The Exact Complexity of the Tutte Polynomial
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Complexity Theory Lecture 9 Co-NP Co-NP-Complete
Complexity Theory 1 Complexity Theory 2 co-NP Complexity Theory Lecture 9 As co-NP is the collection of complements of languages in NP, and P is closed under complementation, co-NP can also be characterised as the collection of languages of the form: ′ L = x y y <p( x ) R (x, y) { |∀ | | | | → } Anuj Dawar University of Cambridge Computer Laboratory NP – the collection of languages with succinct certificates of Easter Term 2010 membership. co-NP – the collection of languages with succinct certificates of http://www.cl.cam.ac.uk/teaching/0910/Complexity/ disqualification. Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 3 Complexity Theory 4 NP co-NP co-NP-complete P VAL – the collection of Boolean expressions that are valid is co-NP-complete. Any language L that is the complement of an NP-complete language is co-NP-complete. Any of the situations is consistent with our present state of ¯ knowledge: Any reduction of a language L1 to L2 is also a reduction of L1–the complement of L1–to L¯2–the complement of L2. P = NP = co-NP • There is an easy reduction from the complement of SAT to VAL, P = NP co-NP = NP = co-NP • ∩ namely the map that takes an expression to its negation. P = NP co-NP = NP = co-NP • ∩ VAL P P = NP = co-NP ∈ ⇒ P = NP co-NP = NP = co-NP • ∩ VAL NP NP = co-NP ∈ ⇒ Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 5 Complexity Theory 6 Prime Numbers Primality Consider the decision problem PRIME: Another way of putting this is that Composite is in NP. -
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs*
On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs* Benny Applebaum† Eyal Golombek* Abstract We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, we ask whether it is possible to reduce the randomness complexity, R, of the verifier to be comparable with the number of bits, CV , that the verifier sends during the interaction. We show that such randomness sparsification is possible in several settings. Specifically, unconditional sparsification can be obtained in the non-uniform setting (where the verifier is modelled as a circuit), and in the uniform setting where the parties have access to a (reusable) common-random-string (CRS). We further show that constant-round uniform protocols can be sparsified without a CRS under a plausible worst-case complexity-theoretic assumption that was used previously in the context of derandomization. All the above sparsification results preserve statistical-zero knowledge provided that this property holds against a cheating verifier. We further show that randomness sparsification can be applied to honest-verifier statistical zero-knowledge (HVSZK) proofs at the expense of increasing the communica- tion from the prover by R−F bits, or, in the case of honest-verifier perfect zero-knowledge (HVPZK) by slowing down the simulation by a factor of 2R−F . Here F is a new measure of accessible bit complexity of an HVZK proof system that ranges from 0 to R, where a maximal grade of R is achieved when zero- knowledge holds against a “semi-malicious” verifier that maliciously selects its random tape and then plays honestly. -
On Sum Coloring of Graphs
Mohammadreza Salavatipour A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Computer Science University of Toronto Copyright @ 2000 by Moharnrnadreza Salavatipour The author has gmted a non- L'auteur a accordé une licence non exclusive licence aiiowing the exclusive permettant il la National Library of Canada to Bibliothèque nationale du Canada de nproduce, loan, distribute or sell ~eproduire,prk, distribuer ou copies of this thesis in microform, vendre des copies de cette thése sous paper or electronic formats. la forme de mierofiche/6im, de reproduction sur papier ou sur format The author ntains omership of the L'auteur conserve la propriété du copyright in this thesis. Neither the droit d'auteur qui proage cette thèse. Ni la thèse ni des extraits substantiels de celle-ci ne doivent être imprimes reproduced without the author's ou autrement reproduits sans son autorisation. Abstract On Sum Coloring of Grsphs Mohammadreza Salavatipour Master of Science Graduate Department of Computer Science University of Toronto 2000 The sum coloring problem asks to find a vertex coloring of a given graph G, using natural numbers, such that the total sum of the colors of vertices is rninimized amongst al1 proper vertex colorings of G. This minimum total sum is the chromatic sum of the graph, C(G), and a coloring which achieves this totd sum is called an optimum coloring. There are some graphs for which the optimum coloring needs more colors thaa indicated by the chromatic number. The minimum number of colore needed in any optimum colo~g of a graph ie dedthe strength of the graph, which we denote by @). -
CHROMATIC POLYNOMIALS of PLANE TRIANGULATIONS 1. Basic
1990, 2005 D. R. Woodall, School of Mathematical Sciences, University of Nottingham CHROMATIC POLYNOMIALS OF PLANE TRIANGULATIONS 1. Basic results. Throughout this survey, G will denote a multigraph with n vertices, m edges, c components and b blocks, and m′ will denote the smallest number of edges whose deletion from G leaves a simple graph. The corresponding numbers for Gi will be ′ denoted by ni , mi , ci , bi and mi . Let P(G, t) denote the number of different (proper vertex-) t-colourings of G. Anticipating a later result, we call P(G, t) the chromatic polynomial of G. It was introduced by G. D. Birkhoff (1912), who proved many of the following basic results. Proposition 1. (Examples.) Here Tn denotes an arbitrary tree with n vertices, Fn denotes an arbitrary forest with n vertices and c components, and Rn denotes the graph of an arbitrary triangulated polygon with n vertices: that is, a plane n-gon divided into triangles by n − 3 noncrossing chords. = n (a) P(Kn , t) t , = − n −1 (b) P(Tn , t) t(t 1) , = − − n −2 (c) P(Rn , t) t(t 1)(t 2) , = − − − + (d) P(Kn , t) t(t 1)(t 2)...(t n 1), = c − n −c (e) P(Fn , t) t (t 1) , = − n + − n − (f) P(Cn , t) (t 1) ( 1) (t 1) − = (−1)nt(t − 1)[1 + (1 − t) + (1 − t)2 + ... + (1 − t)n 2]. Proposition 2. (a) If the components of G are G1,..., Gc , then = P(G, t) P(G1, t)...P(Gc , t). = ∪ ∩ = (b) If G G1 G2 where G1 G2 Kr , then P(G1, t) P(G2, t) ¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡¢¡£¡¢¡¢¡¢¡ P(G, t) = ¡ . -
THE N-DIMENSIONAL MATCHING POLYNOMIAL B. Lass
GAFA, Geom. funct. anal. Vol. 15 (2005) 453 – 475 c Birkh¨auser Verlag, Basel 2005 1016-443X/05/020453-23 DOI 10.1007/s00039-005-0512-0 GAFA Geometric And Functional Analysis THE N-DIMENSIONAL MATCHING POLYNOMIAL B. Lass To P. Cartier and A.K. Zvonkin Abstract. Heilmann et Lieb ont introduit le polynˆome de couplage µ(G, x) d’un graphe G =(V,E). Nous prolongeons leur d´efinition en munissant chaque sommet de G d’une forme lin´eaire N-dimensionnelle (ou bien d’un vecteur) et chaque arˆete d’une forme sym´etrique bilin´eaire. On attache doncatout ` r-couplage de G le produit des formes lin´eaires des sommets qui ne sont pas satur´es par le couplage, multipli´e par le produit des poids des r arˆetes du couplage, o`u le poids d’une arˆete est la valeur de sa forme ´evalu´ee sur les deux vecteurs de ses extr´emit´es. En multipliant par (−1)r et en sommant sur tous les couplages, nous obtenons notre polynˆome de couplage N-dimensionnel. Si N =1,leth´eor`eme principal de l’article de Heilmann et Lieb affirme que tous les z´eros de µ(G, x)sontr´eels. Si N =2, cependant, nous avons trouv´e des graphes exceptionnels o`u il n’y a aucun z´ero r´eel, mˆeme si chaque arˆete est munie du produit scalaire canonique. Toutefois, la th´eorie de la dualit´ed´evelopp´ee dans [La1] reste valable en N dimensions. Elle donne notamment une nouvelle interpr´etationala ` transformation de Bargmann–Segal, aux diagrammes de Feynman et aux produits de Wick. -
Approximating the Chromatic Polynomial of a Graph
Approximating the Chromatic Polynomial Yvonne Kemper1 and Isabel Beichl1 Abstract Chromatic polynomials are important objects in graph theory and statistical physics, but as a result of computational difficulties, their study is limited to graphs that are small, highly structured, or very sparse. We have devised and implemented two algorithms that approximate the coefficients of the chromatic polynomial P (G, x), where P (G, k) is the number of proper k-colorings of a graph G for k ∈ N. Our algorithm is based on a method of Knuth that estimates the order of a search tree. We compare our results to the true chro- matic polynomial in several known cases, and compare our error with previous approximation algorithms. 1 Introduction The chromatic polynomial P (G, x) of a graph G has received much atten- tion as a result of the now-resolved four-color problem, but its relevance extends beyond combinatorics, and its domain beyond the natural num- bers. To start, the chromatic polynomial is related to the Tutte polynomial, and evaluating these polynomials at different points provides information about graph invariants and structure. In addition, P (G, x) is central in applications such as scheduling problems [26] and the q-state Potts model in statistical physics [10, 25]. The former occur in a variety of contexts, from algorithm design to factory procedures. For the latter, the relation- ship between P (G, x) and the Potts model connects statistical mechanics and graph theory, allowing researchers to study phenomena such as the behavior of ferromagnets. Unfortunately, computing P (G, x) for a general graph G is known to be #P -hard [16, 22] and deciding whether or not a graph is k-colorable is NP -hard [11]. -
Week 1: an Overview of Circuit Complexity 1 Welcome 2
Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes). -
Computational Complexity: a Modern Approach
i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University [email protected] Not to be reproduced or distributed without the authors’ permission This is an Internet draft. Some chapters are more finished than others. References and attributions are very preliminary and we apologize in advance for any omissions (but hope you will nevertheless point them out to us). Please send us bugs, typos, missing references or general comments to [email protected] — Thank You!! DRAFT ii DRAFT Chapter 9 Complexity of counting “It is an empirical fact that for many combinatorial problems the detection of the existence of a solution is easy, yet no computationally efficient method is known for counting their number.... for a variety of problems this phenomenon can be explained.” L. Valiant 1979 The class NP captures the difficulty of finding certificates. However, in many contexts, one is interested not just in a single certificate, but actually counting the number of certificates. This chapter studies #P, (pronounced “sharp p”), a complexity class that captures this notion. Counting problems arise in diverse fields, often in situations having to do with estimations of probability. Examples include statistical estimation, statistical physics, network design, and more. Counting problems are also studied in a field of mathematics called enumerative combinatorics, which tries to obtain closed-form mathematical expressions for counting problems. To give an example, in the 19th century Kirchoff showed how to count the number of spanning trees in a graph using a simple determinant computation. Results in this chapter will show that for many natural counting problems, such efficiently computable expressions are unlikely to exist. -
Computing Tutte Polynomials
Computing Tutte Polynomials Gary Haggard1, David J. Pearce2, and Gordon Royle3 1 Bucknell University [email protected] 2 Computer Science Group, Victoria University of Wellington, [email protected] 3 School of Mathematics and Statistics, University of Western Australia [email protected] Abstract. The Tutte polynomial of a graph, also known as the partition function of the q-state Potts model, is a 2-variable polynomial graph in- variant of considerable importance in both combinatorics and statistical physics. It contains several other polynomial invariants, such as the chro- matic polynomial and flow polynomial as partial evaluations, and various numerical invariants such as the number of spanning trees as complete evaluations. However despite its ubiquity, there are no widely-available effective computational tools able to compute the Tutte polynomial of a general graph of reasonable size. In this paper we describe the implemen- tation of a program that exploits isomorphisms in the computation tree to extend the range of graphs for which it is feasible to compute their Tutte polynomials. We also consider edge-selection heuristics which give good performance in practice. We empirically demonstrate the utility of our program on random graphs. More evidence of its usefulness arises from our success in finding counterexamples to a conjecture of Welsh on the location of the real flow roots of a graph. 1 Introduction The Tutte polynomial of a graph is a 2-variable polynomial of significant im- portance in mathematics, statistical physics and biology [25]. In a strong sense it “contains” every graphical invariant that can be computed by deletion and contraction. -
Chapter 24 Conp, Self-Reductions
Chapter 24 coNP, Self-Reductions CS 473: Fundamental Algorithms, Spring 2013 April 24, 2013 24.1 Complementation and Self-Reduction 24.2 Complementation 24.2.1 Recap 24.2.1.1 The class P (A) A language L (equivalently decision problem) is in the class P if there is a polynomial time algorithm A for deciding L; that is given a string x, A correctly decides if x 2 L and running time of A on x is polynomial in jxj, the length of x. 24.2.1.2 The class NP Two equivalent definitions: (A) Language L is in NP if there is a non-deterministic polynomial time algorithm A (Turing Machine) that decides L. (A) For x 2 L, A has some non-deterministic choice of moves that will make A accept x (B) For x 62 L, no choice of moves will make A accept x (B) L has an efficient certifier C(·; ·). (A) C is a polynomial time deterministic algorithm (B) For x 2 L there is a string y (proof) of length polynomial in jxj such that C(x; y) accepts (C) For x 62 L, no string y will make C(x; y) accept 1 24.2.1.3 Complementation Definition 24.2.1. Given a decision problem X, its complement X is the collection of all instances s such that s 62 L(X) Equivalently, in terms of languages: Definition 24.2.2. Given a language L over alphabet Σ, its complement L is the language Σ∗ n L. 24.2.1.4 Examples (A) PRIME = nfn j n is an integer and n is primeg o PRIME = n n is an integer and n is not a prime n o PRIME = COMPOSITE . -
Even Factors, Jump Systems, and Discrete Convexity
Even Factors, Jump Systems, and Discrete Convexity Yusuke KOBAYASHI¤ Kenjiro TAKAZAWAy May, 2007 Abstract A jump system, which is a set of integer lattice points with an exchange property, is an extended concept of a matroid. Some combinatorial structures such as the degree sequences of the matchings in an undirected graph are known to form a jump system. On the other hand, the maximum even factor problem is a generalization of the maximum matching problem into digraphs. When the given digraph has a certain property called odd- cycle-symmetry, this problem is polynomially solvable. The main result of this paper is that the degree sequences of all even factors in a digraph form a jump system if and only if the digraph is odd-cycle-symmetric. Furthermore, as a gen- eralization, we show that the weighted even factors induce M-convex (M-concave) functions on jump systems. These results suggest that even factors are a natural generalization of matchings and the assumption of odd-cycle-symmetry of digraphs is essential. 1 Introduction In the study of combinatorial optimization, extensions of matroids are introduced as abstract con- cepts including many combinatorial objects. A number of optimization problems on matroidal structures can be solved in polynomial time. One of the extensions of matroids is a jump system of Bouchet and Cunningham [2]. A jump system is a set of integer lattice points with an exchange property (to be described in Section 2.1); see also [18, 22]. It is a generalization of a matroid [4], a delta-matroid [1, 3, 8], and a base polyhedron of an integral polymatroid (or a submodular sys- tem) [14]. -
Dspace 6.X Documentation
DSpace 6.x Documentation DSpace 6.x Documentation Author: The DSpace Developer Team Date: 27 June 2018 URL: https://wiki.duraspace.org/display/DSDOC6x Page 1 of 924 DSpace 6.x Documentation Table of Contents 1 Introduction ___________________________________________________________________________ 7 1.1 Release Notes ____________________________________________________________________ 8 1.1.1 6.3 Release Notes ___________________________________________________________ 8 1.1.2 6.2 Release Notes __________________________________________________________ 11 1.1.3 6.1 Release Notes _________________________________________________________ 12 1.1.4 6.0 Release Notes __________________________________________________________ 14 1.2 Functional Overview _______________________________________________________________ 22 1.2.1 Online access to your digital assets ____________________________________________ 23 1.2.2 Metadata Management ______________________________________________________ 25 1.2.3 Licensing _________________________________________________________________ 27 1.2.4 Persistent URLs and Identifiers _______________________________________________ 28 1.2.5 Getting content into DSpace __________________________________________________ 30 1.2.6 Getting content out of DSpace ________________________________________________ 33 1.2.7 User Management __________________________________________________________ 35 1.2.8 Access Control ____________________________________________________________ 36 1.2.9 Usage Metrics _____________________________________________________________