Operator Scaling Via Geodesically Convex Optimization, Invariant Theory and Polynomial Identity Testing∗

Total Page:16

File Type:pdf, Size:1020Kb

Operator Scaling Via Geodesically Convex Optimization, Invariant Theory and Polynomial Identity Testing∗ Operator Scaling via Geodesically Convex Optimization, Invariant Theory and Polynomial Identity Testing∗ Zeyuan Allen-Zhu Ankit Garg Yuanzhi Li Microsoft Research AI Microsoft Research New England Princeton University [email protected] [email protected] [email protected] Rafael Oliveira Avi Wigderson University of Toronto Institute for Advanced Study [email protected] [email protected] ABSTRACT 1 INTRODUCTION We propose a new second-order method for geodesically convex Group orbits and their closures capture natural notions of equiv- optimization on the natural hyperbolic metric over positive definite alence and are studied in several fields of mathematics like group matrices. We apply it to solve the operator scaling problem in time theory, invariant theory and algebraic geometry. They also come polynomial in the input size and logarithmic in the error. This up naturally in theoretical computer science. For example, graph is an exponential improvement over previous algorithms which isomorphism, the VP vs VNP question and lower bounds on were analyzed in the usual Euclidean, “commutative” metric (for tensor rank are all questions about such notions of equivalence. which the above problem is not convex). Our method is general In this paper, we focus on the orbit-closure intersection problem, and applicable to other settings. which is the most natural way to define equivalence for continuous As a consequence, we solve the equivalence problem for the left- group actions. We explore a general approach to the problem via right group action underlying the operator scaling problem. This geodesically convex optimization. As a testbed for our techniques, yields a deterministic polynomial-time algorithm for a new class of we design a deterministic polynomial-time algorithm for the orbit- Polynomial Identity Testing (PIT) problems, which was the original closure intersection problem for the left-right group action. Recent motivation for studying operator scaling. results by [22, 46] have reduced this problem to polynomial identity testing (PIT), which yields a randomized polynomial-time algorithm. CCS CONCEPTS We derandomize this special case of PIT, perhaps surprisingly, by continuous optimization. • Theory of computation → Convex optimization; Noncon- On the optimization side, we propose a new second-order method vex optimization; Pseudorandomness and derandomization; for geodesically convex optimization and use it to get an algorithm for operator scaling with time polynomial in the input bit size and KEYWORDS poly-logarithmic in 1/ε (ε is the error). In contrast, prior work [32] gives an operator-scaling algorithm that runs in time only polyno- operator scaling, geodesic convex, positive definite, orbit-closure mial in 1/ε, which is not sufficient for an application to the general intersection, capacity orbit-closure intersection problem. ACM Reference Format: On the PIT side, we have continued the line of research initiated Zeyuan Allen-Zhu, Ankit Garg, Yuanzhi Li, Rafael Oliveira, and Avi Wigder- by Mulmuley [59] to the study of problems in algebraic geometry son. 2018. Operator Scaling via Geodesically Convex Optimization, Invariant and invariant theory from an algorithmic perspective in order to Theory and Polynomial Identity Testing. In Proceedings of 50th Annual ACM develop and sharpen tools to attack the PIT problem. Our result SIGACT Symposium on the Theory of Computing (STOC’18). ACM, New York, adds to the growing list of this agenda [29, 32, 45, 46], and continues NY, USA, 10 pages. https://doi.org/10.1145/3188745.3188942 the paper [32] in building optimization tools for PIT problems (at least for those arising from invariant theory). Could it be possible ∗Future version of this paper can be found on arXiv: https://arxiv.org/abs/1804.01076. that the eventual solution to PIT will lie in optimization (perhaps Permission to make digital or hard copies of all or part of this work for personal or very wishful thinking)? classroom use is granted without fee provided that copies are not made or distributed Below is an outline of the rest of the introduction. We review for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the geodesically convex optimization and explain its application to the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or operator-scaling problem in Section 1.1. We discuss the basics of republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. invariant theory in Section 1.2 and an optimization approach to STOC’18, June 25–29, 2018, Los Angeles, CA, USA invariant-theoretic problems in Section 1.2.1. We discuss the left- © 2018 Copyright held by the owner/author(s). Publication rights licensed to the right group action in detail and explain how the orbit-closure inter- Association for Computing Machinery. section problem for this action (for which we give the first deter- ACM ISBN 978-1-4503-5559-9/18/06...$15.00 https://doi.org/10.1145/3188745.3188942 ministic poly-time algorithm) is a special case of PIT in Section 1.3. 172 STOC’18, June 25–29, 2018, Los Angeles, CA, USA Z. Allen-Zhu, A. Garg, Y. Li, R. Oliveira, and A. Wigderson In Section 1.4, we discuss the unitary equivalence problem for the PSD matrices. The so-called capacity of operator T is defined by: left-right action. Section 2 contains an overview of the techniques cap¹T º def= inf det¹T ¹Xºº : we develop. X ≻0;det¹X º=1 The name “operator scaling” comes from the fact that if the infimum 1.1 Geodesically Convex Optimization and X ∗ is attainable, then by defining Y ∗ = T ¹X ∗º−1 and re-scaling ∗ 1/2 ∗ 1/2 Operator Scaling Aei = ¹Y º Ai ¹X º , we have Í y Í y Convex optimization provides the basis for efficient algorithms in i AeiAei = I and i Aei Aei = I : a large number of scientific disciplines. For instance, to findan This is also known as saying that the new operator ε-approximate minimizer, the interior point method runs in time ¹ º def Ím y polynomial in the input and logarithmic in 1/ε. Unfortunately, many Te X = i=1 AeiXAei is doubly stochastic. problems (especially machine-learning ones) cannot be phrased Before our work, the only known algorithmic approach to solve in terms of convex formulations. A body of general-purpose non- the above capacity optimization problem was by Gurvits [37] in convex algorithms have been recently designed with theoretical 2004. His algorithm is a natural extension of Sinkhorn’s algorithm, guarantees (see [3–6, 15, 62, 65]). However, their guarantees are not which was proposed in 1964 [69] for the simpler task of matrix as good as in the convex case: they only converge to approximate scaling. A complete analysis of Gurvits’ algorithm was done in local minima (some only to stationary points) and run in time Garg et al.[32]. Unfortunately, Gurvits’ algorithm (and Sinkhorn’s / polynomial in 1 ε. algorithm too) run in time poly¹n; log M; 1/εº, where M denotes the 2 So one might wonder, for what generalizations of convex opti- largest magnitude of an entry of Ai , and ε is the desired accuracy. mization problems, can one design optimization algorithms with The polynomial dependency on 1/ε is poor and slows down the guarantees comparable to convex optimization? One avenue for downstream applications (such as orbit-closure intersection). such a generalization is given by geodesically convex problems. Remark 1.1. A special case of operator scaling is the matrix scaling Geodesic convexity generalizes Euclidean convexity to Riemann- problem (cf. [7, 18] and references therein). In matrix scaling, we are ian manifolds [14, 36]. While there have been works on devel- given a real matrix with non-negative entries, and asked to re-scale oping algorithms for optimizing geodesically convex functions its rows and columns to make it doubly stochastic. In this very special [1, 63, 72, 76, 78, 79], the theory is still incomplete in terms of what case, one can make a change of variables in the appropriate capacity, is the best computational complexity. and make it convex in the Euclidean metric. This affords standard We focus on geodesically convex optimization over the space of convex optimization techniques, and for this special case, algorithms positive definite (PD) matrices endowed with a different geometry running in time poly¹n; log M; log 1/εº are known [7, 18, 49, 56]. than the Euclidean one. This specific geometry on PD matrices is well studied, see [39, 58, 70, 76]. It is known that for every positive operator T , log¹det¹T ¹Xººº is geodesically convex in X [70]. Also, it is simple to verify that An n × n (complex) matrix M is positive definite (PD) if it is log¹det¹Xºº is geodesically linear (i.e., both convex and concave)3. Hermitian (i.e., M = My) and all of its eigenvalues are strictly Hence, if we define the following alternative objective (removing positive. We write M ≻ 0 to denote that M is PD. The geodesic path the hard constraint on det¹Xº) from any matrix A ≻ 0 to matrix B ≻ 0 is a function γ that maps »0; 1¼ to PD matrices, satisfies γ ¹0º = A and γ ¹1º = B, and is locally logcap¹Xº = log det ¹T ¹Xºº − log det X (1.1) distance minimizing (w.r.t. an appropriate metric). A function F¹Mº then it is geodesically convex over PD matrices X. Note that if ¹ ¹ ºº is geodesically convex iff the univariate function F γ t is convex cap¹T º > 0, then infX ≻0 logcap¹Xº = log¹cap¹T ºº.
Recommended publications
  • A Decade of Lattice Cryptography
    Full text available at: http://dx.doi.org/10.1561/0400000074 A Decade of Lattice Cryptography Chris Peikert Computer Science and Engineering University of Michigan, United States Boston — Delft Full text available at: http://dx.doi.org/10.1561/0400000074 Foundations and Trends R in Theoretical Computer Science Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is C. Peikert. A Decade of Lattice Cryptography. Foundations and Trends R in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2014. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-68083-113-9 c 2016 C. Peikert All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for in- ternal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged.
    [Show full text]
  • The Best Nurturers in Computer Science Research
    The Best Nurturers in Computer Science Research Bharath Kumar M. Y. N. Srikant IISc-CSA-TR-2004-10 http://archive.csa.iisc.ernet.in/TR/2004/10/ Computer Science and Automation Indian Institute of Science, India October 2004 The Best Nurturers in Computer Science Research Bharath Kumar M.∗ Y. N. Srikant† Abstract The paper presents a heuristic for mining nurturers in temporally organized collaboration networks: people who facilitate the growth and success of the young ones. Specifically, this heuristic is applied to the computer science bibliographic data to find the best nurturers in computer science research. The measure of success is parameterized, and the paper demonstrates experiments and results with publication count and citations as success metrics. Rather than just the nurturer’s success, the heuristic captures the influence he has had in the indepen- dent success of the relatively young in the network. These results can hence be a useful resource to graduate students and post-doctoral can- didates. The heuristic is extended to accurately yield ranked nurturers inside a particular time period. Interestingly, there is a recognizable deviation between the rankings of the most successful researchers and the best nurturers, which although is obvious from a social perspective has not been statistically demonstrated. Keywords: Social Network Analysis, Bibliometrics, Temporal Data Mining. 1 Introduction Consider a student Arjun, who has finished his under-graduate degree in Computer Science, and is seeking a PhD degree followed by a successful career in Computer Science research. How does he choose his research advisor? He has the following options with him: 1. Look up the rankings of various universities [1], and apply to any “rea- sonably good” professor in any of the top universities.
    [Show full text]
  • Constraint Based Dimension Correlation and Distance
    Preface The papers in this volume were presented at the Fourteenth Annual IEEE Conference on Computational Complexity held from May 4-6, 1999 in Atlanta, Georgia, in conjunction with the Federated Computing Research Conference. This conference was sponsored by the IEEE Computer Society Technical Committee on Mathematical Foundations of Computing, in cooperation with the ACM SIGACT (The special interest group on Algorithms and Complexity Theory) and EATCS (The European Association for Theoretical Computer Science). The call for papers sought original research papers in all areas of computational complexity. A total of 70 papers were submitted for consideration of which 28 papers were accepted for the conference and for inclusion in these proceedings. Six of these papers were accepted to a joint STOC/Complexity session. For these papers the full conference paper appears in the STOC proceedings and a one-page summary appears in these proceedings. The program committee invited two distinguished researchers in computational complexity - Avi Wigderson and Jin-Yi Cai - to present invited talks. These proceedings contain survey articles based on their talks. The program committee thanks Pradyut Shah and Marcus Schaefer for their organizational and computer help, Steve Tate and the SIGACT Electronic Publishing Board for the use and help of the electronic submissions server, Peter Shor and Mike Saks for the electronic conference meeting software and Danielle Martin of the IEEE for editing this volume. The committee would also like to thank the following people for their help in reviewing the papers: E. Allender, V. Arvind, M. Ajtai, A. Ambainis, G. Barequet, S. Baumer, A. Berthiaume, S.
    [Show full text]
  • Interactions of Computational Complexity Theory and Mathematics
    Interactions of Computational Complexity Theory and Mathematics Avi Wigderson October 22, 2017 Abstract [This paper is a (self contained) chapter in a new book on computational complexity theory, called Mathematics and Computation, whose draft is available at https://www.math.ias.edu/avi/book]. We survey some concrete interaction areas between computational complexity theory and different fields of mathematics. We hope to demonstrate here that hardly any area of modern mathematics is untouched by the computational connection (which in some cases is completely natural and in others may seem quite surprising). In my view, the breadth, depth, beauty and novelty of these connections is inspiring, and speaks to a great potential of future interactions (which indeed, are quickly expanding). We aim for variety. We give short, simple descriptions (without proofs or much technical detail) of ideas, motivations, results and connections; this will hopefully entice the reader to dig deeper. Each vignette focuses only on a single topic within a large mathematical filed. We cover the following: • Number Theory: Primality testing • Combinatorial Geometry: Point-line incidences • Operator Theory: The Kadison-Singer problem • Metric Geometry: Distortion of embeddings • Group Theory: Generation and random generation • Statistical Physics: Monte-Carlo Markov chains • Analysis and Probability: Noise stability • Lattice Theory: Short vectors • Invariant Theory: Actions on matrix tuples 1 1 introduction The Theory of Computation (ToC) lays out the mathematical foundations of computer science. I am often asked if ToC is a branch of Mathematics, or of Computer Science. The answer is easy: it is clearly both (and in fact, much more). Ever since Turing's 1936 definition of the Turing machine, we have had a formal mathematical model of computation that enables the rigorous mathematical study of computational tasks, algorithms to solve them, and the resources these require.
    [Show full text]
  • Optimal Hitting Sets for Combinatorial Shapes
    Optimal Hitting Sets for Combinatorial Shapes Aditya Bhaskara∗ Devendra Desai† Srikanth Srinivasan‡ November 5, 2018 Abstract We consider the problem of constructing explicit Hitting sets for Combinatorial Shapes, a class of statistical tests first studied by Gopalan, Meka, Reingold, and Zuckerman (STOC 2011). These generalize many well-studied classes of tests, including symmetric functions and combi- natorial rectangles. Generalizing results of Linial, Luby, Saks, and Zuckerman (Combinatorica 1997) and Rabani and Shpilka (SICOMP 2010), we construct hitting sets for Combinatorial Shapes of size polynomial in the alphabet, dimension, and the inverse of the error parame- ter. This is optimal up to polynomial factors. The best previous hitting sets came from the Pseudorandom Generator construction of Gopalan et al., and in particular had size that was quasipolynomial in the inverse of the error parameter. Our construction builds on natural variants of the constructions of Linial et al. and Rabani and Shpilka. In the process, we construct fractional perfect hash families and hitting sets for combinatorial rectangles with stronger guarantees. These might be of independent interest. 1 Introduction Randomness is a tool of great importance in Computer Science and combinatorics. The probabilistic method is highly effective both in the design of simple and efficient algorithms and in demonstrating the existence of combinatorial objects with interesting properties. But the use of randomness also comes with some disadvantages. In the setting of algorithms, introducing randomness adds to the number of resource requirements of the algorithm, since truly random bits are hard to come by. For combinatorial constructions, ‘explicit’ versions of these objects often turn out to have more structure, which yields advantages beyond the mere fact of their existence (e.g., we know of explicit arXiv:1211.3439v1 [cs.CC] 14 Nov 2012 error-correcting codes that can be efficiently encoded and decoded, but we don’t know if random codes can [5]).
    [Show full text]
  • Science Lives: Video Portraits of Great Mathematicians
    Science Lives: Video Portraits of Great Mathematicians accompanied by narrative profiles written by noted In mathematics, beauty is a very impor- mathematics biographers. tant ingredient… The aim of a math- Hugo Rossi, director of the Science Lives project, ematician is to encapsulate as much as said that the first criterion for choosing a person you possibly can in small packages—a to profile is the significance of his or her contribu- high density of truth per unit word. tions in “creating new pathways in mathematics, And beauty is a criterion. If you’ve got a theoretical physics, and computer science.” A beautiful result, it means you’ve got an secondary criterion is an engaging personality. awful lot identified in a small compass. With two exceptions (Atiyah and Isadore Singer), the Science Lives videos are not interviews; rather, —Michael Atiyah they are conversations between the subject of the video and a “listener”, typically a close friend or colleague who is knowledgeable about the sub- Hearing Michael Atiyah discuss the role of beauty ject’s impact in mathematics. The listener works in mathematics is akin to reading Euclid in the together with Rossi and the person being profiled original: You are going straight to the source. The to develop a list of topics and a suggested order in quotation above is taken from a video of Atiyah which they might be discussed. “But, as is the case made available on the Web through the Science with all conversations, there usually is a significant Lives project of the Simons Foundation. Science amount of wandering in and out of interconnected Lives aims to build an archive of information topics, which is desirable,” said Rossi.
    [Show full text]
  • László Lovász Avi Wigderson of Eötvös Loránd University of the Institute for Advanced Study, in Budapest, Hungary and Princeton, USA
    2021 The Norwegian Academy of Science and Letters has decided to award the Abel Prize for 2021 to László Lovász Avi Wigderson of Eötvös Loránd University of the Institute for Advanced Study, in Budapest, Hungary and Princeton, USA, “for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics.” Theoretical Computer Science (TCS) is the study of computational lens”. Discrete structures such as the power and limitations of computing. Its roots go graphs, strings, permutations are central to TCS, back to the foundational works of Kurt Gödel, Alonzo and naturally discrete mathematics and TCS Church, Alan Turing, and John von Neumann, leading have been closely allied fields. While both these to the development of real physical computers. fields have benefited immensely from more TCS contains two complementary sub-disciplines: traditional areas of mathematics, there has been algorithm design which develops efficient methods growing influence in the reverse direction as well. for a multitude of computational problems; and Applications, concepts, and techniques from TCS computational complexity, which shows inherent have motivated new challenges, opened new limitations on the efficiency of algorithms. The notion directions of research, and solved important open of polynomial-time algorithms put forward in the problems in pure and applied mathematics. 1960s by Alan Cobham, Jack Edmonds, and others, and the famous P≠NP conjecture of Stephen Cook, László Lovász and Avi Wigderson have been leading Leonid Levin, and Richard Karp had strong impact on forces in these developments over the last decades. the field and on the work of Lovász and Wigderson.
    [Show full text]
  • Self-Sorting SSD: Producing Sorted Data Inside Active Ssds
    Foreword This volume contains the papers presentedat the Third Israel Symposium on the Theory of Computing and Systems (ISTCS), held in Tel Aviv, Israel, on January 4-6, 1995. Fifty five papers were submitted in response to the Call for Papers, and twenty seven of them were selected for presentation. The selection was based on originality, quality and relevance to the field. The program committee is pleased with the overall quality of the acceptedpapers and, furthermore, feels that many of the papers not used were also of fine quality. The papers included in this proceedings are preliminary reports on recent research and it is expected that most of these papers will appear in a more complete and polished form in scientific journals. The proceedings also contains one invited paper by Pave1Pevzner and Michael Waterman. The program committee thanks our invited speakers,Robert J. Aumann, Wolfgang Paul, Abe Peled, and Avi Wigderson, for contributing their time and knowledge. We also wish to thank all who submitted papers for consideration, as well as the many colleagues who contributed to the evaluation of the submitted papers. The latter include: Noga Alon Alon Itai Eric Schenk Hagit Attiya Roni Kay Baruch Schieber Yossi Azar Evsey Kosman Assaf Schuster Ayal Bar-David Ami Litman Nir Shavit Reuven Bar-Yehuda Johan Makowsky Richard Statman Shai Ben-David Yishay Mansour Ray Strong Allan Borodin Alain Mayer Eli Upfal Dorit Dor Mike Molloy Moshe Vardi Alon Efrat Yoram Moses Orli Waarts Jack Feldman Dalit Naor Ed Wimmers Nissim Francez Seffl Naor Shmuel Zaks Nita Goyal Noam Nisan Uri Zwick Vassos Hadzilacos Yuri Rabinovich Johan Hastad Giinter Rote The work of the program committee has been facilitated thanks to software developed by Rob Schapire and FOCS/STOC program chairs.
    [Show full text]
  • Avi Wigderson
    On the Work of Madhu Sudan Avi Wigderson Madhu Sudan is the recipient of the 2002 Nevan- “eyeglasses” were key in this study of the no- linna Prize. Sudan has made fundamental contri- tions proof (again) and error correction. butions to two major areas of research, the con- • Theoretical computer science is an extremely nections between them, and their applications. interactive and collaborative community. The first area is coding theory. Established by Sudan’s work was not done in a vacuum, and Shannon and Hamming over fifty years ago, it is much of the background to it, conceptual and technical, was developed by other people. The the mathematical study of the possibility of, and space I have does not allow me to give proper the limits on, reliable communication over noisy credit to all these people. A much better job media. The second area is probabilistically check- has been done by Sudan himself; his homepage able proofs (PCPs). By contrast, it is only ten years (http://theory.lcs.mit.edu/~madhu/) con- old. It studies the minimal resources required for tains several surveys of these areas which give probabilistic verification of standard mathemati- proper historical accounts and references. In cal proofs. particular see [13] for a survey on PCPs and [15] My plan is to briefly introduce these areas, their for a survey on the work on error correction. motivation, and foundational questions and then to explain Sudan’s main contributions to each. Be- Probabilistic Checking of Proofs fore we get to the specific works of Madhu Sudan, One informal variant of the celebrated P versus let us start with a couple of comments that will set NP question asks, Can mathematicians, past and up the context of his work.
    [Show full text]
  • Simultaneous Hardcore Bits and Cryptography Against Freezing Attacks
    Simultaneous Hardcore Bits and Cryptography Against Freezing Attacks Adi Akavia∗ Shafi Goldwassery Vinod Vaikuntanathanz Abstract This paper considers two questions in cryptography. 1. Simultaneous Hardcore Bits. Let f be a one-way function. We say that a block of bits of x are simultaneously hard-core for f(x) if given f(x), they cannot be distinguished from a random string of the same length. Although there are many examples of (candidate) one-way functions with one hardcore bit (or even O(log n) simultaneously hardcore bits), there are very few examples of one- way functions (and even fewer examples of trapdoor one-way functions) for which a linear number of the input bits are simultaneously hardcore. We show that for the lattice-based (injective) trapdoor function recently proposed by Gentry, Peik- ert and Vaikuntanathan (STOC 2008), which is in turn based on the one-way function of Regev (STOC 2005), an n − o(n) number of input bits are simultaneously hardcore (where n is the total number of input bits). 2. Cryptography Against Memory-Freezing Attacks. The absolute privacy of the secret keys as- sociated with cryptographic algorithms has been the corner-stone of modern cryptography. Still, it has been clear that in practice keys do get compromised at times, by various means. In a partic- ularly devastating side-channel attack, termed the “freezing attack” which was proposed recently, a significant fraction of the bits of the secret key can be measured if the secret key is ever stored in the part of memory which can be accessed (even after power has been turned off for a short amount of time).
    [Show full text]
  • Knowledge, Creativity and P Versus NP
    Knowledge, Creativity and P versus NP Avi Wigderson April 11, 2009 Abstract The human quest for efficiency is ancient and universal. Computa- tional Complexity Theory is the mathematical study of the efficiency requirements of computational problems. In this note we attempt to convey the deep implications and connections of the results and goals of computational complexity, to the understanding of the most basic and general questions in science and technology. In particular, we will explain the P versus NP question of computer science, and explain the consequences of its possible resolution, P = NP or P 6= NP , to the power and security of computing, the human quest for knowledge, and beyond. The connection rests on formalizing the role of creativity in the discovery process. The seemingly abstract, philosophical question: Can creativity be automated? in its concrete, mathematical form: Does P = NP ?, emerges as a central challenge of science. And the basic notions of space and time, studied as resources of efficient computation, emerge as key objects of study to solving this mystery, just like their physical counterparts hold the key to understanding the laws of nature. This article is prepared for non-specialists, so we attempt to be as non-technical as possible. Thus we focus on the intuitive, high level meaning of central definitions of computational notions. Necessarily, we will be sweeping many technical issues under the rug, and be content that the general picture painted here remains valid when these are carefully examined. Formal, mathematical definitions, as well as better historical account and more references to original works, can be found in any textbook, e.g.
    [Show full text]
  • Laszlo Lovasz and Avi Wigderson Share the 2021 Abel Prize - 03-20-2021 by Abhigyan Ray - Gonit Sora
    Laszlo Lovasz and Avi Wigderson share the 2021 Abel Prize - 03-20-2021 by Abhigyan Ray - Gonit Sora - https://gonitsora.com Laszlo Lovasz and Avi Wigderson share the 2021 Abel Prize by Abhigyan Ray - Saturday, March 20, 2021 https://gonitsora.com/laszlo-lovasz-and-avi-wigderson-share-2021-abel-prize/ Last time the phrase "theoretical computer science" found mention in an Abel Prize citation was in 2012 when the legendary Hungarian mathematician, Endre Szemerédi was awarded mathematics' highest honour. During the ceremony, László Lovász and Avi Wigderson were there to offer a primer into the majestic contributions of the laureate. Little did they know, nearly a decade later, they both would be joint recipients of the award. The Norwegian Academy of Science and Letters has awarded the 2021 Abel Prize to László Lovász of Eötvös Loránd University in Budapest, Hungary and Avi Wigderson of the Institute for Advanced Study, Princeton, USA, “for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics.” Widely hailed as the mathematical equivalent of the Nobel Prize, this year's Abel goes to two trailblazers for their revolutionary contributions to the mathematical foundations of computing and information systems. The citation of the award can be found here. László Lovász Lovász bagged three gold medals at the International Mathematical Olympiad, from 1964 to 1966, and received his Candidate of Sciences (Ph.D. equivalent) degree in 1970 at the Hungarian Academy of Sciences advised by Tibor Gallai. Lovász was initially based in Hungary, at Eötvös Loránd University and József Attila University, and in 1993 he was appointed William K Lanman Professor of Computer Science and Mathematics at Yale University.
    [Show full text]