Recognizing Read-Once Functions from Depth-Three Formulas
نویسنده
چکیده
Consider the following decision problem: for a given monotone Boolean function f decide, whether f is read-once. For this problem, it is essential how the input function f is represented. On a negative side we have the following results. Elbassioni, Makino and Rauf ([1]) proved that this problem is coNP-complete when f is given by a depth-4 read-2 monotone Boolean formula. Gurvich ([2]) proved that this problem is coNP-complete even when the input is the following expression: C ∨Dn, where Dn = x1y1 ∨ . . . ∨ xnyn and C is a monotone CNF over the variables x1, y1, . . . , xn, yn (note that this expression is a monotone Boolean formula of depth 3; in [2] nothing is said about the readability of C, but the proof is valid even if C is read-2 and thus the entire formula is read-3). On a positive side, from [3] we know that there is a polynomial time algorithm to recognize read-once functions when the input is a monotone depth-2 formula (that is, a DNF or a CNF). There are even very fast algorithms for this problem ( [4]). Our contribution consists of the following two results. We show that we can test in polynomial-time whether a given expression C ∨D computes a read-once function, provided that C is a read-once monotone CNF and D is a read-once monotone DNF and all the variables of C occur also in D (recall that due to Gurvich, the problem is coNP-complete when C is read-2). The second result states that this is a coNP-complete problem to decide whether the expression A∧Dn computes a read-once function, where Dn is as above and A is the ∧ − ∨ − ∧ depth-3 readonce monotone Boolean formula (so that the entire expression A∧Dn is depth-3 read-2). This result improves the result of [1] in the depth and the result of [2] in the readability of the input formula.
منابع مشابه
Dequantizing Read-once Quantum Formulas
Quantum formulas, defined by Yao [FOCS ’93], are the quantum analogs of classical formulas, i.e., classical circuits in which all gates have fanout one. We show that any read-once quantum formula over a gate set that contains all single-qubit gates is equivalent to a read-once classical formula of the same size and depth over an analogous classical gate set. For example, any readonce quantum fo...
متن کاملDepth-Independent Lower Bounds on the Communication Complexity of Read-Once Boolean Formulas
We show lower bounds of Ω( √ n) and Ω(n) on the randomized and quantum communication complexity, respectively, of all nvariable read-once Boolean formulas. Our results complement the recent lower bound ofΩ(n/8) by Leonardos and Saks [LS09] andΩ(n/2 log ) by Jayram, Kopparty and Raghavendra [JKR09] for randomized communication complexity of read-once Boolean formulas with depth d. We obtain our ...
متن کاملLearning Boolean Read-Once Formulas over Generalized Bases
A read-once formula is one in which each variable appears on at most a single input. Angluin, Hellerstein, and Karpinski give a polynomial time algorithm that uses membership and equivalence queries to identify exactly read-once boolean formulas over the basis fAND;OR;NOTg AHK93]. The goal of this work is to consider natural generalizations of these gates, in order to develop exact identiicatio...
متن کاملExact Identification of Read-Once Formulas Using Fixed Points of Amplification Functions
In this paper we describe a new technique for exactly identifying certain classes of read-once Boolean formulas. The method is based on sampling the input-output behavior of the target formula on a probability distribution which is determined by the fixed point of the formula's application function (defined as the probability that a 1 is output by the formula when each input bit is 1 independen...
متن کاملIsomorphism testing of read-once functions and polynomials
In this paper, we study the isomorphism testing problem of formulas in the Boolean and arithmetic settings. We show that isomorphism testing of Boolean formulas in which a variable is read at most once (known as read-once formulas) is complete for log-space. In contrast, we observe that the problem becomes polynomial time equivalent to the graph isomorphism problem, when the input formulas can ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1802.03815 شماره
صفحات -
تاریخ انتشار 2018