadays, people are interested in streaming algorithms, whose space requirements are low. So researching on space complexity can have real-world influence, especially in instructing people the way an algorithm should be designed and directing people away from some impossible attempts. Definition 1 (Nondeterministic Space NSPACE) The nondeterministic space NSPACE(S(n))def= • Input tape, read-only. • Proof tape, read-only & read-once. • Work tape size S(n). So, we can define • NLdef= NSPACE(O(log n)). def c • NPSPACE = [c≥1 NSPACE(n ). def Theorem 2 PATH = f(G; s; t): G directed graph, s; t vertices, there is a path s t in Gg is NL-complete un- der logspace reduction. Corollary 3 If we could find a deterministic algorithm for PATH in SPACE(O(log n)), then NL = L. Remark. Nondeterminism is pretty useless w.r.t. space. We don't know whether NL = L yet. 2 Outline of Today Definition 4 (Quantified Boolean formula) A quantified Boolean formula is 8x19x28x39x4 ··· φ(x1; ··· ; xn) def where φ is a CNF. Let TQBF = fA true QBFg. Theorem 5 TQBF is PSPACE-complete under poly-time reduction (and actually under logspace reductions). -
Algorithms Versus Circuit Lower Bounds
Algorithms versus Circuit Lower Bounds Igor C. Oliveira∗ Department of Computer Science Columbia University [email protected] November 4, 2018 Abstract Different techniques have been used to prove several transference theorems of the form “non- trivial algorithms for a circuit class C yield circuit lower bounds against C”. In this survey we revisit many of these results. We discuss how circuit lower bounds can be obtained from deran- domization, compression, learning, and satisfiability algorithms. We also cover the connection between circuit lower bounds and useful properties, a notion that turns out to be fundamental in the context of these transference theorems. Along the way, we obtain a few new results, simplify several proofs, and show connections involving different frameworks. We hope that our presentation will serve as a self-contained introduction for those interested in pursuing research in this area. arXiv:1309.0249v1 [cs.CC] 1 Sep 2013 ∗ Research supported by NSF grants CCF-1116702 and CCF-1115703. 1 Contents 1 Introduction 3 1.1 Asummaryofsomeknownresults . ...... 4 1.1.1 Satisfiability algorithms and circuit lower bounds . .............. 4 1.1.2 Constructivity and circuit lower bounds . .......... 5 1.1.3 Additional transference theorems . ......... 6 1.2 A guide to the results discussed in this survey . ............. 8 1.2.1 Lower bounds from satisfiability algorithms for low depth circuits . 8 1.2.2 Useful properties and circuit lower bounds . ........... 8 1.2.3 Applications .................................. 10 1.2.4 Anoverviewoftheresults . ..... 11 2 Preliminaries and Notation 11 3 Lower bounds from SAT algorithms for low depth circuits 14 3.1 Aremarkforthealgorithmdesigner . ......... 17 4 Useful properties and circuit lower bounds 17 4.1 Satisfiability algorithms and useful properties . -
Exercise 1 January, 2018
January, 2018 Computational Complexity Exercise 1 1. Show that if any NP-complete language L is in co-NP, then co-NP=NP. 2. Show that if g(n) = o(f(n)), f(n) ≥ log n space constructible, then Nspace(g(n)) 6= Nspace(f(n) log f(n)). (Hint: Let L 2 Nspace(g(n)). Assume that you have two non- deterministic machines M and M, each using O(g(n)) space accepting L and L (why should such machines exist?). Now you can use these machines to do a diagonal argument as in the proof of the deterministic space hierarchy theorem). S i 3. Define polyL as i Dspace(log n). Steve's class SC=fL : 9 constants k; l and a deter- ministic Turing machine M such that M accepts L in O(nk) space and O(logl n) time g Why does it NOT follow from the definition that SC=PolyL or SC = polyL\P? S i 4. We have defined NP as i≥0NTIME(n ). Here is an alternative definition. We define NP to be the class of all languages L ⊆ Σ∗ such that there is a deterministic Turing machine M that runs in time polynomial in the size of its input and an integer k such that if x 2 L then there exists y 2 Σ∗ with jyj ≤ jxjk and M(x; y) = 1 whereas, if x2 = L, for all y 2 Σ∗ M(x; y) = 0. This is the certificate characterization of the class NP (See Korman et.al., Introduction to algorithms for a treatment of NP-completeness using this definition). -
Computational Complexity
Computational complexity lecture 6 Homework: available on the webpage, deadline: 27.11.2017 Determinization Theorem (previous lecture) NTIME(f(n))⊆DSPACE(f(n)) Theorem (now) f(n)+log(n) NSPACE(f(n))⊆cℕDTIME(c ) Determinization Theorem f(n)+log(n) NSPACE(f(n))⊆cℕDTIME(c ) Proof ● We have a nondeterm. machine M working in space g(n)=O(f(n)). W.l.o.g. we assume that M has only one working tape. Determinization Theorem f(n)+log(n) NSPACE(f(n))⊆cℕDTIME(c ) Proof ● We have a nondeterm. machine M working in space g(n)=O(f(n)). W.l.o.g. we assume that M has only one working tape. ● A configuration of M on a fixed input of length n can be represented as: ➔ contents of the working tape, with a marker over the position of the head – (2|G|)g(n) possibilities ➔ a position of the head on the input tape – n+2 possibilities ➔ a state (a constant number of possibilities) ● Altogether, there are dg(n)+log(n) configurations (for some constant d) Determinization Theorem f(n)+log(n) NSPACE(f(n))⊆cℕDTIME(c ) Proof ● We have a nondeterm. machine M working in space g(n)=O(f(n)). W.l.o.g. we assume that M has only one working tape. ● A configuration of M on a fixed input of length n can be represented as: ➔ contents of the working tape, with a marker over the position of the head – (2|G|)g(n) possibilities ➔ a position of the head on the input tape – n+2 possibilities ➔ a state (a constant number of possibilities) ● Altogether, there are dg(n)+log(n) configurations (for some constant d) ● Checking that there is an accepting run amount to checking reachability in the (directed) configuration graph. -
Computational Complexity: a Modern Approach
i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University [email protected] Not to be reproduced or distributed without the authors’ permission This is an Internet draft. Some chapters are more finished than others. References and attributions are very preliminary and we apologize in advance for any omissions (but hope you will nevertheless point them out to us). Please send us bugs, typos, missing references or general comments to [email protected] — Thank You!! DRAFT ii DRAFT Chapter 4 Space complexity “(our) construction... also suggests that what makes “games” harder than “puzzles” (e.g. NP-complete problems) is the fact that the initiative (“the move”) can shift back and forth between the players.” Shimon Even and Robert Tarjan, 1976 In this chapter we will study the memory requirements of computational tasks. To do this we define space-bounded computation, which has to be performed by the TM using a restricted number of tape cells, the number being a function of the input size. We also study nondeterministic space- bounded TMs. As in the chapter on NP, our goal in introducing a complexity class is to “capture” interesting computational phenomena— in other words, identify an interesting set of computational problems that lie in the complexity class and are complete for it. One phenomenon we will “capture” this way (see Section 4.3.2) concerns computation of winning strategies in 2-person games, which seems inherently different from (and possibly more difficult than) solving NP problems such as SAT, as alluded to in the above quote. -
Classical and Quantum Algorithms for Finding Cycles
City University of New York (CUNY) CUNY Academic Works Publications and Research CUNY Graduate Center 2006 Classical and Quantum Algorithms for Finding Cycles Jill Cirasella CUNY Graduate Center How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_pubs/169 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Classical and Quantum Algorithms for Finding Cycles MSc Thesis (Afstudeerscriptie) written by Jill Cirasella (born in 1976 in New Jersey, United States) under the supervision of Prof. Dr. Harry Buhrman, and submitted to the Board of Examiners in partial fulfillment of the requirements for the degree of MSc in Logic at the Universiteit van Amsterdam. Date of the public defense: Members of the Thesis Committee: January 26, 2006 Prof. Dr. Harry Buhrman Dr. Benedikt L¨owe Dr. Ronald de Wolf Abstract Quantum computing—so weird, so wonderful—inspires much speculation about the line be- tween the possible and the impossible. (Of course, there is still unclarity about how “impossi- ble” intractable problems are and about how “possible” quantum computers are.) This thesis takes a slightly different tack: instead of focusing on how to make the impossible possible, it focuses on how to make the possible easier. More specifically, this paper discusses quantum algorithms for finding cycles in graphs, a problem for which polynomial-time classical algorithms already exist. It explains and com- pares the classical and quantum algorithms, and it introduces a few new algorithms and observations. -
CSE200: Computability and Complexity Fall 2008, Homework 6
CSE200: Computability and Complexity Fall 2008, Homework 6 Instructor: Daniele Micciancio Due Tuesday November 18, 2008 Problem 1: Log-space, Polylog-space (a) Recall the WHILE language we were using in the first homeworks. The input to any WHILE program is encoded as a single list (which has as elements other lists and so on). For instance the string [[][[]][][[[]]]] is a valid input to a WHILE program whereas [][[][]] (two separate lists) and []][ (right parenthesis not preceded by a left one) aren’t. Consider the following set of Valid WHILE Inputs ∗ VWI = {x ∈ {[, ]} x is a Valid WHILE Input} Show that VWI ∈ L. (b) Consider the polylogarithmic space complexity class defined in class as follows [ polyL = SP ACE(logkn) k>0 We say that a language C is polyL-complete if: • C ∈ polyL and • A ≤L C for every A ∈ polyL. (every polylogarithmic space language is log-space (map) reducible to C). (i) Show that NL ⊂ polyL (ii) Show that there exist no polyL-complete problems under the above definition of completeness. (iii) Show that polyL 6= P. (iv) Part (iii) implies that either (a) polyL ⊂ P, or (b) P ⊂ polyL or (c) polyL ⊂ polyL∪P and P ⊂ polyL∪P (none of them is strictly contained in the other). Note that (a), (b), (c) are mutually exclusive. So, part (iii) shows that one and only one of (a), (b) or (c) holds true. Still which of the three cases holds true is not currently known. Justify why deterining which of (a), (b) or (c) holds true might be pretty hard question, by pointing out the implications each of these three relations would have.