Clique Is Hard on Average for Regular Resolution

Total Page:16

File Type:pdf, Size:1020Kb

Clique Is Hard on Average for Regular Resolution Clique Is Hard on Average for Regular Resolution Albert Atserias Ilario Bonacina Susanna F. de Rezende Universitat Politècnica de Catalunya Universitat Politècnica de Catalunya KTH Royal Institute of Technology Department of Computer Science Department of Computer Science School of Electrical Engineering and Barcelona, Spain Barcelona, Spain Computer Science [email protected] [email protected] Stockholm, Sweden [email protected] Massimo Lauria Jakob Nordström Alexander Razborov Sapienza Università di Roma KTH Royal Institute of Technology University of Chicago Department of Statistical Sciences School of Electrical Engineering and Chicago, USA Rome, Italy Computer Science [email protected] [email protected] Stockholm, Sweden Steklov Mathematical Institute [email protected] Moscow, Russia [email protected] ABSTRACT there does not even exist any polynomial-time algorithm for ap- p 1−ϵ We prove that for k ≪ 4 n regular resolution requires length nΩ¹kº proximating the maximal size of a clique to within a factor n to establish that an Erdős–Rényi graph with appropriately cho- for any constant ϵ > 0, where n is the number of vertices in the sen edge density does not contain a k-clique. This lower bound graph [13, 34]. Furthermore, the problem appears to be hard not is optimal up to the multiplicative constant in the exponent, and only in the worst case but also on average in the Erdős-Rényi ran- also implies unconditional nΩ¹kº lower bounds on running time for dom graph model—we know of no efficient algorithms for finding several state-of-the-art algorithms for finding maximum cliques in cliques of maximum size asymptotically almost surely on random graphs. graphs with appropriate edge densities [16, 31]. In terms of upper bounds, the k-clique problem can clearly be k n CCS CONCEPTS solved in time roughly n simply by checking if any of the k many sets of vertices of size k forms a clique, which is polynomial • Theory of computation → Proof complexity; • Mathemat- k ¹nωk/3º ics of computing → Random graphs; if is constant. This can be improved slightly to O using algebraic techniques [26], where ω ≤ 2:373 is the matrix multipli- KEYWORDS cation exponent, although in practice such algebraic algorithms are outperformed by combinatorial ones [33]. k Proof complexity, regular resolution, -clique, Erdős-Rényi random The motivating problem behind this work is to determine the graphs exact time complexity of the clique problem when k is given as a ACM Reference Format: parameter. As noted above, all known algorithms require time nΩ¹kº. Albert Atserias, Ilario Bonacina, Susanna F. de Rezende, Massimo Lauria, It appears quite likely that some dependence on k is needed in the Jakob Nordström, and Alexander Razborov. 2018. Clique Is Hard on Aver- exponent, since otherwise we have the parameterized complexity Proceedings of 50th Annual ACM SIGACT age for Regular Resolution . In collapse FPT = W[1] [11]. Even more can be said if we are willing Symposium on the Theory of Computing (STOC’18). ACM, New York, NY, to believe the Exponential Time Hypothesis (ETH) [14]—then the USA, 12 pages. https://doi.org/10.1145/3188745.3188856 exponent has to depend linearly on k [8], so that the trivial upper 1 INTRODUCTION bound is essentially tight. Obtaining such a lower bound unconditionally would, in par- Deciding whether a graph has a k-clique is one of the most basic ticular, imply P , NP, and so currently seems completely out of computational problems on graphs, and has been extensively stud- reach. But is it possible to prove nΩ¹kº lower bounds in restricted ied in computational complexity theory ever since it appeared in but nontrivial models of computation? For circuit complexity, this Karp’s list of 21 NP-complete problems [15]. Not only is this prob- challenge has been met for circuits that are of bounded depth [30] lem widely believed to be infeasible to solve exactly—unless P = NP or are monotone [32]. In this paper we focus on computational Permission to make digital or hard copies of all or part of this work for personal or models that are powerful enough to capture algorithms that are classroom use is granted without fee provided that copies are not made or distributed used in practice. for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM When analysing such algorithms, it is convenient to view the must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, execution trace as a proof establishing the maximal clique size to post on servers or to redistribute to lists, requires prior specific permission and/or a for the input graph. In particular, if this graph does not have a fee. Request permissions from [email protected]. STOC’18, June 25–29, 2018, Los Angeles, CA, USA k-clique, then the trace provides an efficiently verifiable proof of © 2018 Association for Computing Machinery. the statement that the graph is k-clique-free. If one can establish a ACM ISBN 978-1-4503-5559-9/18/06...$15.00 lower bound on the length of such proofs, then this implies a lower https://doi.org/10.1145/3188745.3188856 866 STOC’18, June 25–29, 2018, Los Angeles, CA, USA A. Atserias, I. Bonacina, S. de Rezende, M. Lauria, J. Nordström, and A. Razborov bound on the running time of the algorithm, and this lower bound resolution might be able to certify k-clique-freeness in polynomial holds even if the algorithm is a non-deterministic heuristic that length independent of the value of k. somehow magically gets to make all the right choices. This brings Our contribution. We prove optimal nΩ¹kº average-case lower us to the topic of proof complexity [9], which can be viewed as the bounds for regular resolution proofs of unsatisfiability for k-clique study of upper and lower bounds in restricted nondeterministic formulas on Erdős-Rényi random graphs. computational models. p Using a standard reduction from k-clique to SAT, we can trans- Theorem 1.1 (Informal). For any integer k ≪ 4 n, given an late the problem of k-cliques in graphs to that of satisfiability of n-vertex graph G sampled at random from the Erdős-Rényi model formulas in conjunctive normal form (CNF). If an algorithm for with the appropriate edge density, regular resolution asymptotically finding k-cliques is run on a graph G that is k-clique-free, then we almost surely requires length nΩ¹kº to certify that G does not contain can extract a proof of the unsatisfiability of the corresponding CNF a k-clique. formula—the k-clique formula on G—from the execution trace of In order to make this formal, we need to define how the prob- the algorithm. Is it possible to show any non-trivial lower bound lem is encoded: depending on the formula considered, the exact on the length of such proofs? Specifically, does the resolution proof statement of what we can prove differs. In this conference paper system—the method of reasoning underlying state-of-the-art SAT we consider the simpler encoding for which we can prove an nΩ¹kº Ω¹kº ω ¹1º p solvers [2, 23, 25]—require length n , or at least n k , to prove lower bound for k ≪ n. For a stronger encoding, which in par- the absence of k-cliques in a graph? This question was asked in, ticular captures this simpler one, we prove the above result in the e.g., [7] and remains open. full-length version of this paper. The hardness of k-clique formulas for resolution is also a problem At a high level, the proof is based on a bottleneck counting of intrinsic interest in proof complexity, since these formulas escape argument in the style of [12] with a slight twist that was introduced known methods of proving resolution lower bounds for a range in [29]. In its classical form, such a proof takes four steps. First, of interesting values of k including k = O¹1º. In particular, the one defines a distribution of random source-to-sink paths onthe interpolation technique [18, 28], the random restriction method [4], DAG representation of the proof. Second, a subset of the vertices and the size-width lower bound [5] all seem to fail. of the DAG is identified—the set of bottleneck nodes—such that To make this more precise, we should mention that some previ- any random path must necessarily pass through at least one such ous works do use the size-width method, but only for very large k. node. Third, for any fixed bottleneck node, one shows that it is very 5/6 It was shown in [3] that for n ≪ k ≤ n/3 resolution requires unlikely that a random path passes through this particular node. Ω¹1º length exp n to certify that a dense enough Erdős-Rényi ran- Given this, a final union bound argument yields the conclusion that dom graph is k-clique-free. The constant hidden in the Ω¹1º in- the DAG must have many bottleneck nodes, and so the resolution creases with the density of the graph and, in particular, for very proof must be long. Ω¹nº dense graphs and k = n/3 the length required is 2 . Also, for The twist in our argument is that, instead of single bottleneck a specially tailored CNF encoding, where the ith member of the nodes, we need to define bottleneck pairs of nodes. We then argue claimed k-clique is encoded in binary by logn variables, a lower that any random path passes through at least one such pair but ¹ º bound of nΩ k for k ≤ logn can be extracted from a careful read- that few random paths pass through any fixed pair; the latter part ing of [21].
Recommended publications
  • Automating Cutting Planes Is NP-Hard
    Automating Cutting Planes is NP-Hard Mika G¨o¨os† Sajin Koroth Ian Mertz Toniann Pitassi Stanford University Simon Fraser University Uni. of Toronto Uni. of Toronto & IAS April 20, 2020 Abstract We show that Cutting Planes (CP) proofs are hard to find: Given an unsatisfiable formula F , (1) it is NP-hard to find a CP refutation of F in time polynomial in the length of the shortest such refutation; and (2) unless Gap-Hitting-Set admits a nontrivial algorithm, one cannot find a tree-like CP refutation of F in time polynomial in the length of the shortest such refutation. The first result extends the recent breakthrough of Atserias and M¨uller (FOCS 2019) that established an analogous result for Resolution. Our proofs rely on two new lifting theorems: (1) Dag-like lifting for gadgets with many output bits. (2) Tree-like lifting that simulates an r-round protocol with gadgets of query complexity O(log r) independent of input length. Contents 1 Introduction1 4.1 Subcubes from simplices . .9 1.1 Cutting Planes . .1 4.2 Simplified proof . 11 1.2 Dag-like result . .2 4.3 Accounting for error . 12 1.3 Tree-like result . .2 5 Tree-like definitions 13 2 Overview of proofs3 5.1 Tree-like dags/proofs . 13 2.1 Dag-like case . .3 5.2 Real protocols . 14 arXiv:2004.08037v1 [cs.CC] 17 Apr 2020 2.2 Tree-like case . .4 6 Tree-like lifting 14 3 Dag-like definitions6 6.1 Proof of real lifting . 14 3.1 Standard models .
    [Show full text]
  • A New Spectral Bound on the Clique Number of Graphs
    A New Spectral Bound on the Clique Number of Graphs Samuel Rota Bul`o and Marcello Pelillo Dipartimento di Informatica - University of Venice - Italy {srotabul,pelillo}@dsi.unive.it Abstract. Many computer vision and patter recognition problems are intimately related to the maximum clique problem. Due to the intractabil- ity of this problem, besides the development of heuristics, a research di- rection consists in trying to find good bounds on the clique number of graphs. This paper introduces a new spectral upper bound on the clique number of graphs, which is obtained by exploiting an invariance of a continuous characterization of the clique number of graphs introduced by Motzkin and Straus. Experimental results on random graphs show the superiority of our bounds over the standard literature. 1 Introduction Many problems in computer vision and pattern recognition can be formulated in terms of finding a completely connected subgraph (i.e. a clique) of a given graph, having largest cardinality. This is called the maximum clique problem (MCP). One popular approach to object recognition, for example, involves matching an input scene against a stored model, each being abstracted in terms of a relational structure [1,2,3,4], and this problem, in turn, can be conveniently transformed into the equivalent problem of finding a maximum clique of the corresponding association graph. This idea was pioneered by Ambler et. al. [5] and was later developed by Bolles and Cain [6] as part of their local-feature-focus method. Now, it has become a standard technique in computer vision, and has been employing in such diverse applications as stereo correspondence [7], point pattern matching [8], image sequence analysis [9].
    [Show full text]
  • Some Hardness Escalation Results in Computational Complexity Theory Pritish Kamath
    Some Hardness Escalation Results in Computational Complexity Theory by Pritish Kamath B.Tech. Indian Institute of Technology Bombay (2012) S.M. Massachusetts Institute of Technology (2015) Submitted to Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering & Computer Science at Massachusetts Institute of Technology February 2020 ⃝c Massachusetts Institute of Technology 2019. All rights reserved. Author: ............................................................. Department of Electrical Engineering and Computer Science September 16, 2019 Certified by: ............................................................. Ronitt Rubinfeld Professor of Electrical Engineering and Computer Science, MIT Thesis Supervisor Certified by: ............................................................. Madhu Sudan Gordon McKay Professor of Computer Science, Harvard University Thesis Supervisor Accepted by: ............................................................. Leslie A. Kolodziejski Professor of Electrical Engineering and Computer Science, MIT Chair, Department Committee on Graduate Students Some Hardness Escalation Results in Computational Complexity Theory by Pritish Kamath Submitted to Department of Electrical Engineering and Computer Science on September 16, 2019, in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science & Engineering Abstract In this thesis, we prove new hardness escalation results in computational complexity theory; a phenomenon where hardness results against seemingly weak models of computation for any problem can be lifted, in a black box manner, to much stronger models of computation by considering a simple gadget composed version of the original problem. For any unsatisfiable CNF formula F that is hard to refute in the Resolution proof system, we show that a gadget-composed version of F is hard to refute in any proof system whose lines are computed by efficient communication protocols.
    [Show full text]
  • A Fast Algorithm for the Maximum Clique Problem Patric R
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Discrete Applied Mathematics 120 (2002) 197–207 A fast algorithm for the maximum clique problem Patric R. J. Osterg%# ard ∗ Department of Computer Science and Engineering, Helsinki University of Technology, P.O. Box 5400, 02015 HUT, Finland Received 12 October 1999; received in revised form 29 May 2000; accepted 19 June 2001 Abstract Given a graph, in the maximum clique problem, one desires to ÿnd the largest number of vertices, any two of which are adjacent. A branch-and-bound algorithm for the maximum clique problem—which is computationally equivalent to the maximum independent (stable) set problem—is presented with the vertex order taken from a coloring of the vertices and with a new pruning strategy. The algorithm performs successfully for many instances when applied to random graphs and DIMACS benchmark graphs. ? 2002 Elsevier Science B.V. All rights reserved. 1. Introduction We denote an undirected graph by G =(V; E), where V is the set of vertices and E is the set of edges. Two vertices are said to be adjacent if they are connected by an edge. A clique of a graph is a set of vertices, any two of which are adjacent. Cliques with the following two properties have been studied over the last three decades: maximal cliques, whose vertices are not a subset of the vertices of a larger clique, and maximum cliques, which are the largest among all cliques in a graph (maximum cliques are clearly maximal).
    [Show full text]
  • IAN MERTZ Contact Research Theory Group [email protected] Department of Computer Science University of Toronto
    IAN MERTZ Contact Research www.cs.toronto.edu/∼mertz Theory Group [email protected] Department of Computer Science University of Toronto EDUCATION University of Toronto, Toronto, ON ................................................................... Winter 2018- Ph.D. in Computer Science Advisor: Toniann Pitassi University of Toronto, Toronto, ON .......................................................... Fall 2016-Winter 2018 Masters in Science, Computer Science Advisor: Toniann Pitassi, Stephen Cook Rutgers University, Piscataway, NJ ........................................................... Fall 2012-Spring 2016 B.S. in Computer Science, B.A. in Mathematics, B.A. in East Asian Language Studies (concentration in Japanese) Summa cum laude, honors program, Dean's List PUBLICATIONS Lifting is as easy as 1,2,3 Ian Mertz, Toniann Pitassi In submission, STOC '21. Automating Cutting Planes is NP-hard Mika G¨o¨os,Sajin Koroth, Ian Mertz, Toniann Pitassi In Proc. 52nd ACM Symposium on Theory of Computing (STOC '20), Association for Computing Machinery (ACM), 84 (132) pp. 68-77, 2020. Catalytic Approaches to the Tree Evaluation Problem James Cook, Ian Mertz In Proc. 52nd ACM Symposium on Theory of Computing (STOC '20), Association for Computing Machinery (ACM), 84 (132) pp. 752-760, 2020. Short Proofs Are Hard to Find Ian Mertz, Toniann Pitassi, Yuanhao Wei In Proc. 46th International Colloquium on Automata, Languages and Programming (ICALP '19), Leibniz International Proceedings in Informatics (LIPIcs), 84 (132) pp. 1-16, 2019. Dual VP Classes Eric Allender, Anna G´al,Ian Mertz computational complexity, 25 pp. 1-43, 2016. An earlier version appeared in Proc. 40th International Symposium on Mathematical Foundations of Computer Science (MFCS '15), Lecture Notes in Computer Science, 9235 pp. 14-25, 2015.
    [Show full text]
  • A Fast Heuristic Algorithm Based on Verification and Elimination Methods for Maximum Clique Problem
    A Fast Heuristic Algorithm Based on Verification and Elimination Methods for Maximum Clique Problem Sabu .M Thampi * Murali Krishna P L.B.S College of Engineering, LBS College of Engineering Kasaragod, Kerala-671542, India Kasaragod, Kerala-671542, India [email protected] [email protected] Abstract protein sequences. A major application of the maximum clique problem occurs in the area of coding A clique in an undirected graph G= (V, E) is a theory [1]. The goal here is to find the largest binary ' code, consisting of binary words, which can correct a subset V ⊆ V of vertices, each pair of which is connected by an edge in E. The clique problem is an certain number of errors. A maximal clique is a clique that is not a proper set optimization problem of finding a clique of maximum of any other clique. A maximum clique is a maximal size in graph . The clique problem is NP-Complete. We have succeeded in developing a fast algorithm for clique that has the maximum cardinality. In many maximum clique problem by employing the method of applications, the underlying problem can be formulated verification and elimination. For a graph of size N as a maximum clique problem while in others a N subproblem of the solution procedure consists of there are 2 sub graphs, which may be cliques and finding a maximum clique. This necessitates the hence verifying all of them, will take a long time. Idea is to eliminate a major number of sub graphs, which development of fast and approximate algorithms for cannot be cliques and verifying only the remaining sub the problem.
    [Show full text]
  • Query-To-Communication Lifting for PNP∗†
    Query-to-Communication Lifting for PNP∗† Mika Göös1, Pritish Kamath2, Toniann Pitassi3, and Thomas Watson4 1 Harvard University, Cambridge, MA, USA [email protected] 2 Massachusetts Institute of Technology, Cambridge, MA, USA [email protected] 3 University of Toronto, Toronto, ON, Canada [email protected] 4 University of Memphis, Memphis, TN, USA [email protected] Abstract We prove that the PNP-type query complexity (alternatively, decision list width) of any boolean function f is quadratically related to the PNP-type communication complexity of a lifted version of f. As an application, we show that a certain “product” lower bound method of Impagliazzo and Williams (CCC 2010) fails to capture PNP communication complexity up to polynomial factors, which answers a question of Papakonstantinou, Scheder, and Song (CCC 2014). 1998 ACM Subject Classification F.1.3 Complexity Measures and Classes Keywords and phrases Communication Complexity, Query Complexity, Lifting Theorem, PNP Digital Object Identifier 10.4230/LIPIcs.CCC.2017.12 1 Introduction Broadly speaking, a query-to-communication lifting theorem (a.k.a. communication- to-query simulation theorem) translates, in a black-box fashion, lower bounds on some type of query complexity (a.k.a. decision tree complexity) [38, 6, 19] of a boolean function f : {0, 1}n → {0, 1} into lower bounds on a corresponding type of communication complexity [23, 19, 27] of a two-party version of f. Table 1 lists several known results in this vein. In this work, we provide a lifting theorem for PNP-type query/communication complexity. PNP decision trees. Recall that a deterministic (i.e., P-type) decision tree computes an n-bit boolean function f by repeatedly querying, at unit cost, individual bits xi ∈ {0, 1} of the input x until the value f(x) is output at a leaf of the tree.
    [Show full text]
  • Propositional Proof Complexity Past Present and Future
    Prop ositional Pro of Complexity Past Present and Future Paul Beame and Toniann Pitassi Abstract Pro of complexity the study of the lengths of pro ofs in prop ositional logic is an area of study that is fundamentally connected b oth to ma jor op en questions of computational complexity theory and to practical prop erties of automated theorem provers In the last decade there have b een a number of signicant advances in pro of complexity lower b ounds Moreover new connections b etween pro of complexity and circuit complexity have b een uncovered and the interplay b etween these two areas has b ecome quite rich In addition attempts to extend existing lower b ounds to ever stronger systems of pro of have spurred the introduction of new and interesting pro of systems adding b oth to the practical asp ects of pro of complexity as well as to a rich theory This note attempts to survey these developments and to lay out some of the op en problems in the area Introduction One of the most basic questions of logic is the following Given a uni versally true statement tautology what is the length of the shortest pro of of the statement in some standard axiomatic pro of system The prop osi tional logic version of this question is particularly imp ortant in computer science for b oth theorem proving and complexity theory Imp ortant related algorithmic questions are Is there an ecient algorithm that will pro duce a pro of of any tautology Is there an ecient algorithm to pro duce the shortest pro of of any tautology Such questions of theorem proving and
    [Show full text]
  • The Maximum Clique Problem
    Introduction Algorithms Application Conclusion The Maximum Clique Problem Dam Thanh Phuong, Ngo Manh Tuong November, 2012 Dam Thanh Phuong, Ngo Manh Tuong The Maximum Clique Problem Introduction Algorithms Application Conclusion Motivation How to put as much left-over stuff as possible in a tasty meal before everything will go off? Dam Thanh Phuong, Ngo Manh Tuong The Maximum Clique Problem Introduction Algorithms Application Conclusion Motivation Find the largest collection of food where everything goes together! Here, we have the choice: Dam Thanh Phuong, Ngo Manh Tuong The Maximum Clique Problem Introduction Algorithms Application Conclusion Motivation Find the largest collection of food where everything goes together! Here, we have the choice: Dam Thanh Phuong, Ngo Manh Tuong The Maximum Clique Problem Introduction Algorithms Application Conclusion Motivation Find the largest collection of food where everything goes together! Here, we have the choice: Dam Thanh Phuong, Ngo Manh Tuong The Maximum Clique Problem Introduction Algorithms Application Conclusion Motivation Find the largest collection of food where everything goes together! Here, we have the choice: Dam Thanh Phuong, Ngo Manh Tuong The Maximum Clique Problem Introduction Algorithms Application Conclusion Outline 1 Introduction 2 Algorithms 3 Applications 4 Conclusion Dam Thanh Phuong, Ngo Manh Tuong The Maximum Clique Problem Introduction Algorithms Application Conclusion Graph (G): a network of vertices (V(G)) and edges (E(G)). Graph Complement (G): the graph with the same vertex set of G but whose edge set consists of the edges not present in G. Complete Graph: every pair of vertices is connected by an edge. A Clique in an undirected graph G=(V,E) is a subset of the vertex set C ⊆ V ,such that for every two vertices in C, there exists an edge connecting the two.
    [Show full text]
  • Clique and Coloring Problems Graph Format
    Clique and Coloring Problems Graph Format Last revision: May 08, 1993 This paper outlines a suggested graph format. If you have comments on this or other formats or you have information you think should be included, please send a note to [email protected]. 1 Introduction One purpose of the DIMACS Challenge is to ease the effort required to test and compare algorithms and heuristics by providing a common testbed of instances and analysis tools. To facilitate this effort, a standard format must be chosen for the problems addressed. This document outlines a format for graphs that is suitable for those looking at graph coloring and finding cliques in graphs. This format is a flexible format suitable for many types of graph and network problems. This format was also the format chosen for the First Computational Challenge on network flows and matchings. This document describes three problems: unweighted clique, weighted clique, and graph coloring. A separate format is used for satisfiability. 2 File Formats for Graph Problems This section describes a standard file format for graph inputs and outputs. There is no requirement that participants follow these specifications; however, compatible implementations will be able to make full use of DIMACS support tools. (Some tools assume that output is appended to input in a single file.) 1 Participants are welcome to develop translation programs to convert in- stances to and from more convenient, or more compact, representations; the Unix awk facility is recommended as especially suitable for this task. All files contain ASCII characters. Input and output files contain several types of lines, described below.
    [Show full text]
  • An Exponential Separation Between Regular and General Resolution
    THEORY OF COMPUTING, Volume 3 (2007), pp. 81–102 http://theoryofcomputing.org An Exponential Separation between Regular and General Resolution Michael Alekhnovich Jan Johannsen∗ Toniann Pitassi† Alasdair Urquhart‡ Received: August 15, 2006; published: May 1, 2007. Dedicated to the memory of Misha Alekhnovich Abstract: This paper gives two distinct proofs of an exponential separation between regular resolution and unrestricted resolution. The previous best known separation between these systems was quasi-polynomial. ACM Classification: F.2.2, F.2.3 AMS Classification: 03F20, 68Q17 Key words and phrases: resolution, proof complexity, lower bounds 1 Introduction Propositional proof complexity is currently a very active area of research. In the realm of the theory of feasible proofs it plays a role analogous to the role played by Boolean circuit complexity in the theory of computational complexity. ∗Supported by the DFG Emmy Noether-Programme grant No. Jo 291/2-1. †Supported by NSERC. ‡Supported by NSERC. Authors retain copyright to their work and grant Theory of Computing unlimited rights to publish the work electronically and in hard copy. Use of the work is permitted as long as the author(s) and the journal are properly acknowledged. For the detailed copyright statement, see http://theoryofcomputing.org/copyright.html. c 2007 Michael Alekhnovich, Jan Johannsen, Toniann Pitassi, and Alasdair Urquhart DOI: 10.4086/toc.2007.v003a005 M. ALEKHNOVICH, J. JOHANNSEN, T. PITASSI, AND A. URQUHART The motivation to study the complexity of propositional proof systems comes from two sides. First, it was shown in the seminal paper of Cook and Reckhow [10] that the existence of “strong” systems in which all tautologies have proofs of polynomial size is tightly connected to the NP vs.
    [Show full text]
  • A Tutorial on Clique Problems in Communications and Signal Processing Ahmed Douik, Student Member, IEEE, Hayssam Dahrouj, Senior Member, IEEE, Tareq Y
    1 A Tutorial on Clique Problems in Communications and Signal Processing Ahmed Douik, Student Member, IEEE, Hayssam Dahrouj, Senior Member, IEEE, Tareq Y. Al-Naffouri, Senior Member, IEEE, and Mohamed-Slim Alouini, Fellow, IEEE Abstract—Since its first use by Euler on the problem of the be found in the following reference [4]. The textbooks by seven bridges of Konigsberg,¨ graph theory has shown excellent Bollobas´ [5] and Diestel [6] provide an in-depth investigation abilities in solving and unveiling the properties of multiple of modern graph theory tools including flows and connectivity, discrete optimization problems. The study of the structure of some integer programs reveals equivalence with graph theory the coloring problem, random graphs, and trees. problems making a large body of the literature readily available Current applications of graph theory span several fields. for solving and characterizing the complexity of these problems. Indeed, graph theory, as a part of discrete mathematics, is This tutorial presents a framework for utilizing a particular particularly helpful in solving discrete equations with a well- graph theory problem, known as the clique problem, for solving defined structure. Reference [7] provides multiple connections communications and signal processing problems. In particular, the paper aims to illustrate the structural properties of integer between graph theory problems and their combinatoric coun- programs that can be formulated as clique problems through terparts. Multiple tutorials on the applications of graph theory multiple examples in communications and signal processing. To techniques to various problems are available in the literature, that end, the first part of the tutorial provides various optimal e.g., [8]–[15].
    [Show full text]