CS 2401 - Introduction to Complexity Theory Lecture # 8 : Fall , 2015
نویسنده
چکیده
The aim of this lecture is to show strong lower bounds against a AC0 circuits. In particular, we are going to show that small AC0 circuits cannot compute the parity function. This will follow by a depth reduction style argument, where we attempt to reduce the depth of the circuit level by level, until only a single layer remains. The key to this argument is a prominent tool in circuit complexity lower bounds known as the switching lemma, originally proven by Hastad [?]. The switching lemma, allows one to ”switch” CNFs to DNFs and visa versa, by restricting the size of their underlying decision trees. This is done by applying a restriction to the variables so that the underlying decision tree of those CNFs or DNFs is not too deep.
منابع مشابه
CS 2401 - Introduction to Complexity Theory Lecture # 5 : Fall , 2015
• Previously covered L, NL, PSPACE, NPSPACE – A language L is in SPACE(s(n)), where s : N → N, iff there is a deterministic TM M deciding L such that, on any input of length n, M ’s tape head visits at most c · s(n) cells over all non-input tapes, where c is a constant – Similarly, L ∈ NSPACE(s(n)) iff there is a non-deterministic TM M deciding L such that, on any input of length n and for any ...
متن کاملCS 2401 - Introduction to Complexity Theory Lecture # 2 : Fall , 2015
Proof (Proof of ∪c∈NNTIME(n ) ⊆ NP) Consider any language L ∈ ∪c∈NNTIME(n ), which is equivalent to saying that there exists a polynomial p : N → N such that L is determined by a NDTM N which runs in time p(n). So by definition of NDTM, for any x ∈ L, we can find a sequence of nondeterministic choices that will cause N to reach qaccept in time p(n). Now the key idea is using such a sequence as ...
متن کاملCS 2401 - Introduction to Complexity Theory Lecture # 10 : Fall , 2015
The notion of communication complexity can be understood in the context of two parties, hereby referred to as Alice and Bob, who are attempting to compute a function f : X × Y → Z, for X,Y, Z given finite sets. In doing so, the two players only have access to partial inputs x ∈ X and y ∈ Y respectively and are computing f(x, y) according to a fixed protocol P , given beforehand. The aim of the ...
متن کاملCS 2401 - Introduction to Complexity Theory Lecture
2 Polynomial hierarchy Today we are going to talk about polynomial hierarchy. At first we define two new complexity classes: the class Σ2 , and the class Π P 2 . Definition. (The class Σ2 ) The class Σ P 2 is the set of all languages L for which theres exists a polynomial-time TM M , and a polynomial q such that for any x ∈ {0, 1}∗, x ∈ L ⇔ ∃y1 ∈ {0, 1} q(|x|) ∀y2 ∈ {0, 1} q(|x|) (M(x, y1, y2) ...
متن کاملCS 369 E : Communication Complexity ( for Algorithm Designers ) Lecture # 8 : Lower Bounds in Property Testing ∗
We begin in this section with a brief introduction to the field of property testing. Section 2 explains the famous example of “linearity testing.” Section 3 gives upper bounds for the canonical problem of “monotonicity testing,” and Section 4 shows how to derive property testing lower bounds from communication complexity lower bounds. These lower bounds will follow from our existing communicati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015