Projects. Probabilistically Checkable Proofs... Probabilistically Checkable Proofs PCP Example

Total Page:16

File Type:pdf, Size:1020Kb

Projects. Probabilistically Checkable Proofs... Probabilistically Checkable Proofs PCP Example Projects. Probabilistically Checkable Proofs... Probabilistically Checkable Proofs What’s a proof? Statement: A formula φ is satisfiable. Proof: assignment, a. Property: 5 minute presentations. Can check proof in polynomial time. A real theory. Polytime Verifier: V (π) Class times over RRR week. A tiny introduction... There is π for satisfiable φ where V(π) says yes. For unsatisfiable φ, V (π) always says no. Will post schedule. ...and one idea Can prove any statement in NP. Tests submitted by Monday (mostly) graded. ...using random walks. Rest will be done this afternoon. Probabilistically Checkable Proof System:(r(n),q(n)) n is size of φ. Proof: π. Polytime V(π) Using r(n) random bits, look at q(n) places in π If φ is satisfiable, there is a π, where Verifier says yes. If φ is not satisfiable, for all π, Pr[V(π) says yes] 1/2. ≤ PCP Example. Probabilistically Checkable Proof System:(r(n),q(n)) Probabilistically Checkable Proof System:(r(n),q(n)) Graph Not Isomorphism: (G ,G ). n is size of φ. 1 2 n is size of φ. There is no way to permute the vertices of G1 to get G2. Proof: π. Proof: π. Polytime V(π) Give a PCP(poly(n), 1). (Weaker than PCP(O(logn), 3). Polytime V(π) Using r(n) random bits, look at q(n) places in π Exponential sized proof is allowed. Using r(n) random bits, look at q(n) places in π If φ is satisfiable, there is a π, Can only look at 1 place, though. If φ is satisfiable, there is a π, where Verifier says yes. where Verifier says yes. Any thoughts? If φ is not satisfiable, for all π, If φ is not satisfiable, for all π, Pr[V(π) says yes] 1/2. Design a proof format: π Pr[V(π) says yes] 1/2. ≤ ≤ A language is in NP if it there is a polynomial time proof system. What is the maximum size of a proof? For every labelled graph, H, A language is in PCP(r(n),q(n)) if it has a probabilistically checkable π[H] = 1 if permutation of G1 (A) O(q(n)). proof system: r(n),q(n). π[H] = 2 if permutation of G1 Don’t care if either. (B) O(q(n)r(n)). Theorem: NP PCP(O(log(n)),3). ⊂ Verifier: randomly choose x 1,2 , permute G to get H (C) O(r(n)2q(n)). ∈ { } x Only checks 3 places !!! Is π(H) equal to x? (D) O(q(n)2r (n)). How is this possible? For not equal, π exists. (D) Well..its not easy. If G1 = G2, any prover has 1/2 probability of mistake! Only 2r (n) different runs. Cool.......but exponential ..not so interesting of a proof. Look at q(n) bits in each possible run. Lots of ideas to get to O(logn) bits and 3 query bits. Another view. Gap CSP Two views of PCP. q-Constraint satisfaction problem: Formula. 1 Clauses of length q. Theorem A: There is a constant where 2 -Gap q-CSP is NP-complete q-ary truth table for each constraint. Theorem: There are constants q and ρ < 1 where ρ-Gap q-CSP is Theorem B: PCP(O(logn),O(1)) NP Is the formula satisfiable. ⊆ NP-complete Variable types can be.. Note: A = B. ⇒ Binary Variables are [0,1] Just another NP-complete problem... 1 There is 2 -Gap q-CSP is in PCP(O(logn),O(1)). Large alphabet variables are [0,...,k] Well, a bit more. Given φ. Not only is CSP NP-complete, val(φ) is fraction of satisfiable clauses. Proof format: assignment to variables. it is NP-hard to approximate within factor of 1? 1/ρ? ρ? val(φ) = 1 φ satisfiable if satisfiable π(φ) = is satisfying assignment. ≡ Within a factor of 1/ρ Verifier checks random clause and looks up variables. Example: ...and Theorem 1 is same statement that NP PCP(O(logn),O(1)). if there is π where Verifier accepts with probability 1/2. 3SAT. q = 3, and truth table for “or” of 3 variables. ⊆ 1 ≥ val(φ) 2 The ρ-Gap q-CSP Problem: φ ≥ Plus Theorem A any problem in NP in PCP(O(logn),O(1)). Is val(φ) = 1 or is val(φ) < ρ? Theorem: There are constants q and ρ < 1 where ρ-Gap q-CSP is NP-complete Reminder: Cook/Levin theorem. The other way: PCP CSP Gap amplification. → 1 Theorem A: There are constants q and ρ where 2 -Gap q-CSP is NP-complete Theorem B’: PCP(O(logn),O(1)) NP ⊆ B = A CSP is NP-complete. ⇒ 0 Is x L? Construct formula φx . Recall 3SAT is a CSP. Cook/Levin Theorem: SAT is NP-complete. ∈ GAP-CSP? Proof Idea: PCP proof system: = ... = ( ( )) Any problem A has polytime verifier. π π0 πs, s O poly n . Given a CSP instance, φ, produce an instance of GAP CSP, φG. Write out circuit for program for input x A. Verifier: yes/no based on constant number bits. φ satisfiable φG satisfiable. ∈ → Convert it to a formula. ish Verifer: constant sized clause Note: φ is not satifiable, val(φ) < 1 val(φ) 1 1/m. Gap: 1/m. on constant bits, π ,π ,π ,... → ≤ − i j k φ is not satifiable val(φ ) < 1 ∆. Gap: ∆. for each random string. → G − 2r(n) different random strings poly(n) clauses. Grow ∆ >> 1/µ. For any NO answer, a bad run of the verifier. → Assignment with val(φx ) gives proof π Pr[V (x) = yes] = val(φx ) for every π x L, φ is satisfiable. → ∈ x x L, val(φ ) < 1/2. 6∈ x Detour: Expanders. Expanders and gap amplification. Dinur’s amplification: breakthrough alert. Given a coloring instance, G, produce an instance of coloring, G. Consider “GAP” k independent set. G has a 3-coloring, or at least one edge is not correctly colored in any Either there is an independent set of size 2k. coloring For a graph G. val(φ) 1 1/m. Gap: 1/m. or every set is of size at most k. → ≤ − S 1 This is NP-complete. Pr(u,v) E [u S,v S] | | ( + λ2(G)) Step 1: Produce G0 ∈ ∈ ∈ ≤ V 2 | | Lemma: Given F, with indendepent set size α(F), there is a polytime 3-colorable G 3t-colorable G0 ` → G has an edge for every `-step path in G. G has gap of ∆ G has a gap Ω(t∆) for any 3t-coloring. algorithm to find G where → 0 since adjacency matrix of G` is A` (α(F) 2λ)logn α(G) (α(F) + 2λ)logn. − ≤ ≤ Construction: given graph G, add expander H on same node set. where A is adjacency matrix of G. Construction: Add graph on F with eigenvalue λ. Make graph G0 connecting t-length paths in graph. ` ` λ2(G ) = λ2(G) Construct logn length paths in F, → Connect paths x ,...,x with y ,...,y if any (x ,y ) in F. Idea: bad edges spread out and make many bad edges. S 1 ` 1 logn 1 logn i j Pr(u,v) E [u S,v S] |V| 2 + λ2(G ) infection of uncolorability. ∈ ∈ ∈ ≤ | | Argument idea: Use expansion. S Ramanujan Graphs: there exists degree d graphs with λ < 2/√d. Leave ind. set. S w/prob | | (1 + λ) in each step. No bad edges, no infection. | | 2 V max size of independent| | set is a power of logn. → Gap amplification. However.... Changed problem! Some details to work through... 3-coloring to 3t-coloring. Alphabet size from 3 to 3t. Need to reduce alphabet size. A, B, C! 1, 2, 3! Alphabet reduction. Summary See you ... Clauses (colorability) on variables with lots of possible values. formula on variables with few possible values. → Mind the gap! preserve the gap. PCP - proof, check a few places to catch errors with some probability. → How? CSP - formula, which is satisfiable or far from satisfiable. Remember: Equivalent! Proof contains a 3t coloring. Proving both are NP-hard Verifier chooses random edge and checks colors. Next week. Cheating proof can only get away ∆ times. (Dude, the gap!) Start with CSP ...for projects. Idea: Verifier is a polynomial sized circuit. Blow up the gap. (blows up the alphabet.) Are the two colors the same? Use PCP view to reduce the alphabet. Recursively construct PCP for verifier with smaller alphabet! (Exponential blowup for alphabet size.) (Ok, since number of colors are constant.) Lose some of the gap. Lots of cool ideas here. This PCP? Prover: Dude, there is a circuit that checks! Here is a proof that the circuit works. 276: Next spring. Prasad Raghavendra. Verifier: I am lazy, will only check a few of the gates. Goal: Format requires errors to be everywhere! Ideas from error correcting codes: Hadamard codes..
Recommended publications
  • Complexity Theory Lecture 9 Co-NP Co-NP-Complete
    Complexity Theory 1 Complexity Theory 2 co-NP Complexity Theory Lecture 9 As co-NP is the collection of complements of languages in NP, and P is closed under complementation, co-NP can also be characterised as the collection of languages of the form: ′ L = x y y <p( x ) R (x, y) { |∀ | | | | → } Anuj Dawar University of Cambridge Computer Laboratory NP – the collection of languages with succinct certificates of Easter Term 2010 membership. co-NP – the collection of languages with succinct certificates of http://www.cl.cam.ac.uk/teaching/0910/Complexity/ disqualification. Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 3 Complexity Theory 4 NP co-NP co-NP-complete P VAL – the collection of Boolean expressions that are valid is co-NP-complete. Any language L that is the complement of an NP-complete language is co-NP-complete. Any of the situations is consistent with our present state of ¯ knowledge: Any reduction of a language L1 to L2 is also a reduction of L1–the complement of L1–to L¯2–the complement of L2. P = NP = co-NP • There is an easy reduction from the complement of SAT to VAL, P = NP co-NP = NP = co-NP • ∩ namely the map that takes an expression to its negation. P = NP co-NP = NP = co-NP • ∩ VAL P P = NP = co-NP ∈ ⇒ P = NP co-NP = NP = co-NP • ∩ VAL NP NP = co-NP ∈ ⇒ Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 5 Complexity Theory 6 Prime Numbers Primality Consider the decision problem PRIME: Another way of putting this is that Composite is in NP.
    [Show full text]
  • If Np Languages Are Hard on the Worst-Case, Then It Is Easy to Find Their Hard Instances
    IF NP LANGUAGES ARE HARD ON THE WORST-CASE, THEN IT IS EASY TO FIND THEIR HARD INSTANCES Dan Gutfreund, Ronen Shaltiel, and Amnon Ta-Shma Abstract. We prove that if NP 6⊆ BPP, i.e., if SAT is worst-case hard, then for every probabilistic polynomial-time algorithm trying to decide SAT, there exists some polynomially samplable distribution that is hard for it. That is, the algorithm often errs on inputs from this distribution. This is the ¯rst worst-case to average-case reduction for NP of any kind. We stress however, that this does not mean that there exists one ¯xed samplable distribution that is hard for all probabilistic polynomial-time algorithms, which is a pre-requisite assumption needed for one-way func- tions and cryptography (even if not a su±cient assumption). Neverthe- less, we do show that there is a ¯xed distribution on instances of NP- complete languages, that is samplable in quasi-polynomial time and is hard for all probabilistic polynomial-time algorithms (unless NP is easy in the worst case). Our results are based on the following lemma that may be of independent interest: Given the description of an e±cient (probabilistic) algorithm that fails to solve SAT in the worst case, we can e±ciently generate at most three Boolean formulae (of increasing lengths) such that the algorithm errs on at least one of them. Keywords. Average-case complexity, Worst-case to average-case re- ductions, Foundations of cryptography, Pseudo classes Subject classi¯cation. 68Q10 (Modes of computation (nondetermin- istic, parallel, interactive, probabilistic, etc.) 68Q15 Complexity classes (hierarchies, relations among complexity classes, etc.) 68Q17 Compu- tational di±culty of problems (lower bounds, completeness, di±culty of approximation, etc.) 94A60 Cryptography 2 Gutfreund, Shaltiel & Ta-Shma 1.
    [Show full text]
  • The Shrinking Property for NP and Conp✩
    Theoretical Computer Science 412 (2011) 853–864 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs The shrinking property for NP and coNPI Christian Glaßer a, Christian Reitwießner a,∗, Victor Selivanov b a Julius-Maximilians-Universität Würzburg, Germany b A.P. Ershov Institute of Informatics Systems, Siberian Division of the Russian Academy of Sciences, Russia article info a b s t r a c t Article history: We study the shrinking and separation properties (two notions well-known in descriptive Received 18 August 2009 set theory) for NP and coNP and show that under reasonable complexity-theoretic Received in revised form 11 November assumptions, both properties do not hold for NP and the shrinking property does not hold 2010 for coNP. In particular we obtain the following results. Accepted 15 November 2010 Communicated by A. Razborov P 1. NP and coNP do not have the shrinking property unless PH is finite. In general, Σn and P Πn do not have the shrinking property unless PH is finite. This solves an open question Keywords: posed by Selivanov (1994) [33]. Computational complexity 2. The separation property does not hold for NP unless UP ⊆ coNP. Polynomial hierarchy 3. The shrinking property does not hold for NP unless there exist NP-hard disjoint NP-pairs NP-pairs (existence of such pairs would contradict a conjecture of Even et al. (1984) [6]). P-separability Multivalued functions 4. The shrinking property does not hold for NP unless there exist complete disjoint NP- pairs. Moreover, we prove that the assumption NP 6D coNP is too weak to refute the shrinking property for NP in a relativizable way.
    [Show full text]
  • On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs*
    On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs* Benny Applebaum† Eyal Golombek* Abstract We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, we ask whether it is possible to reduce the randomness complexity, R, of the verifier to be comparable with the number of bits, CV , that the verifier sends during the interaction. We show that such randomness sparsification is possible in several settings. Specifically, unconditional sparsification can be obtained in the non-uniform setting (where the verifier is modelled as a circuit), and in the uniform setting where the parties have access to a (reusable) common-random-string (CRS). We further show that constant-round uniform protocols can be sparsified without a CRS under a plausible worst-case complexity-theoretic assumption that was used previously in the context of derandomization. All the above sparsification results preserve statistical-zero knowledge provided that this property holds against a cheating verifier. We further show that randomness sparsification can be applied to honest-verifier statistical zero-knowledge (HVSZK) proofs at the expense of increasing the communica- tion from the prover by R−F bits, or, in the case of honest-verifier perfect zero-knowledge (HVPZK) by slowing down the simulation by a factor of 2R−F . Here F is a new measure of accessible bit complexity of an HVZK proof system that ranges from 0 to R, where a maximal grade of R is achieved when zero- knowledge holds against a “semi-malicious” verifier that maliciously selects its random tape and then plays honestly.
    [Show full text]
  • Randomised Computation 1 TM Taking Advices 2 Karp-Lipton Theorem
    INFR11102: Computational Complexity 29/10/2019 Lecture 13: More on circuit models; Randomised Computation Lecturer: Heng Guo 1 TM taking advices An alternative way to characterize P=poly is via TMs that take advices. Definition 1. For functions F : N ! N and A : N ! N, the complexity class DTime[F ]=A consists of languages L such that there exist a TM with time bound F (n) and a sequence fangn2N of “advices” satisfying: • janj ≤ A(n); • for jxj = n, x 2 L if and only if M(x; an) = 1. The following theorem explains the notation P=poly, namely “polynomial-time with poly- nomial advice”. S c Theorem 1. P=poly = c;d2N DTime[n ]=nd . Proof. If L 2 P=poly, then it can be computed by a family C = fC1;C2; · · · g of Boolean circuits. Let an be the description of Cn, andS the polynomial time machine M just reads 2 c this description and simulates it. Hence L c;d2N DTime[n ]=nd . For the other direction, if a language L can be computed in polynomial-time with poly- nomial advice, say by TM M with advices fang, then we can construct circuits fDng to simulate M, as in the theorem P ⊂ P=poly in the last lecture. Hence, Dn(x; an) = 1 if and only if x 2 L. The final circuit Cn just does exactly what Dn does, except that Cn “hardwires” the advice an. Namely, Cn(x) := Dn(x; an). Hence, L 2 P=poly. 2 Karp-Lipton Theorem Dick Karp and Dick Lipton showed that NP is unlikely to be contained in P=poly [KL80].
    [Show full text]
  • Computational Complexity and Intractability: an Introduction to the Theory of NP Chapter 9 2 Objectives
    1 Computational Complexity and Intractability: An Introduction to the Theory of NP Chapter 9 2 Objectives . Classify problems as tractable or intractable . Define decision problems . Define the class P . Define nondeterministic algorithms . Define the class NP . Define polynomial transformations . Define the class of NP-Complete 3 Input Size and Time Complexity . Time complexity of algorithms: . Polynomial time (efficient) vs. Exponential time (inefficient) f(n) n = 10 30 50 n 0.00001 sec 0.00003 sec 0.00005 sec n5 0.1 sec 24.3 sec 5.2 mins 2n 0.001 sec 17.9 mins 35.7 yrs 4 “Hard” and “Easy” Problems . “Easy” problems can be solved by polynomial time algorithms . Searching problem, sorting, Dijkstra’s algorithm, matrix multiplication, all pairs shortest path . “Hard” problems cannot be solved by polynomial time algorithms . 0/1 knapsack, traveling salesman . Sometimes the dividing line between “easy” and “hard” problems is a fine one. For example, . Find the shortest path in a graph from X to Y (easy) . Find the longest path (with no cycles) in a graph from X to Y (hard) 5 “Hard” and “Easy” Problems . Motivation: is it possible to efficiently solve “hard” problems? Efficiently solve means polynomial time solutions. Some problems have been proved that no efficient algorithms for them. For example, print all permutation of a number n. However, many problems we cannot prove there exists no efficient algorithms, and at the same time, we cannot find one either. 6 Traveling Salesperson Problem . No algorithm has ever been developed with a Worst-case time complexity better than exponential .
    [Show full text]
  • Week 1: an Overview of Circuit Complexity 1 Welcome 2
    Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes).
    [Show full text]
  • Chapter 24 Conp, Self-Reductions
    Chapter 24 coNP, Self-Reductions CS 473: Fundamental Algorithms, Spring 2013 April 24, 2013 24.1 Complementation and Self-Reduction 24.2 Complementation 24.2.1 Recap 24.2.1.1 The class P (A) A language L (equivalently decision problem) is in the class P if there is a polynomial time algorithm A for deciding L; that is given a string x, A correctly decides if x 2 L and running time of A on x is polynomial in jxj, the length of x. 24.2.1.2 The class NP Two equivalent definitions: (A) Language L is in NP if there is a non-deterministic polynomial time algorithm A (Turing Machine) that decides L. (A) For x 2 L, A has some non-deterministic choice of moves that will make A accept x (B) For x 62 L, no choice of moves will make A accept x (B) L has an efficient certifier C(·; ·). (A) C is a polynomial time deterministic algorithm (B) For x 2 L there is a string y (proof) of length polynomial in jxj such that C(x; y) accepts (C) For x 62 L, no string y will make C(x; y) accept 1 24.2.1.3 Complementation Definition 24.2.1. Given a decision problem X, its complement X is the collection of all instances s such that s 62 L(X) Equivalently, in terms of languages: Definition 24.2.2. Given a language L over alphabet Σ, its complement L is the language Σ∗ n L. 24.2.1.4 Examples (A) PRIME = nfn j n is an integer and n is primeg o PRIME = n n is an integer and n is not a prime n o PRIME = COMPOSITE .
    [Show full text]
  • Dspace 6.X Documentation
    DSpace 6.x Documentation DSpace 6.x Documentation Author: The DSpace Developer Team Date: 27 June 2018 URL: https://wiki.duraspace.org/display/DSDOC6x Page 1 of 924 DSpace 6.x Documentation Table of Contents 1 Introduction ___________________________________________________________________________ 7 1.1 Release Notes ____________________________________________________________________ 8 1.1.1 6.3 Release Notes ___________________________________________________________ 8 1.1.2 6.2 Release Notes __________________________________________________________ 11 1.1.3 6.1 Release Notes _________________________________________________________ 12 1.1.4 6.0 Release Notes __________________________________________________________ 14 1.2 Functional Overview _______________________________________________________________ 22 1.2.1 Online access to your digital assets ____________________________________________ 23 1.2.2 Metadata Management ______________________________________________________ 25 1.2.3 Licensing _________________________________________________________________ 27 1.2.4 Persistent URLs and Identifiers _______________________________________________ 28 1.2.5 Getting content into DSpace __________________________________________________ 30 1.2.6 Getting content out of DSpace ________________________________________________ 33 1.2.7 User Management __________________________________________________________ 35 1.2.8 Access Control ____________________________________________________________ 36 1.2.9 Usage Metrics _____________________________________________________________
    [Show full text]
  • NP-Completeness Part I
    NP-Completeness Part I Outline for Today ● Recap from Last Time ● Welcome back from break! Let's make sure we're all on the same page here. ● Polynomial-Time Reducibility ● Connecting problems together. ● NP-Completeness ● What are the hardest problems in NP? ● The Cook-Levin Theorem ● A concrete NP-complete problem. Recap from Last Time The Limits of Computability EQTM EQTM co-RE R RE LD LD ADD HALT ATM HALT ATM 0*1* The Limits of Efficient Computation P NP R P and NP Refresher ● The class P consists of all problems solvable in deterministic polynomial time. ● The class NP consists of all problems solvable in nondeterministic polynomial time. ● Equivalently, NP consists of all problems for which there is a deterministic, polynomial-time verifier for the problem. Reducibility Maximum Matching ● Given an undirected graph G, a matching in G is a set of edges such that no two edges share an endpoint. ● A maximum matching is a matching with the largest number of edges. AA maximummaximum matching.matching. Maximum Matching ● Jack Edmonds' paper “Paths, Trees, and Flowers” gives a polynomial-time algorithm for finding maximum matchings. ● (This is the same Edmonds as in “Cobham- Edmonds Thesis.) ● Using this fact, what other problems can we solve? Domino Tiling Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling The Setup ● To determine whether you can place at least k dominoes on a crossword grid, do the following: ● Convert the grid into a graph: each empty cell is a node, and any two adjacent empty cells have an edge between them.
    [Show full text]
  • The Complexity Zoo
    The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/.
    [Show full text]
  • Lecture 10: Learning DNF, AC0, Juntas Feb 15, 2007 Lecturer: Ryan O’Donnell Scribe: Elaine Shi
    Analysis of Boolean Functions (CMU 18-859S, Spring 2007) Lecture 10: Learning DNF, AC0, Juntas Feb 15, 2007 Lecturer: Ryan O’Donnell Scribe: Elaine Shi 1 Learning DNF in Almost Polynomial Time From previous lectures, we have learned that if a function f is ǫ-concentrated on some collection , then we can learn the function using membership queries in poly( , 1/ǫ)poly(n) log(1/δ) time.S |S| O( w ) In the last lecture, we showed that a DNF of width w is ǫ-concentrated on a set of size n ǫ , and O( w ) concluded that width-w DNFs are learnable in time n ǫ . Today, we shall improve this bound, by showing that a DNF of width w is ǫ-concentrated on O(w log 1 ) a collection of size w ǫ . We shall hence conclude that poly(n)-size DNFs are learnable in almost polynomial time. Recall that in the last lecture we introduced H˚astad’s Switching Lemma, and we showed that 1 DNFs of width w are ǫ-concentrated on degrees up to O(w log ǫ ). Theorem 1.1 (Hastad’s˚ Switching Lemma) Let f be computable by a width-w DNF, If (I, X) is a random restriction with -probability ρ, then d N, ∗ ∀ ∈ d Pr[DT-depth(fX→I) >d] (5ρw) I,X ≤ Theorem 1.2 If f is a width-w DNF, then f(U)2 ǫ ≤ |U|≥OX(w log 1 ) ǫ b O(w log 1 ) To show that a DNF of width w is ǫ-concentrated on a collection of size w ǫ , we also need the following theorem: Theorem 1.3 If f is a width-w DNF, then 1 |U| f(U) 2 20w | | ≤ XU b Proof: Let (I, X) be a random restriction with -probability 1 .
    [Show full text]