Techniques for Characterizing the Data Movement Complexity of Computations

Total Page:16

File Type:pdf, Size:1020Kb

Techniques for Characterizing the Data Movement Complexity of Computations Techniques for Characterizing the Data Movement Complexity of Computations DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Venmugil Elango, Graduate Program in Computer Science and Engineering The Ohio State University 2016 Dissertation Committee: Prof. P. Sadayappan, Advisor Dr. Fabrice Rastello, Co-Advisor Prof. Atanas Rountev Prof. Radu Teodorescu © Copyright by Venmugil Elango 2016 ABSTRACT The execution cost of a program, both in terms of time and energy, comprises computational cost and data movement cost (e.g., cost of transferring data between CPU and memory devices, between parallel processors, etc.). Technology trends will cause data movement to account for the majority of energy expenditure and execution time on emerging computers. Therefore, computational complexity alone will no longer be a sufficient metric for comparing algorithms, and a fundamental characterization of data movement complexity will be increasingly important. In their seminal work, Hong & Kung proposed the red-blue pebble game to model the data movement complexity of algorithms. Using the pebble game abstraction, Hong & Kung proved tight asymptotic lower bounds for the data movement com- plexity of several algorithms by reformulating the problem as a graph partitioning problem. In this dissertation, we develop a novel alternate graph min-cut based lower bounding technique. Using our technique, we derive tight lower bounds for different algorithms, with upper bounds matching within a constant factor. Further, we de- velop a dynamic analysis based automated heuristic for our technique, which enables automatic analysis of arbitrary computations. We provide several use cases for our automated approach. This dissertation also presents a technique, built upon the ideas of Christ et al. [15], to derive asymptotic parametric lower bounds for a sub-class of computations, called ii affine computations. A static analysis based heuristic to automatically derive para- metric lower bounds for affine parts of the computations is also presented. Motivated by the emerging interest in large scale parallel systems with intercon- nection networks and hierarchical caches with varying bandwidths at different levels, we extend the pebble game model to parallel system architecture to characterize the data movement requirements in large scale parallel computers. We provide interest- ing insights on architectural bottlenecks that limit the performance of algorithms on these parallel machines. Finally, using data movement complexity analysis, in conjunction with the roofline model for performance bounds, we perform an algorithm-architecture codesign explo- ration across an architectural design space. We model the maximal achievable per- formance and energy efficiency of different algorithms for a given VLSI technology, considering different architectural parameters. iii ACKNOWLEDGMENTS I would like to start with thanking my advisor Prof. P. Sadayappan, without whose guidance this work would have been impossible. I am always amazed by the enthusiasm and energy with which he approaches and discusses new ideas. Sugges- tions and ideas that he provided me during our discussions over the past five years have proved to be invaluable to me. I am grateful to my co-advisor, Dr. Fabrice Rastello. I learned a lot from his novel ideas and insightful comments. I admire his close attention to minor technical details and correctness of the ideas. I extend my gratitude to Dr. Louis-Noël Pouchet for his helpful suggestions on var- ious parts of this work. Interactions with him, especially with regards to experiments and presentation of ideas, have been invaluable. I would like to thank Prof. J. Ramanujam for all the help he provided over the course of this work. Useful discussions with him, especially when we were close to various paper deadlines, were of immense help. I extend my thanks to Prof. Nasko Rountev for his helpful suggestions and feed- backs on our work related to dynamic analysis, and on the presentation of our work in various papers and talks. I would also remember interesting conversations I had with my labmates Martin Kong, Naser Sedaghati, Mahesh Ravishankar, Kevin Stock, Naznin Fauzia, Sanket iv Tavargeri, Samyam Rajbhandari, Prashant Rawat, Wenlei Bao and Changwan Hong during my period of stay at DL574. My friends Nithin, Manojprasadh, Saktheesh, Aravind, Ashok and Nikilesh ex- tended their help and support during the times I needed them the most. I will always cherish the memorable experiences I had with them. Finally, I am thankful to my parents and my family for all their support. v VITA Jul 2003 – May 2008 . Bachelor of Engineering Mechanical Engineering (Sandwich) PSG College of Technology Coimbatore, India. Jun 2008 – Aug 2010 . .Engineer GE Aviation Bangalore, India. Dec 2010 – Present . .Graduate Research Assistant The Ohio State University Columbus, Ohio. May 2013 – Aug 2013 . Intern Los Alamos National Laboratory Los Alamos, New Mexico. May 2015 – Aug 2015 . Intern Lawrence Livermore National Labora- tory Livermore, California. PUBLICATIONS Venmugil Elango, Fabrice Rastello, Louis-Noël Pouchet, J. Ramanujam, P. Sadayap- pan On Characterizing the Data Access Complexity of Programs. In ACM Symposium on Principles of Programming Languages, January 2015. Venmugil Elango, Naser Sedaghati, Fabrice Rastello, Louis-Noël Pouchet, J. Ramanu- jam, Radu Teodorescu, P. Sadayappan On Using the Roofline Model with Lower Bounds on Data Movement. In ACM Transactions on Architecture and Code Optimization, Volume 11, Issue 4, December 2014. vi Venmugil Elango, Fabrice Rastello, Louis-Noël Pouchet, J. Ramanujam, P. Sadayap- pan On Characterizing the Data Movement Complexity of Computational DAGs for Parallel Execution. In ACM Symposium on Parallelism in Algorithms and Architectures, June 2014. Naznin Fauzia, Venmugil Elango, Mahesh Ravishankar, J. Ramanujam, Fabrice Rastello, Atanas Rountev, Louis-Noël Pouchet, P. Sadayappan Beyond reuse distance analysis: Dynamic analysis for characterization of data locality potential. In ACM Transactions on Architecture and Code Optimization, Volume 10 Issue 4, December 2013. Mahesh Ravishankar, Roshan Dathathri, Venmugil Elango, Louis-Noël Pouchet, J. Ra- manujam, Atanas Rountev, P. Sadayappan Distributed memory code generation for mixed Irregular/Regular compu- tations. In ACM Symposium on Principles and Practice of Parallel Programming, February 2015. Pai-Wei Lai, Humayun Arafat, Venmugil Elango, P. Sadayappan Accelerating Strassen-Winograd’s matrix multiplication algorithm on GPUs. In IEEE High Performance Computing, December 2013. FIELDS OF STUDY Major Field: Computer Science and Engineering Studies in High Performance Computing: Prof. P. Sadayappan vii TABLE OF CONTENTS Page Abstract ....................................... ii Acknowledgments .................................. iv Vita ......................................... vi List of Figures ................................... xi List of Tables .................................... xiv List of Algorithms ................................. xv List of Listings ................................... xvi Chapters: 1. Introduction .................................. 1 1.1 Data Movement Complexity ...................... 2 1.2 Computation Directed Acyclic Graph ................ 4 1.3 Characterizing the Data Movement Complexity of Computations . 6 1.4 Outline ................................. 9 2. Red-Blue Pebble Game ............................ 11 2.1 Background ............................... 12 2.2 Red-Blue Pebble Game Without Recomputation .......... 14 2.3 Decomposition ............................. 15 2.3.1 Disjoint Decomposition .................... 15 2.3.2 Non-disjoint Decomposition .................. 18 2.4 Input/Output Tagging/Untagging .................. 22 2.5 Related Work .............................. 24 viii 3. Lower Bounding Technique Based on Graph Min-cuts ........... 25 3.1 Background ............................... 25 3.1.1 S-partitioning technique .................... 25 3.1.2 Definitions from graph theory ................. 27 3.2 Min-cut Based Lower Bounding Technique .............. 28 3.3 Analytical Lower Bounds Using Min-cut Approach ......... 32 3.3.1 Diamond DAG ......................... 32 3.3.2 Fast Fourier transform (FFT) ................. 35 3.3.3 9-point Jacobi 2D (J2D) .................... 36 3.3.4 Conjugate Gradient (CG) ................... 39 3.3.5 Summary ............................ 43 3.4 Related Work .............................. 44 4. Automatic Min-cut Based Lower Bounds .................. 46 4.1 Algorithm for Convex Vertex-Min-Cut ................ 46 4.1.1 Overview ............................ 48 4.1.2 Construction of transformed graph .............. 50 4.1.3 Correctness ........................... 52 4.2 Heuristic for Min-Cut Based Lower Bounds ............. 55 4.2.1 CDAG extraction ....................... 56 4.2.2 Decomposition ......................... 58 4.2.3 Finding maximum min-cut .................. 58 4.3 Experimental Results ......................... 59 4.3.1 Assessment of effectiveness of automated analysis ...... 59 4.3.2 Parametric bounds through function fitting ......... 63 4.3.3 Use case 1: Algorithm comparison and optimization .... 64 4.3.4 Use case 2: Machine balance requirements .......... 67 4.4 Loop Fusion and Tileability Potential ................ 69 4.4.1 CDAG sampling ........................ 73 4.4.2 Experimental results .....................
Recommended publications
  • CS601 DTIME and DSPACE Lecture 5 Time and Space Functions: T, S
    CS601 DTIME and DSPACE Lecture 5 Time and Space functions: t, s : N → N+ Definition 5.1 A set A ⊆ U is in DTIME[t(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M) ≡ w ∈ U M(w)=1 , and 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps. Definition 5.2 A set A ⊆ U is in DSPACE[s(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M), and 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells. (Input tape is “read-only” and not counted as space used.) Example: PALINDROMES ∈ DTIME[n], DSPACE[n]. In fact, PALINDROMES ∈ DSPACE[log n]. [Exercise] 1 CS601 F(DTIME) and F(DSPACE) Lecture 5 Definition 5.3 f : U → U is in F (DTIME[t(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. Definition 5.4 f : U → U is in F (DSPACE[s(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. (Input tape is “read-only”; Output tape is “write-only”.
    [Show full text]
  • On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs*
    On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs* Benny Applebaum† Eyal Golombek* Abstract We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, we ask whether it is possible to reduce the randomness complexity, R, of the verifier to be comparable with the number of bits, CV , that the verifier sends during the interaction. We show that such randomness sparsification is possible in several settings. Specifically, unconditional sparsification can be obtained in the non-uniform setting (where the verifier is modelled as a circuit), and in the uniform setting where the parties have access to a (reusable) common-random-string (CRS). We further show that constant-round uniform protocols can be sparsified without a CRS under a plausible worst-case complexity-theoretic assumption that was used previously in the context of derandomization. All the above sparsification results preserve statistical-zero knowledge provided that this property holds against a cheating verifier. We further show that randomness sparsification can be applied to honest-verifier statistical zero-knowledge (HVSZK) proofs at the expense of increasing the communica- tion from the prover by R−F bits, or, in the case of honest-verifier perfect zero-knowledge (HVPZK) by slowing down the simulation by a factor of 2R−F . Here F is a new measure of accessible bit complexity of an HVZK proof system that ranges from 0 to R, where a maximal grade of R is achieved when zero- knowledge holds against a “semi-malicious” verifier that maliciously selects its random tape and then plays honestly.
    [Show full text]
  • Lecture 10: Space Complexity III
    Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Lecture 10: Space Complexity III Arijit Bishnu 27.03.2010 Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Outline 1 Space Complexity Classes: NL and L 2 Reductions 3 NL-completeness 4 The Relation between NL and coNL 5 A Relation Among the Complexity Classes Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Outline 1 Space Complexity Classes: NL and L 2 Reductions 3 NL-completeness 4 The Relation between NL and coNL 5 A Relation Among the Complexity Classes Definition for Recapitulation S c NPSPACE = c>0 NSPACE(n ). The class NPSPACE is an analog of the class NP. Definition L = SPACE(log n). Definition NL = NSPACE(log n). Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Space Complexity Classes Definition for Recapitulation S c PSPACE = c>0 SPACE(n ). The class PSPACE is an analog of the class P. Definition L = SPACE(log n). Definition NL = NSPACE(log n). Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Space Complexity Classes Definition for Recapitulation S c PSPACE = c>0 SPACE(n ). The class PSPACE is an analog of the class P. Definition for Recapitulation S c NPSPACE = c>0 NSPACE(n ).
    [Show full text]
  • Lecture 4: Space Complexity II: NL=Conl, Savitch's Theorem
    COM S 6810 Theory of Computing January 29, 2009 Lecture 4: Space Complexity II Instructor: Rafael Pass Scribe: Shuang Zhao 1 Recall from last lecture Definition 1 (SPACE, NSPACE) SPACE(S(n)) := Languages decidable by some TM using S(n) space; NSPACE(S(n)) := Languages decidable by some NTM using S(n) space. Definition 2 (PSPACE, NPSPACE) [ [ PSPACE := SPACE(nc), NPSPACE := NSPACE(nc). c>1 c>1 Definition 3 (L, NL) L := SPACE(log n), NL := NSPACE(log n). Theorem 1 SPACE(S(n)) ⊆ NSPACE(S(n)) ⊆ DTIME 2 O(S(n)) . This immediately gives that N L ⊆ P. Theorem 2 STCONN is NL-complete. 2 Today’s lecture Theorem 3 N L ⊆ SPACE(log2 n), namely STCONN can be solved in O(log2 n) space. Proof. Recall the STCONN problem: given digraph (V, E) and s, t ∈ V , determine if there exists a path from s to t. 4-1 Define boolean function Reach(u, v, k) with u, v ∈ V and k ∈ Z+ as follows: if there exists a path from u to v with length smaller than or equal to k, then Reach(u, v, k) = 1; otherwise Reach(u, v, k) = 0. It is easy to verify that there exists a path from s to t iff Reach(s, t, |V |) = 1. Next we show that Reach(s, t, |V |) can be recursively computed in O(log2 n) space. For all u, v ∈ V and k ∈ Z+: • k = 1: Reach(u, v, k) = 1 iff (u, v) ∈ E; • k > 1: Reach(u, v, k) = 1 iff there exists w ∈ V such that Reach(u, w, dk/2e) = 1 and Reach(w, v, bk/2c) = 1.
    [Show full text]
  • Supercuspidal Part of the Mod L Cohomology of GU(1,N - 1)-Shimura Varieties
    Supercuspidal part of the mod l cohomology of GU(1,n - 1)-Shimura varieties The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Shin, Sug Woo. “Supercuspidal Part of the Mod L Cohomology of GU(1,n - 1)-Shimura Varieties.” Journal für die reine und angewandte Mathematik (Crelles Journal) 2015.705 (2015): 1–21. © 2015 De Gruyter As Published http://dx.doi.org/10.1515/crelle-2013-0057 Publisher Walter de Gruyter Version Final published version Citable link http://hdl.handle.net/1721.1/108760 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. J. reine angew. Math. 705 (2015), 1–21 Journal für die reine und angewandte Mathematik DOI 10.1515/crelle-2013-0057 © De Gruyter 2015 Supercuspidal part of the mod l cohomology of GU.1; n 1/-Shimura varieties By Sug Woo Shin at Cambridge, MA Abstract. Let l be a prime. In this paper we are concerned with GU.1; n 1/-type Shimura varieties with arbitrary level structure at l and investigate the part of the cohomology on which G.Qp/ acts through mod l supercuspidal representations, where p l is any prime ¤ such that G.Qp/ is a general linear group. The main theorem establishes the mod l analogue of the local-global compatibility. Our theorem also encodes a global mod l Jacquet–Langlands correspondence in that the cohomology is described in terms of mod l automorphic forms on some compact inner form of G.
    [Show full text]
  • Complexity Theory Lectures 1–6
    Complexity Theory 1 Complexity Theory Lectures 1–6 Lecturer: Dr. Timothy G. Griffin Slides by Anuj Dawar Computer Laboratory University of Cambridge Easter Term 2009 http://www.cl.cam.ac.uk/teaching/0809/Complexity/ Cambridge Easter 2009 Complexity Theory 2 Texts The main texts for the course are: Computational Complexity. Christos H. Papadimitriou. Introduction to the Theory of Computation. Michael Sipser. Other useful references include: Computers and Intractability: A guide to the theory of NP-completeness. Michael R. Garey and David S. Johnson. Structural Complexity. Vols I and II. J.L. Balc´azar, J. D´ıaz and J. Gabarr´o. Computability and Complexity from a Programming Perspective. Neil Jones. Cambridge Easter 2009 Complexity Theory 3 Outline A rough lecture-by-lecture guide, with relevant sections from the text by Papadimitriou (or Sipser, where marked with an S). Algorithms and problems. 1.1–1.3. • Time and space. 2.1–2.5, 2.7. • Time Complexity classes. 7.1, S7.2. • Nondeterminism. 2.7, 9.1, S7.3. • NP-completeness. 8.1–8.2, 9.2. • Graph-theoretic problems. 9.3 • Cambridge Easter 2009 Complexity Theory 4 Outline - contd. Sets, numbers and scheduling. 9.4 • coNP. 10.1–10.2. • Cryptographic complexity. 12.1–12.2. • Space Complexity 7.1, 7.3, S8.1. • Hierarchy 7.2, S9.1. • Descriptive Complexity 5.6, 5.7. • Cambridge Easter 2009 Complexity Theory 5 Complexity Theory Complexity Theory seeks to understand what makes certain problems algorithmically difficult to solve. In Data Structures and Algorithms, we saw how to measure the complexity of specific algorithms, by asymptotic measures of number of steps.
    [Show full text]
  • An Entropy Proof of the Switching Lemma and Tight Bounds on the Decision-Tree Size of AC0
    An entropy proof of the switching lemma and tight bounds on the decision-tree size of AC0 Benjamin Rossman∗ University of Toronto November 3, 2017 Abstract We first give a simple entropy argument showing that every m-clause DNF with expected value λ 2 [0; 1] under the uniform distribution has average sensitivity (a.k.a. total influence) at most 2λ log(m/λ). Using a similar idea, we then show the following switching lemma for an m-clause DNF (or CNF) formula F : P t (1) [ DTdepth(F Rp) ≥ t ] ≤ O(p log(m + 1)) : for all p 2 [0; 1] and t 2 N where Rp is the p-random restriction and DTdepth(·) denotes decision- tree depth. Our proof replaces the counting arguments in previous proofs of H˚astad's O(pw)t switching lemma for width-w DNFs [5,9,2] with an entropy argument that naturally applies to unbounded-width DNFs with a bounded number of clauses. With respect to AC0 circuits, our m-clause switching lemma has similar applications as H˚astad'swidth-w switching lemma, 1=(d−1) including a 2Ω(n ) lower bound for PARITY. An additional result of this paper extends inequality (1) to AC0 circuits via a combination of H˚astad'sswitching and multi-switching lemmas [5,6]. For boolean functions f : f0; 1gn ! f0; 1g computable by AC0 circuits of depth d and size s, we show that P d−1 t (2) [ DTdepth(fRp) ≥ t ] ≤ (p · O(log s) ) for all p 2 [0; 1] and t 2 N.
    [Show full text]
  • 18.405J S16 Lecture 3: Circuits and Karp-Lipton
    18.405J/6.841J: Advanced Complexity Theory Spring 2016 Lecture 3: Circuits and Karp-Lipton Scribe: Anonymous Student Prof. Dana Moshkovitz Scribe Date: Fall 2012 1 Overview In the last lecture we examined relativization. We found that a common method (diagonalization) for proving non-inclusions between classes of problems was, alone, insufficient to settle the P versus NP problem. This was due to the existence of two orcales: one for which P = NP and another for which P =6 NP . Therefore, in our search for a solution, we must look into the inner workings of computation. In this lecture we will examine the role of Boolean Circuits in complexity theory. We will define the class P=poly based on the circuit model of computation. We will go on to give a weak circuit lower bound and prove the Karp-Lipton Theorem. 2 Boolean Circuits Turing Machines are, strange as it may sound, a relatively high level programming language. Because we found that diagonalization alone is not sufficient to settle the P versus NP problem, we want to look at a lower level model of computation. It may, for example, be easier to work at the bit level. To this end, we examine boolean circuits. Note that any function f : f0; 1gn ! f0; 1g is expressible as a boolean circuit. 2.1 Definitions Definition 1. Let T : N ! N.A T -size circuit family is a sequence fCng such that for all n, Cn is a boolean circuit of size (in, say, gates) at most T (n). SIZE(T ) is the class of languages with T -size circuits.
    [Show full text]
  • PSPACE-Complete Languages
    CSCI 1590 Intro to Computational Complexity PSPACE-Complete Languages John E. Savage Brown University February 11, 2009 John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity February 11, 2009 1 / 10 Summary 1 Complexity Class Containment 2 Polynomial Time Hierarchy 3 PH-Complete Languages 4 Games and tqbf 5 tqbf is PSPACE-Complete John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity February 11, 2009 2 / 10 Complexity Classes from Last Lecture P, coNP, p p Πi and Σi PH PSPACE NP ∪ coNP PSPACE = NPSPACE NP ∩ coNP NP coNP L2 P NL L John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity February 11, 2009 3 / 10 Polynomial Time Hierarchy A language is in NP(coNP) if and only if it can be reduced in polynomial time to a statement of the form ∃x b(x) (∀x b(x)) By adding additional levels of quantification, as shown below, potentially new complexity classes are added. ∀x1 ∃x2 b(x1, x2) ∃x1 ∀x2 b(x1, x2) The sets of languages PTIME reducible to statements of this form are p p denoted Πi and Σi respectively, when there are i alternations of existential and universal quantifiers and the outermost quantifier is ∀ and ∃, respectively. Definition The Polynomial Hierarchy (PH) is defined as p PH = [ Σi i John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity February 11, 2009 4 / 10 PH and PSPACE Definition A language L is PH-complete if a) L ∈ PH and b) all languages in PH are ptime reducible to L. It is not hard to see that PH ⊆ PSPACE.
    [Show full text]
  • PSPACE-Completeness & Savitch's Theorem 1 Recap
    CSE 200 Computability and Complexity Wednesday, April 24, 2013 Lecture 8: PSPACE-Completeness & Savitch's Theorem Instructor: Professor Shachar Lovett Scribe: Dongcai Shen 1 Recap: Space Complexity Recall the following definitions on space complexity we learned in the last class: SPACE(S(n))def= \languages computable by a TM where input tape is readonly and work tape size S(n)" LOGSPACEdef= SPACE(O(log n)) def c PSPACE = [c≥1 SPACE(n ) For example, nowadays, people are interested in streaming algorithms, whose space requirements are low. So researching on space complexity can have real-world influence, especially in instructing people the way an algorithm should be designed and directing people away from some impossible attempts. Definition 1 (Nondeterministic Space NSPACE) The nondeterministic space NSPACE(S(n))def= • Input tape, read-only. • Proof tape, read-only & read-once. • Work tape size S(n). So, we can define • NLdef= NSPACE(O(log n)). def c • NPSPACE = [c≥1 NSPACE(n ). def Theorem 2 PATH = f(G; s; t): G directed graph, s; t vertices, there is a path s t in Gg is NL-complete un- der logspace reduction. Corollary 3 If we could find a deterministic algorithm for PATH in SPACE(O(log n)), then NL = L. Remark. Nondeterminism is pretty useless w.r.t. space. We don't know whether NL = L yet. 2 Outline of Today Definition 4 (Quantified Boolean formula) A quantified Boolean formula is 8x19x28x39x4 ··· φ(x1; ··· ; xn) def where φ is a CNF. Let TQBF = fA true QBFg. Theorem 5 TQBF is PSPACE-complete under poly-time reduction (and actually under logspace reductions).
    [Show full text]
  • The Complexity of Equivalent Classes Frank Vega
    The complexity of equivalent classes Frank Vega To cite this version: Frank Vega. The complexity of equivalent classes. 2016. hal-01302609v2 HAL Id: hal-01302609 https://hal.archives-ouvertes.fr/hal-01302609v2 Preprint submitted on 16 Apr 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THE COMPLEXITY OF EQUIVALENT CLASSES FRANK VEGA Abstract. We consider two new complexity classes that are called equivalent- P and equivalent-UP which have a close relation to the P versus NP problem. The class equivalent-P contains those languages that are ordered-pairs of in- stances of two specific problems in P, such that the elements of each ordered- pair have the same solution, which means, the same certificate. The class equivalent-UP has almost the same definition, but in each case we define the pair of languages explicitly in UP. In addition, we define the class double-NP as the set of languages that contain each instance of another language in NP, but in a double way, that is, in form of a pair with two identical instances. We demonstrate that double-NP is a subset of equivalent-P.
    [Show full text]
  • Comparing Complexity Classes*
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES 9, 213-229 (1974) Comparing Complexity Classes* RONALD V. BOOKt Center for Research in Computing Technology, Harvard University, Cambridge, Massachusetts 02138 Received January 20, 1973 Complexity classes defined by time-bounded and space-bounded Turing acceptors are studied in order to learn more about the cost of deterministic simulation of non- deterministic processes and about time-space tradeoffs. Here complexity classes are compared by means of reducibilities and class-complete sets. The classes studied are defined by bounds of the order n, n ~, 2 n, 2 n~. The results do not establish the existence of possible relationships between these classes; rather, they show the consequences of such relationships, in some cases offering circumstantial evidence that these relation- ships do not hold and that certain pairs of classes are set-theoretically incomparable. INTRODUCTION Certain long-standing open questions in automata-based complexity have resurfaced recently due to the work by Cook [9] and Karp [17] on efficient reducibilities among combinatorial problems. In particular, questions regarding time-space tradeoffs and the cost of deterministic simulation of nondeterministic machines have received renewed attention. The purpose of this paper is to study relationships between certain classes of languages accepted by time- and space-bounded Turing machines in order to learn more about these questions. The questions of time-space tradeoffs and deterministic simulation of nondeter- ministic processes can be studied on an ad hoc basis, e.g., a particular problem can be solved via a nondeterministic process and then an efficient deterministic process might be shown to realize the result.
    [Show full text]