Arxiv:2107.10454V1 [Cs.DS] 22 Jul 2021 Objective Is to find a Route That Is (Approximately) Positive Integer Z

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:2107.10454V1 [Cs.DS] 22 Jul 2021 Objective Is to find a Route That Is (Approximately) Positive Integer Z The Traveling Firefighter Problem Majid Farhadi∗ Alejandro Toriello Prasad Tetali† Georgia Tech Georgia Tech Georgia Tech [email protected] [email protected] [email protected] Abstract optimized for a specific norm, particularly yielding a 5:65-approximation for the TFP on general metrics. We introduce the Lp Traveling Salesman Problem (Lp- TSP), given by an origin, a set of destinations, and We leave open several interesting directions to fur- underlying distances. The objective is to schedule a ther develop this line of research. destination visit sequence for a traveler of unit speed to minimize the Minkowski p-norm of the resulting vector 1 Introduction of visit/service times. For p = 1 the problem becomes The Lp-TSP is a routing problem seeking to minimize a path variant of the TSP, and for p = 1 it defines the Lp norm of the vector of visit/service times to a set the Traveling Repairman Problem (TRP), both at the of customer locations. It generalizes and interpolates center of classical combinatorial optimization. between two well-studied problems, the path variant of Lp-TSP can be formulated as a convex mixed- the TSP and the TRP, also known as the Minimum integer program and enables a smooth interpolation Latency Problem, which are the two extreme cases between path-TSP and TRP, corresponding to optimal in which one minimizes either the largest or the sum routes from the perspective of a server versus the of service times. By assuming the server's speed is customers, respectively. The parameter p can affect constant, we use time and distance interchangeably in fairness or efficiency of the solution: The case p = 2, the remainder of the paper. which we term the Traveling Firefighter Problem (TFP), As one motivating example, the Lp-TSP for p = 2, models the scenario when the cost/damage due to a which we call the Traveling Firefighter Problem (TFP), delay in service is quadratic in time. abstracts a macro-scale optimal strategy for dispatching a firefighter to minimize the total damage due to fires We provide a polynomial-time reduction of L - p at various locations. Ride-sharing is another use-case of TSP (losing a factor of 1 + " in performance) to our problem. For example, devising the return route of the segmented-TSP, a routing problem that defines a a school bus, should we optimize the fuel consumption constant O(1+"−2) number of deadlines by which given (i.e. the driver's time en route) or the average student numbers of vertices should be visited. Subsequently we waiting time? Is it fairer to further penalize larger derive polynomial-time approximation schemes for L - p waiting times, e.g. minimizing the sum of squares/cubes TSP in the Euclidean metric and the tree metric (for of the waiting times? Before formulating the problems which the problem is strongly NP-hard). under study we introduce some notation. We also study the all-norm-TSP, in which the Notation. [z] denotes the set f1; ··· ; zg for any arXiv:2107.10454v1 [cs.DS] 22 Jul 2021 objective is to find a route that is (approximately) positive integer z. O~(·) is equivalent to O(·), treating optimal with respect to the minimization of any norm " > 0 as a constant. A metric over a set of nodes V is of the visit times. We improve the approximation a distance function d : V × V ! that satisfies bound for this problem to 8, down from 16, and R≥0 symmetry, d(x; y) = d(y; x) 8x; y 2 V , identity, further prove an impossibility for an approximation d(x; x) = 0, and the triangle inequality, d(x; y) ≤ factor better than 1:78, even in line metrics. Finally, d(x; z) + d(z; y) 8x; y; z 2 V: we show the performance of our algorithm can be The inputs to the problem are the set of vertices V , including both the destinations and the server's ∗Supported in part by aco.gatech.edu, triad.gatech.edu. starting location, s 2 V , and the underlying metric Part of this work was conducted when authors visited Simons d(·; ·) over V , corresponding to distances (or times) Institute for the Theory of Computing. between vertex pairs. †Research supported in part by the NSF grant DMS-2055022. The author's new affiliation is Department of Mathematical A feasible solution or route is a permutation σ th Sciences, Carnegie Mellon University, Pittsburgh. over V that starts at the origin; σi denotes the i vertex 1 Copyright © 2021 by SIAM Unauthorized reproduction of this article is prohibited to be visited, so we always have σ1 = s. F denotes the set of all feasible solutions. The ith smallest visit time, σ A S B C due to a solution σ 2 F, is denoted Ti , i.e. ( (a) L2-TSP route σ 0 i = 1 Ti = Pi j=2 d(σj−1; σj) i 2 f2; ··· ; ng σ A S B C The visit time for vertex v is denoted `v . Similarly, σ σ Pσi=v `s = 0 and `v = i=2 d(σi−1; σi) 8v 6= s. (b) L1-TSP route Definition 1. (L -TSP) The input of the optimiza- p Figure 1: Different norms cause different routes. tion problem Lp-TSP is a set of destinations V , a start- ing vertex s 2 V , and a metric d : V × V ! R≥0. The objective is to find a feasible route, σ 2 F, starting at s and visiting all v 2 V , that minimizes the Minkowski the best solution for the firefighter: L1-TSP minimizes σ the latest visit time for all fires, while the cost could be p-norm of the visit times, i.e. minσ2F k` kp, where affected by all visit times; thus an aggregated measure 1 ! p could be a better objective. σ X σ p k` kp := j`v j : For example, consider the following simple dynam- v2V ics for the spread of wildfires over uniform territory, ig- noring possible differences such as vegetation, weather When the problem/objective is clear from context, and wind. After every second, a flammable point of we denote an optimal route as OPT and the answer of territory is ignited if it is within a unit distance from our algorithm as ALG. the burning flames. Under these dynamics, the area of A Better Objective. One can verify that the land scorched by the fire is a quadratic function of the objective (norm) affects various aspects of the routing elapsed time. Therefore, the damage due to the delay th 2 problem, such as efficiency. Lp-TSP enables a smooth on the i visit can be better represented by ` and σi transition between two extreme objectives. For larger P 2 2 minimizing v `v = k`k2, or equivalently k`k2, is a bet- p's the objective is strongly affected by dominating ter objective for this scenario compared to other norms, (larger) entries of the delay vector and minimizing k`kp particularly k`k1 or k`k1. Motivated by this example, is more to the benefit of the server. In contrast, smaller we term L2-TSP as the Traveling Firefighter Problem p's provide a further aggregated measure of the amount (TFP). of time that the customers have waited. This trade-off In an applied setting, this approach may require can also be interpreted from a fairness perspective, as some refinement but the basic idea still applies. Land increasing p discourages the longest waiting time from and weather asymmetries can be modeled by a mul- becoming too large. tiplicity of vertices: If a fire spreads twice as fast in Firefighter Example. We further elaborate on area, we can represent it by two vertices overlapping why p2 = f1; 1g can be a useful objective by considering in the metric. One could also generalize the objec- the routing of a firefighter.1 Consider a set of wildfires tive to a weighted sum of the squared delays and/or in dispersed locations, and suppose a skilled firefighter discretize large fires into smaller ones. Moreover, the extinguishes any fire the second they arrive at a loca- time required to extinguish a fire can be accounted for tion; the firefighter must choose the order in which to by adding a new edge, hanging from the original desti- visit and extinguish the fires. One possible strategy is nation at a distance proportional to the time required to choose a sequence in order to finish extinguishing all to contain that fire, and moving the destination to the fires as soon as possible, which corresponds to solving other endpoint of the new edge. the L1-TSP (the path-TSP). However, this may not be The Argument versus The Objective. The set of feasible routes for all Lp-TSP problems is the same, 1Over the past decade, and for the first time on record, the while the objectives are different. For any p 6= q, annual number of acres burned in the United States exceeded there exist instances where the two optimal routes are 10 million; this occurred twice [Hoo18]. During 2018, wildfire different. As a simple example, depicted by Figure 1, + damages in California totalled $150 billion [WGZ 21]. In July consider four vertices S, A, B, and C over a line metric 2019, a record 2:4 million acres of the Amazon rainforest were torched [Bor19]. The optimal allocation, scheduling, and routing at locations 0; −1−"; +1, and +2 respectively. Starting of firefighting resources may help to better address this global at S, the route SABC is optimal for L2-TSP with challenge.
Recommended publications
  • How Easy Is Local Search?
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES 37, 79-100 (1988) How Easy Is Local Search? DAVID S. JOHNSON AT & T Bell Laboratories, Murray Hill, New Jersey 07974 CHRISTOS H. PAPADIMITRIOU Stanford University, Stanford, California and National Technical University of Athens, Athens, Greece AND MIHALIS YANNAKAKIS AT & T Bell Maboratories, Murray Hill, New Jersey 07974 Received December 5, 1986; revised June 5, 1987 We investigate the complexity of finding locally optimal solutions to NP-hard com- binatorial optimization problems. Local optimality arises in the context of local search algorithms, which try to find improved solutions by considering perturbations of the current solution (“neighbors” of that solution). If no neighboring solution is better than the current solution, it is locally optimal. Finding locally optimal solutions is presumably easier than finding optimal solutions. Nevertheless, many popular local search algorithms are based on neighborhood structures for which locally optimal solutions are not known to be computable in polynomial time, either by using the local search algorithms themselves or by taking some indirect route. We define a natural class PLS consisting essentially of those local search problems for which local optimality can be verified in polynomial time, and show that there are complete problems for this class. In particular, finding a partition of a graph that is locally optimal with respect to the well-known Kernighan-Lin algorithm for graph partitioning is PLS-complete, and hence can be accomplished in polynomial time only if local optima can be found in polynomial time for all local search problems in PLS. 0 1988 Academic Press, Inc. 1.
    [Show full text]
  • Conformance Testing David Lee and Mihalis Yannakakis Bell
    Conformance Testing David Lee and Mihalis Yannakakis Bell Laboratories, Lucent Technologies 600 Mountain Avenue, RM 2C-423 Murray Hill, NJ 07974 - 2 - System reliability can not be overemphasized in software engineering as large and complex systems are being built to fulfill complicated tasks. Consequently, testing is an indispensable part of system design and implementation; yet it has proved to be a formidable task for complex systems. Testing software contains very wide fields with an extensive literature. See the articles in this volume. We discuss testing of software systems that can be modeled by finite state machines or their extensions to ensure that the implementation conforms to the design. A finite state machine contains a finite number of states and produces outputs on state transitions after receiving inputs. Finite state machines are widely used to model software systems such as communication protocols. In a testing problem we have a specification machine, which is a design of a system, and an implementation machine, which is a ‘‘black box’’ for which we can only observe its I/O behavior. The task is to test whether the implementation conforms to the specification. This is called the conformance testing or fault detection problem. A test sequence that solves this problem is called a checking sequence. Testing finite state machines has been studied for a very long time starting with Moore’s seminal 1956 paper on ‘‘gedanken-experiments’’ (31), which introduced the basic framework for testing problems. Among other fundamental problems, Moore posed the conformance testing problem, proposed an approach, and asked for a better solution.
    [Show full text]
  • Xi Chen: Curriculum Vitae
    Xi Chen Associate Professor Phone: 1-212-939-7136 Department of Computer Science Email: [email protected] Columbia University Homepage: http://www.cs.columbia.edu/∼xichen New York, NY 10027 Date of Preparation: March 12, 2016 Research Interests Theoretical Computer Science, including Algorithmic Game Theory and Economics, Complexity Theory, Graph Isomorphism Testing, and Property Testing. Academic Training B.S. Physics / Mathematics, Tsinghua University, Sep 1999 { Jul 2003 Ph.D. Computer Science, Tsinghua University, Sep 2003 { Jul 2007 Advisor: Professor Bo Zhang, Tsinghua University Thesis Title: The Complexity of Two-Player Nash Equilibria Academic Positions Associate Professor (with tenure), Columbia University, Mar 2016 { Now Associate Professor (without tenure), Columbia University, Jul 2015 { Mar 2016 Assistant Professor, Columbia University, Jan 2011 { Jun 2015 Postdoctoral Researcher, Columbia University, Aug 2010 { Dec 2010 Postdoctoral Researcher, University of Southern California, Aug 2009 { Aug 2010 Postdoctoral Researcher, Princeton University, Aug 2008 { Aug 2009 Postdoctoral Researcher, Institute for Advanced Study, Sep 2007 { Aug 2008 Honors and Awards SIAM Outstanding Paper Award, 2016 EATCS Presburger Award, 2015 Alfred P. Sloan Research Fellowship, 2012 NSF CAREER Award, 2012 Best Paper Award The 4th International Frontiers of Algorithmics Workshop, 2010 Best Paper Award The 20th International Symposium on Algorithms and Computation, 2009 Xi Chen 2 Silver Prize, New World Mathematics Award (Ph.D. Thesis) The 4th International Congress of Chinese Mathematicians, 2007 Best Paper Award The 47th Annual IEEE Symposium on Foundations of Computer Science, 2006 Grants Current, Natural Science Foundation, Title: On the Complexity of Optimal Pricing and Mechanism Design, Period: Aug 2014 { Jul 2017, Amount: $449,985.
    [Show full text]
  • Lipics-ICALP-2019-0.Pdf (0.4
    46th International Colloquium on Automata, Languages, and Programming ICALP 2019, July 9–12, 2019, Patras, Greece Edited by Christel Baier Ioannis Chatzigiannakis Paola Flocchini Stefano Leonardi E A T C S L I P I c s – Vo l . 132 – ICALP 2019 w w w . d a g s t u h l . d e / l i p i c s Editors Christel Baier TU Dresden, Germany [email protected] Ioannis Chatzigiannakis Sapienza University of Rome, Italy [email protected] Paola Flocchini University of Ottawa, Canada paola.fl[email protected] Stefano Leonardi Sapienza University of Rome, Italy [email protected] ACM Classification 2012 Theory of computation ISBN 978-3-95977-109-2 Published online and open access by Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH, Dagstuhl Publishing, Saarbrücken/Wadern, Germany. Online available at https://www.dagstuhl.de/dagpub/978-3-95977-109-2. Publication date July, 2019 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at https://portal.dnb.de. License This work is licensed under a Creative Commons Attribution 3.0 Unported license (CC-BY 3.0): https://creativecommons.org/licenses/by/3.0/legalcode. In brief, this license authorizes each and everybody to share (to copy, distribute and transmit) the work under the following conditions, without impairing or restricting the authors’ moral rights: Attribution: The work must be attributed to its authors. The copyright is retained by the corresponding authors. Digital Object Identifier: 10.4230/LIPIcs.ICALP.2019.0 ISBN 978-3-95977-109-2 ISSN 1868-8969 https://www.dagstuhl.de/lipics 0:iii LIPIcs – Leibniz International Proceedings in Informatics LIPIcs is a series of high-quality conference proceedings across all fields in informatics.
    [Show full text]
  • [Cs.DB] 22 Dec 2020 Structure and Complexity of Bag Consistency
    Structure and Complexity of Bag Consistency Albert Atserias∗ Phokion G. Kolaitis† December 23, 2020 Abstract Since the early days of relational databases, it was realized that acyclic hypergraphs give rise to database schemas with desirable structural and algorithmic properties. In a by-now classical paper, Beeri, Fagin, Maier, and Yannakakis established several different equivalent characterizations of acyclicity; in particular, they showed that the sets of attributes of a schema form an acyclic hypergraph if and only if the local-to- global consistency property for relations over that schema holds, which means that every collection of pairwise consistent relations over the schema is globally consistent. Even though real-life databases consist of bags (multisets), there has not been a study of the interplay between local consistency and global consistency for bags. We embark on such a study here and we first show that the sets of attributes of a schema form an acyclic hypergraph if and only if the local-to-global consistency property for bags over that schema holds. After this, we explore algorithmic aspects of global consistency for bags by analyzing the computational complexity of the global consistency problem for bags: given a collection of bags, are these bags globally consistent? We show that this problem is in NP, even when the schema is part of the input. We then establish the following dichotomy theorem for fixed schemas: if the schema is acyclic, then the global consistency problem for bags is solvable in polynomial time, while if the schema is cyclic, then the global consistency problem for bags is NP-complete.
    [Show full text]
  • On the Complexity of Database Queries 1 Introduction
    On the Complexity of Database Queries Extended Abstract Christos H Papadimitriou Division of Computer Science U C BerkeleyBerkeley CA Mihalis Yannakakis Bell Lab oratories LucentTechnologies MurrayHillNJ Abstract We revisit the issue of the complexity of database queries in the light of the recent parametric renement of complexity theoryWe show that if the number of variables in the query or the query size is considered as a parameter the familiar query languages conjunctive p ositive rst order Datalog are classied at appropriate levels of the socalled W hierarchyofDowney and Fellows These results strongly suggest that the query size is inherently in the exp onent of the data complexityofany query evaluation algorithm with the implication b ecoming stronger as the expressibility of the query language increases On the p ositive side we show that this exp onential dep endence can b e avoided for the extension of acyclic queries with but not inequalities Intro duction The complexity of query languages has b een next to expressibility one of the main preo ccupations of database theory ever since the pap er by Chandra and Merlin twentyyears ago see for extensiveoverviews of the sub ject It has b een noted rather early that when considering the complexityofevaluating a query on an instance one has to distinguish b etween two kinds of complexity Data complexity is the complexityofevaluating a query on a database instance when the query is xed and we express the complexityas a function of the size of the database The other called combinedcomplexity
    [Show full text]
  • 17Th Knuth Prize: Call for Nominations
    17th Knuth Prize: Call for Nominations The Donald E. Knuth Prize for outstanding contributions to the foundations of computer science is awarded for major research accomplishments and contri- butions to the foundations of computer science over an extended period of time. The Prize is awarded annually by the ACM Special Interest Group on Algo- rithms and Computing Theory (SIGACT) and the IEEE Technical Committee on the Mathematical Foundations of Computing (TCMF). Nomination Procedure Anyone in the Theoretical Computer Science com- munity may nominate a candidate. To do so, please send nominations to : [email protected] with a subject line of Knuth Prize nomi- nation by February 15, 2017. The nomination should state the nominee's name, summarize his or her contributions in one or two pages, provide a CV for the nominee or a pointer to the nominees webpage, and give telephone, postal, and email contact information for the nominator. Any supporting letters from other members of the community (up to a limit of 5) should be included in the package that the nominator sends to the Committee chair. Supporting letters should contain substantial information not in the nomination. Others may en- dorse the nomination simply by adding their names to the nomination letter. If you have nominated a candidate in past years, you can re-nominate the candi- date by sending a message to that effect to the above address. (You may revise the nominating materials if you desire). Criteria for Selection The winner will be selected by a Prize Committee consisting of six people appointed by the SIGACT and TCMF Chairs.
    [Show full text]
  • Equilibria, Fixed Points, and Complexity Classes
    Symposium on Theoretical Aspects of Computer Science 2008 (Bordeaux), pp. 19-38 www.stacs-conf.org EQUILIBRIA, FIXED POINTS, AND COMPLEXITY CLASSES MIHALIS YANNAKAKIS Department of Computer Science, Columbia University, New York City, NY, USA E-mail address: [email protected] Abstract. Many models from a variety of areas involve the computation of an equilibrium or fixed point of some kind. Examples include Nash equilibria in games; market equilibria; computing optimal strategies and the values of competitive games (stochastic and other games); stable configurations of neural networks; analysing basic stochastic models for evolution like branching processes and for language like stochastic context-free grammars; and models that incorporate the basic primitives of probability and recursion like recursive Markov chains. It is not known whether these problems can be solved in polynomial time. There are certain common computational principles underlying different types of equilibria, which are captured by the complexity classes PLS, PPAD, and FIXP. Representative complete problems for these classes are respectively, pure Nash equilibria in games where they are guaranteed to exist, (mixed) Nash equilibria in 2-player normal form games, and (mixed) Nash equilibria in normal form games with 3 (or more) players. This paper reviews the underlying computational principles and the corresponding classes. 1. Introduction Many situations involve the computation of an equilibrium or a stable configuration of some sort in a dynamic environment. Sometimes it is the result of individual agents acting on their own noncompetitively but selfishly (e.g., Nash and other economic equilibria), sometimes it is agents acting competitively against each other (and perhaps nature/chance), sometimes the equilibrium is the limit of an iterative process that evolves in some direction until it settles.
    [Show full text]
  • Some Estimated Likelihoods for Computational Complexity
    Some Estimated Likelihoods For Computational Complexity R. Ryan Williams MIT CSAIL & EECS, Cambridge MA 02139, USA Abstract. The editors of this LNCS volume asked me to speculate on open problems: out of the prominent conjectures in computational com- plexity, which of them might be true, and why? I hope the reader is entertained. 1 Introduction Computational complexity is considered to be a notoriously difficult subject. To its practitioners, there is a clear sense of annoying difficulty in complexity. Complexity theorists generally have many intuitions about what is \obviously" true. Everywhere we look, for every new complexity class that turns up, there's another conjectured lower bound separation, another evidently intractable prob- lem, another apparent hardness with which we must learn to cope. We are sur- rounded by spectacular consequences of all these obviously true things, a sharp coherent world-view with a wonderfully broad theory of hardness and cryptogra- phy available to us, but | gosh, it's so annoying! | we don't have a clue about how we might prove any of these obviously true things. But we try anyway. Much of the present cluelessness can be blamed on well-known \barriers" in complexity theory, such as relativization [BGS75], natural properties [RR97], and algebrization [AW09]. Informally, these are collections of theorems which demonstrate strongly how the popular and intuitive ways that many theorems were proved in the past are fundamentally too weak to prove the lower bounds of the future. { Relativization and algebrization show that proof methods in complexity theory which are \invariant" under certain high-level modifications to the computational model (access to arbitrary oracles, or low-degree extensions thereof) are not “fine-grained enough" to distinguish (even) pairs of classes that seem to be obviously different, such as NEXP and BPP.
    [Show full text]
  • Computational Complexity of the Hylland-Zeckhauser Scheme for One-Sided Matching Markets Vijay V
    Computational Complexity of the Hylland-Zeckhauser Scheme for One-Sided Matching Markets Vijay V. Vazirani Department of Computer Science, University of California, Irvine, CA, USA [email protected] Mihalis Yannakakis Department of Computer Science, Columbia University, New York, NY, USA [email protected] Abstract In 1979, Hylland and Zeckhauser [23] gave a simple and general scheme for implementing a one-sided matching market using the power of a pricing mechanism. Their method has nice properties – it is incentive compatible in the large and produces an allocation that is Pareto optimal – and hence it provides an attractive, off-the-shelf method for running an application involving such a market. With matching markets becoming ever more prevalent and impactful, it is imperative to finally settle the computational complexity of this scheme. We present the following partial resolution: 1. A combinatorial, strongly polynomial time algorithm for the dichotomous case, i.e., 0/1 utilities, and more generally, when each agent’s utilities come from a bi-valued set. 2. An example that has only irrational equilibria, hence proving that this problem is not in PPAD. 3. A proof of membership of the problem in the class FIXP. 4. A proof of membership of the problem of computing an approximate HZ equilibrium in the class PPAD. We leave open the (difficult) questions of determining if computing an exact HZ equilibrium is FIXP-hard and an approximate HZ equilibrium is PPAD-hard. 2012 ACM Subject Classification Theory of computation → Algorithmic game theory Keywords and phrases Hyland-Zeckhauser scheme, one-sided matching markets, mechanism design, dichotomous utilities, PPAD, FIXP Digital Object Identifier 10.4230/LIPIcs.ITCS.2021.59 Related Version Full version: https://arxiv.org/pdf/2004.01348 Funding Vijay V.
    [Show full text]
  • Nearly Optimal Separations Between Communication (Or Query)
    Nearly optimal separations between communication (or query) complexity and partitions Robin Kothari∗ Abstract We show a nearly quadratic separation between deterministic communication complexity and the logarithm of the partition number, which is essentially optimal. This improves upon a recent power 1.5 separation of G¨o¨os, Pitassi, and Watson (FOCS 2015). In query complexity, we establish a nearly quadratic separation between deterministic (and even randomized) query complexity and subcube partition complexity, which is also essentially optimal. We also establish a nearly power 1.5 separation between quantum query complexity and subcube partition com- plexity, the first superlinear separation between the two measures. Lastly, we show a quadratic separation between quantum query complexity and one-sided subcube partition complexity. Our query complexity separations use the recent cheat sheet framework of Aaronson, Ben- David, and the author. Our query functions are built up in stages by alternating function composition with the cheat sheet construction. The communication complexity separation fol- lows from “lifting” the query separation to communication complexity. 1 Introduction Deterministic communication complexity. In the standard model of communication com- plexity, we wish to compute a function F : 0, 1 , where the inputs x and y are X×Y→{ } ∈X ∈Y given to two different players, while minimizing the communication between the players. We use Dcc(F ) to denote the deterministic communication complexity of F , the number of bits communi- cated in the worst case by the best deterministic protocol for the function F . The partition number of F , denoted χ(F ), is the least number of monochromatic rectangles in a partition or disjoint cover of (where a monochromatic rectangle is a set A B, with X ×Y × A and B , such that F takes the same value on all elements of A B).
    [Show full text]
  • NP-Hardness of Computing Circuit Complexity
    THEORY OF COMPUTING, Volume 13 (4), 2017, pp. 1–22 www.theoryofcomputing.org On the (Non) NP-Hardness of Computing Circuit Complexity Cody D. Murray∗ R. Ryan Williams† Received October 30, 2015; Revised February 15, 2017; Published June 30, 2017 Abstract: The Minimum Circuit Size Problem (MCSP) is: given the truth table of a Boolean function f and a size parameter k, is the circuit complexity of f at most k? This is the definitive problem of circuit synthesis, and it has been studied since the 1950s. Unlike many problems of its kind, MCSP is not known to be NP-hard, yet an efficient algorithm for this problem also seems very unlikely: for example, MCSP 2 P would imply there are no pseudorandom functions. Although most NP-complete problems are complete under strong “local” reduction notions such as polylogarithmic-time projections, we show that MCSP is provably not NP-hard under O(n1=2−e )-time projections, for every e > 0, and is not NP-hard under randomized O(n1=5−e )-time projections, for every e > 0. We prove that the NP-hardness of MCSP under (logtime-uniform) AC0 reductions would imply extremely strong lower bounds: NP 6⊂ P=poly and E 6⊂ i:o:-SIZE(2dn) for some d > 0 (hence P = BPP also follows). We A preliminary version of this paper appeared in the Proceedings of the 30th IEEE Conference on Computational Complexity, 2015 [21]. ∗Supported by NSF CCF-1212372. †Supported in part by a David Morgenthaler II Faculty Fellowship, a Sloan Fellowship, and NSF CCF-1212372.
    [Show full text]