Generalized Hex and Logical Characterizations of Polynomial Space

Total Page:16

File Type:pdf, Size:1020Kb

Generalized Hex and Logical Characterizations of Polynomial Space default Generalized Hex and logical characterizations of p olynomial space a; b; AA ArratiaQuesada and IA Stewart a Department of MathematicsUniversity of WisconsinMadison Madison WI USA b Department of Mathematics and Computer Science Leicester University Leicester LE RH UK submitted to Information Processing Letters We answer a question p osed by Makowsky and Pnueli and show that the logic HEX FO where HEX is the op erator ie s uniform sequence of Lindstrom quantiers corresp onding to the wellknown PSPACEcomplete decision problem Generalized Hex collapses to the fragment HEX FO and moreover that this logic s has a particular normal form which results in the problem HEX b eing complete for PSPACE via quantierfree pro jections with successor HEX is the rst natural problem to b e shown to have this prop erty Our pro of of this normal form result is remark ably similar to Immermans original pro of that transitive closure logic TC FO has such a normal form which is surprising s given that HEX FO captures PSPACE and TC FO s s captures NL We also show that HEX FO do es not capture PSPACE and that this logic do es not have a corresp onding normal form keywords Key words Computational complexity Descriptive complexity Finite mo del theory Logical characterizations of p olynomial space Completeness via logical reductions We consider a particular logical characterization of the complexity class PSPACE using rstorder logic with a builtin successor relation extended Partially supp orted by EPSRC Grant GRK Most of this work was done whilst the author was visiting the University of Leicester with an op erator corresp onding to the wellknown PSPACEcomplete deci sion problem Generalized Hex that is the logic HEX FO It was shown s by Makowsky and Pnueli see also that any problem in PSPACE can b e dened by a sentence of the logic HEX FO and conversely that s any problem denable by a sentence of this logic is in PSPACE There are numerous other similar logical characterizations of complexity classes that is using logics obtained by extending rstorder logic with suc cessor using op erators or more precisely uniform sequences of Lindstrom quantiers corresp onding to problems the rst such b eing Immermans char acterization of NL as those problems denable in the now wellstudied tran sitive closure logic TC FO To our knowledge for all of these other s characterizations more information is forthcoming that is the logics involved p ossess normal forms and these normal forms yield strong complexitytheoretic completeness results However Makowsky and Pnuelis logical characterization of PSPACE failed to establish such a normal form for the logic HEX FO s and they left it as an op en problem as to whether the normal form existed In Theorem of this note we establish such a normal form for HEX FO s which yields as an immediate corollary that HEX is complete for PSPACE via quantierfree pro jections also called pro jection translations with successor Other problems have b een shown to b e complete for PSPACE via quantier free translations with successor in However these problems are rather unnatural b eing based around the logical characterization of PSPACE as partialxed p oint logic with successor in the sense that rstorder logic was augmented with a contrived op erator to try and mimic the application of the partialxed p oint construct On the other hand the normal form results for the logics in hold in the absence of a successor relation which was the whole p oint of the research in those pap ers A complete problem for PSPACE via quantierfree pro jections with successor was also exhibited in although it was not explicitly stated there as b eing so but again this problem was unnatural b eing based around a characterization of PSPACE using a dierent inductive construct Our result that HEX is complete for PSPACE via quantierfree pro jections or rstorder translations for that matter with successor is the rst such completeness result involving what could b e called a natural problem Not withstanding the preceding paragraph to our mind our actual pro of of Theorem is the most interesting asp ect of this note given that it is essentially identical to Immermans pro of in that transitive closure logic or as was proven there the p ositive version TC FO has a normal form except that s in the combinatorial construction we replace an edge in one of Immermans digraphs with a particular gadget see the pro of of Theorem This fact encourages one to view the problem HEX as a game theoretic counterpart to TC We intend to investigate this phenomenon more closely in future and hop e to obtain criteria under which one can automatically transform a normal form result for some logic FO which might capture NL for example s to the logic formed using the gametheoretic version of which might capture PSPACE for example The complexity class PSPACE do es have logical characterizations in which a successor relation or any other builtin relation do es not app ear and con sequently we have b een very careful ab ove in detailing when the successor relation is present in our logics However as yet no problem natural or otherwise has b een shown to b e complete for PSPACE via restricted logical reductions in the absence of the successor relation Our nal result in this note is that in the absence of the successor relation b oth the normal form and the logical characterization in Theorem fail to hold Note that although the log ics in have normal form results these logics do not capture PSPACE in the absence of a successor relation Given that nite mo del theory and descriptive complexity theory are now rmly established in logic and theoretical computer science rather than give denitions here we simply refer the reader to the pap er for all deni tions and concepts regarding logics of the form FO and their relation s to complexity classes to the pap er for generalized EhrenfeuchtFrasse games and their applicability to logics without builtin relations and to the b o ok for background issues Now for our results Let the signature hE C D i where E is a binary relation symbol and C and D are constant symbols our signatures never contain function symbols The problem HEX consists of those structures S for which Player has a winning strategy in the game of Generalized Hex on S where the game of Generalized Hex is played as follows Starting with Player two players take it in turns to colour previously uncoloured vertices S S S of the graph describ ed by E apart from C and D with Player using the colour blue and Player using the colour red If at the end of the play there S S is a path from the source C to the sink D consisting entirely of blue coloured vertices then Player wins otherwise Player wins The notion of Player having a winning strategy should b e clear The problem HEX is well known to b e complete for PSPACE via logspace reductions see for more details The problem TC consists of those structures S for which there is a path S S S in the digraph describ ed by E from the source C to the sink D Theorem HEX FO PSPACE and every problem in PSPACE s can be dened by a sentence of the form HEX x y x y max where jxj jy j k for some k is a quantierfree projection with suc cessor and resp max is the constant symbol resp max repeated k times PROOF The result that HEX FO PSPACE is due to Makowsky s and Pnueli see also Like the pro of of Theorem we pro ceed by induction on the complexity of a sentence HEX FO The induction step assumes that every well s formed subformula of is logically equivalent to a formula of the desired form and then treats the dierent ways in which can b e built from its maximal subformulae in turn Consider the case in the pro of of Theorem when is of the form z TCx y x y max where jxj jy j k for some k and is a quantierfree pro jection with z amongst its free variables but dierent from those of x and y Let the under lying signature of b e and let S b e some structure of size n The construc tion in the pro of of Theorem takes copies of the digraphs D describ ed z S by x y z where the vertices are k tuples over jS j f n g and where z is given a value from jS j and strings them together to form the di graph D by including an edge from the vertex max of D to the vertex of z D for each z f n g the vertex of D resp max of D is z n denoted as the source resp sink of the resulting digraph D Consequently D has a path from its source to its sink i for each z f n g D has a z path from its vertex to its vertex max What is more it is shown in the pro of of Theorem that the digraph D can b e describ ed in terms of S uniformly by a quantierfree pro jection so that the source is and the sink is max with the length of these tuples as dictated by the logical description When dealing with the op erator HEX as opp osed to TC it is not enough to simply rep eat the ab ove construction However by utilizing the following gadget Immermans construction can b e made to work Let G b e some undirected graph with source a and sink b Let G b e obtained from copies of G namely fG i g by amalgamating i the sources of G G G and G to form the vertex a the sources of G G G and G to form the vertex a the sinks of G G G and G to form the vertex b the sinks of G G G and G to form the vertex b We say that G has two sources a and a and two sinks b and b The graph G can b e visualized as in Fig where each graph G is represented
Recommended publications
  • Week 1: an Overview of Circuit Complexity 1 Welcome 2
    Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes).
    [Show full text]
  • The Complexity Zoo
    The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/.
    [Show full text]
  • Glossary of Complexity Classes
    App endix A Glossary of Complexity Classes Summary This glossary includes selfcontained denitions of most complexity classes mentioned in the b o ok Needless to say the glossary oers a very minimal discussion of these classes and the reader is re ferred to the main text for further discussion The items are organized by topics rather than by alphab etic order Sp ecically the glossary is partitioned into two parts dealing separately with complexity classes that are dened in terms of algorithms and their resources ie time and space complexity of Turing machines and complexity classes de ned in terms of nonuniform circuits and referring to their size and depth The algorithmic classes include timecomplexity based classes such as P NP coNP BPP RP coRP PH E EXP and NEXP and the space complexity classes L NL RL and P S P AC E The non k uniform classes include the circuit classes P p oly as well as NC and k AC Denitions and basic results regarding many other complexity classes are available at the constantly evolving Complexity Zoo A Preliminaries Complexity classes are sets of computational problems where each class contains problems that can b e solved with sp ecic computational resources To dene a complexity class one sp ecies a mo del of computation a complexity measure like time or space which is always measured as a function of the input length and a b ound on the complexity of problems in the class We follow the tradition of fo cusing on decision problems but refer to these problems using the terminology of promise problems
    [Show full text]
  • Interactive Oracle Proofs with Constant Rate and Query Complexity∗†
    Interactive Oracle Proofs with Constant Rate and Query Complexity∗† Eli Ben-Sasson1, Alessandro Chiesa2, Ariel Gabizon‡3, Michael Riabzev4, and Nicholas Spooner5 1 Technion, Haifa, Israel [email protected] 2 University of California, Berkeley, CA, USA [email protected] 3 Zerocoin Electronic Coin Company (Zcash), Boulder, CO, USA [email protected] 4 Technion, Haifa, Israel [email protected] 5 University of Toronto, Toronto, Canada [email protected] Abstract We study interactive oracle proofs (IOPs) [7, 43], which combine aspects of probabilistically check- able proofs (PCPs) and interactive proofs (IPs). We present IOP constructions and techniques that let us achieve tradeoffs in proof length versus query complexity that are not known to be achievable via PCPs or IPs alone. Our main results are: 1. Circuit satisfiability has 3-round IOPs with linear proof length (counted in bits) and constant query complexity. 2. Reed–Solomon codes have 2-round IOPs of proximity with linear proof length and constant query complexity. 3. Tensor product codes have 1-round IOPs of proximity with sublinear proof length and constant query complexity. (A familiar example of a tensor product code is the Reed–Muller code with a bound on individual degrees.) For all the above, known PCP constructions give quasilinear proof length and constant query complexity [12, 16]. Also, for circuit satisfiability, [10] obtain PCPs with linear proof length but sublinear (and super-constant) query complexity. As in [10], we rely on algebraic-geometry codes to obtain our first result; but, unlike that work, our use of such codes is much “lighter” because we do not rely on any automorphisms of the code.
    [Show full text]
  • User's Guide for Complexity: a LATEX Package, Version 0.80
    User’s Guide for complexity: a LATEX package, Version 0.80 Chris Bourke April 12, 2007 Contents 1 Introduction 2 1.1 What is complexity? ......................... 2 1.2 Why a complexity package? ..................... 2 2 Installation 2 3 Package Options 3 3.1 Mode Options .............................. 3 3.2 Font Options .............................. 4 3.2.1 The small Option ....................... 4 4 Using the Package 6 4.1 Overridden Commands ......................... 6 4.2 Special Commands ........................... 6 4.3 Function Commands .......................... 6 4.4 Language Commands .......................... 7 4.5 Complete List of Class Commands .................. 8 5 Customization 15 5.1 Class Commands ............................ 15 1 5.2 Language Commands .......................... 16 5.3 Function Commands .......................... 17 6 Extended Example 17 7 Feedback 18 7.1 Acknowledgements ........................... 19 1 Introduction 1.1 What is complexity? complexity is a LATEX package that typesets computational complexity classes such as P (deterministic polynomial time) and NP (nondeterministic polynomial time) as well as sets (languages) such as SAT (satisfiability). In all, over 350 commands are defined for helping you to typeset Computational Complexity con- structs. 1.2 Why a complexity package? A better question is why not? Complexity theory is a more recent, though mature area of Theoretical Computer Science. Each researcher seems to have his or her own preferences as to how to typeset Complexity Classes and has built up their own personal LATEX commands file. This can be frustrating, to say the least, when it comes to collaborations or when one has to go through an entire series of files changing commands for compatibility or to get exactly the look they want (or what may be required).
    [Show full text]
  • A Short History of Computational Complexity
    The Computational Complexity Column by Lance FORTNOW NEC Laboratories America 4 Independence Way, Princeton, NJ 08540, USA [email protected] http://www.neci.nj.nec.com/homepages/fortnow/beatcs Every third year the Conference on Computational Complexity is held in Europe and this summer the University of Aarhus (Denmark) will host the meeting July 7-10. More details at the conference web page http://www.computationalcomplexity.org This month we present a historical view of computational complexity written by Steve Homer and myself. This is a preliminary version of a chapter to be included in an upcoming North-Holland Handbook of the History of Mathematical Logic edited by Dirk van Dalen, John Dawson and Aki Kanamori. A Short History of Computational Complexity Lance Fortnow1 Steve Homer2 NEC Research Institute Computer Science Department 4 Independence Way Boston University Princeton, NJ 08540 111 Cummington Street Boston, MA 02215 1 Introduction It all started with a machine. In 1936, Turing developed his theoretical com- putational model. He based his model on how he perceived mathematicians think. As digital computers were developed in the 40's and 50's, the Turing machine proved itself as the right theoretical model for computation. Quickly though we discovered that the basic Turing machine model fails to account for the amount of time or memory needed by a computer, a critical issue today but even more so in those early days of computing. The key idea to measure time and space as a function of the length of the input came in the early 1960's by Hartmanis and Stearns.
    [Show full text]
  • TC Circuits for Algorithmic Problems in Nilpotent Groups
    TC0 Circuits for Algorithmic Problems in Nilpotent Groups Alexei Myasnikov1 and Armin Weiß2 1 Stevens Institute of Technology, Hoboken, NJ, USA 2 Universität Stuttgart, Germany Abstract Recently, Macdonald et. al. showed that many algorithmic problems for finitely generated nilpo- tent groups including computation of normal forms, the subgroup membership problem, the con- jugacy problem, and computation of subgroup presentations can be done in LOGSPACE. Here we follow their approach and show that all these problems are complete for the uniform circuit class TC0 – uniformly for all r-generated nilpotent groups of class at most c for fixed r and c. Moreover, if we allow a certain binary representation of the inputs, then the word problem and computation of normal forms is still in uniform TC0, while all the other problems we examine are shown to be TC0-Turing reducible to the problem of computing greatest common divisors and expressing them as linear combinations. 1998 ACM Subject Classification F.2.2 Nonnumerical Algorithms and Problems, G.2.0 Discrete Mathematics Keywords and phrases nilpotent groups, TC0, abelian groups, word problem, conjugacy problem, subgroup membership problem, greatest common divisors Digital Object Identifier 10.4230/LIPIcs.MFCS.2017.23 1 Introduction The word problem (given a word over the generators, does it represent the identity?) is one of the fundamental algorithmic problems in group theory introduced by Dehn in 1911 [3]. While for general finitely presented groups all these problems are undecidable [22, 2], for many particular classes of groups decidability results have been established – not just for the word problem but also for a wide range of other problems.
    [Show full text]
  • Limits to Parallel Computation: P-Completeness Theory
    Limits to Parallel Computation: P-Completeness Theory RAYMOND GREENLAW University of New Hampshire H. JAMES HOOVER University of Alberta WALTER L. RUZZO University of Washington New York Oxford OXFORD UNIVERSITY PRESS 1995 This book is dedicated to our families, who already know that life is inherently sequential. Preface This book is an introduction to the rapidly growing theory of P- completeness — the branch of complexity theory that focuses on identifying the “hardest” problems in the class P of problems solv- able in polynomial time. P-complete problems are of interest because they all appear to lack highly parallel solutions. That is, algorithm designers have failed to find NC algorithms, feasible highly parallel solutions that take time polynomial in the logarithm of the problem size while using only a polynomial number of processors, for them. Consequently, the promise of parallel computation, namely that ap- plying more processors to a problem can greatly speed its solution, appears to be broken by the entire class of P-complete problems. This state of affairs is succinctly expressed as the following question: Does P equal NC ? Organization of the Material The book is organized into two parts: an introduction to P- completeness theory, and a catalog of P-complete and open prob- lems. The first part of the book is a thorough introduction to the theory of P-completeness. We begin with an informal introduction. Then we discuss the major parallel models of computation, describe the classes NC and P, and present the notions of reducibility and com- pleteness. We subsequently introduce some fundamental P-complete problems, followed by evidence suggesting why NC does not equal P.
    [Show full text]
  • Some NP-Complete Problems
    Appendix A Some NP-Complete Problems To ask the hard question is simple. But what does it mean? What are we going to do? W.H. Auden In this appendix we present a brief list of NP-complete problems; we restrict ourselves to problems which either were mentioned before or are closely re- lated to subjects treated in the book. A much more extensive list can be found in Garey and Johnson [GarJo79]. Chinese postman (cf. Sect. 14.5) Let G =(V,A,E) be a mixed graph, where A is the set of directed edges and E the set of undirected edges of G. Moreover, let w be a nonnegative length function on A ∪ E,andc be a positive number. Does there exist a cycle of length at most c in G which contains each edge at least once and which uses the edges in A according to their given orientation? This problem was shown to be NP-complete by Papadimitriou [Pap76], even when G is a planar graph with maximal degree 3 and w(e) = 1 for all edges e. However, it is polynomial for graphs and digraphs; that is, if either A = ∅ or E = ∅. See Theorem 14.5.4 and Exercise 14.5.6. Chromatic index (cf. Sect. 9.3) Let G be a graph. Is it possible to color the edges of G with k colors, that is, does χ(G) ≤ k hold? Holyer [Hol81] proved that this problem is NP-complete for each k ≥ 3; this holds even for the special case where k =3 and G is 3-regular.
    [Show full text]
  • Descriptive Complexity: a Logicians Approach to Computation
    Descriptive Complexity: A Logician’s Approach to Computation N. Immerman basic issue in computer science is there are exponentially many possibilities, the complexity of problems. If one is but in this case no known algorithm is faster doing a calculation once on a than exponential time. medium-sized input, the simplest al- Computational complexity measures how gorithm may be the best method to much time and/or memory space is needed as Ause, even if it is not the fastest. However, when a function of the input size. Let TIME[t(n)] be the one has a subproblem that will have to be solved set of problems that can be solved by algorithms millions of times, optimization is important. A that perform at most O(t(n)) steps for inputs of fundamental issue in theoretical computer sci- size n. The complexity class polynomial time (P) ence is the computational complexity of prob- is the set of problems that are solvable in time lems. How much time and how much memory at most some polynomial in n. space is needed to solve a particular problem? ∞ Here are a few examples of such problems: P= TIME[nk] 1. Reachability: Given a directed graph and k[=1 two specified points s,t, determine if there Even though the class TIME[t(n)] is sensitive is a path from s to t. A simple, linear-time to the exact machine model used in the com- algorithm marks s and then continues to putations, the class P is quite robust. The prob- mark every vertex at the head of an edge lems Reachability and Min-triangulation are el- whose tail is marked.
    [Show full text]
  • Circuit Complexity and Computational Complexity
    Circuit Complexity and Computational Complexity Lecture Notes for Math 267AB University of California, San Diego January{June 1992 Instructor: Sam Buss Notes by: Frank Baeuerle Sam Buss Bob Carragher Matt Clegg Goran Gogi¶c Elias Koutsoupias John Lillis Dave Robinson Jinghui Yang 1 These lecture notes were written for a topics course in the Mathematics Department at the University of California, San Diego during the winter and spring quarters of 1992. Each student wrote lecture notes for between two and ¯ve one and one half hour lectures. I'd like to thank the students for a superb job of writing up lecture notes. January 9-14. Bob Carragher's notes on Introduction to circuit complexity. Theorems of Shannon and Lupanov giving upper and lower bounds of circuit complexity of almost all Boolean functions. January 14-21. Matt Clegg's notes on Spira's theorem relating depth and formula size Krapchenko's lower bound on formula size over AND/OR/NOT January 23-28. Frank Baeuerle's notes on Neciporuk's theorem Simulation of time bounded TM's by circuits January 30 - February 4. John Lillis's notes on NC/AC hierarchy Circuit value problem Depth restricted circuits for space bounded Turing machines Addition is in NC1. February 6-13. Goran Gogi¶c's notes on Circuits for parallel pre¯x vector addition and for symmetric functions. February 18-20. Dave Robinson's notes on Schnorr's 2n-3 lower bound on circuit size Blum's 3n-o(n) lower bound on circuit size February 25-27. Jinghui Yang's notes on Subbotovskaya's theorem Andreev's n2:5 lower bound on formula size with AND/OR/NOT.
    [Show full text]
  • 7. Overview of Modern QMC Algorithms
    7. Overview of modern QMC algorithms Friday, 9 July 2010 Modern Monte Carlo algorithms • Which system sizes can be studied? temperature local updates modern algorithms 3D Tc 16’000 spins 16’000’000 spins 0.1 J 200 spins 1’000’000 spins 0.005 J ––– 50’000 spins 3D Tc 32 bosons 1’000’000 bosons 0.1 t 32 bosons 10’000 bosons Friday, 9 July 2010 When to use SSE? • For quantum magnets • loop cluster algorithm if there is spin inversion symmetry • directed loops if there is no spin inversion symmetry • For hardcore bosons: • loop cluster algorithm if there is particle-hole symmetry • directed loops if there is no particle-hole symmetry • Which models? • 2-site interactions are rather straightforward • multi-site interactions require more thought Friday, 9 July 2010 When to use path integrals? • For Bose-Hubbard models • Use the worm algorithm in continuous time path integrals • This expands only in the hopping t and not the much larger repulsion U • For non-local in time actions • Appear in dissipative (Caldeira-Legget type) models, coupling to phonons, DMFT, ... • Cluster algorithms are again possible in case of spin-inversion symmetry Friday, 9 July 2010 8. Wang-Landau sampling and optimized ensembles for quantum systems Friday, 9 July 2010 First order phase transitions Tunneling out of meta-stable state is suppressed exponentially liquid gas gas liquid τ ∝exp(−cLd −1 /T) P Critical slowing down solved by cluster updates liquid How can we tunnel critical ? point out of metastable state? gas T Friday, 9 July 2010 First order phase transitions • Tunneling problem at a first order phase transition is solved by changing the ensemble to create a flat energy landscape • Multicanonical sampling (Berg and Neuhaus, Phys.
    [Show full text]