CMPT 407 - Complexity Theory Lecture

نویسنده

  • Valentine Kabanets
چکیده

A Boolean circuit C on n inputs x1, . . . , xn is a directed acyclic graph (DAG) with n nodes of in-degree 0 (the inputs x1, . . . , xn), one node of out-degree 0 (the output), and every node of the graph except the input nodes is labeled by AND, OR, or NOT; it has in-degree 2 (for AND and OR), or 1 (for NOT). The Boolean circuit C computes a Boolean function f(x1, . . . , xn) in the obvious way: the value of the function is equal to the value of the output gate of the circuit when the input gates are assigned the values x1, . . . , xn. The size of a Boolean circuit C, denoted |C|, is defined to be the total number of nodes (gates) in the graph representation of C. The depth of a Boolean circuit C is defined as the length of a longest path (from an input gate to the output gate) in the graph representation of the circuit C. A Boolean formula is a Boolean circuit whose graph representation is a tree. Given a family of Boolean functions f = {fn}n≥0, where fn depends on n variables, we are interested in the sizes of smallest Boolean circuits Cn computing fn. Let s(n) be a function such that |Cn| ≤ s(n), for all n. Then we say that the Boolean function family f is computable by Boolean circuits of size s(n). For a function s : N → N, we define the complexity class SIZE(s) to be the set of all Boolean function families f = {fn}n≥0 for which there exists a circuit family {Cn}n≥0 such that Cn computes fn, and, for all sufficiently large n, we have |Cn| ≤ s(n). In the above definition, if s(n) is a polynomial, then we say that f is computable by polysize circuits. It is not difficult to see that every language in P is computable by polysize circuits. Note that given any language L over the binary alphabet, we can define the Boolean function family {fn}n≥0 by setting fn(x1, . . . , xn) = 1 iff x1 . . . xn ∈ L. More precisely, we have the following simulation of time-bounded TMs by circuits:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CMPT 407/710 - Complexity Theory: Lecture 17

Classically, a computation operates on a string of bits, applying a sequence of physically realizable operations (such as logical NOT, AND, and OR), and outputs an answer based on the value of the last obtained bit string. Similarly, a quantum computation operates on a register consisting of a number of quantum bits (qubits), applying a sequence of (hypothetically) physically realizable quantum...

متن کامل

CMPT 407/710 - Complexity Theory: Lecture 10

Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at a store. However, suppose that you don’t know how to distinguish between a “good” bank note and a “bad” one. What can you do? Well, if you pick a bank note at random, you will be lucky with high probability (here the probability of picking a good ban...

متن کامل

CMPT 407 - Complexity Theory Lecture 5: SAT, coNP, Search-to-Decision, NTime Hierarchy

Proof. SAT is in NP (easy). To prove NP-hardness, we will show that Circuit-SAT is reducible to SAT. Let C be an arbitrary Boolean circuit with gates g1, . . . , gm, where g1, . . . , gn are input gates and gm is the output gate. For each gj, introduce a Boolean variable yj. For every i > n, define the Boolean formula gatei expressing that the value of yi is equal to the value of the gate gi. T...

متن کامل

CMPT 407/710 - Complexity Theory: Lecture 16

The PCP theorem gives a novel characterization of the class NP in terms of probabilistically checkable proofs (PCPs). The central role in this characterization belongs to a Verifier. Here, the probabilities are taken over the random choices of the verifier, and the notation V π means that the verifier V has random access to the string π, i.e., V may request to see the ith bit of the string π, f...

متن کامل

CMPT 407 / 710 - Complexity Theory : Lecture 14

As a consequence of an AM protocol for NISO, we get the following: Theorem 1. If Graph Isomorphism is NP-complete, then PH = Σp2. Proof. Suppose that Graph Isomorphism is NP-complete. Then the problem NISO is coNPcomplete. Hence, every coNP problem is polytime reducible to NISO, which, as we know, is in AM. We use this to get the following inclusions: Σp2 = ∃ ◦ ∀ ◦ P (definition of Σ p 2) ⊆ ∃ ◦...

متن کامل

CMPT 407/710 - Complexity Theory: Lecture 20

Do we have non-relativizing techniques? Yes, we do! In fact, already the proof of the CookLevin theorem is non-black-box: to reduce the computation of a nondeterministic TM on a given input x to a 3-cnf φx, we had to “open up” the TM and look inside at the sequence of configurations the TM goes through, and moreover, exploit a very special property of a TM computation: that the computation is l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017