Infr 11102 :
نویسنده
چکیده
We will not prove the theorem here, but we should step back and take a minute to think about the meaning of this theorem. A naive NL algorithm for Conn is to take the same NTM for Conn but flip its answers. Thus, we will accept, if there exists a wrong guess connecting s to t. However, for any (s, t), there exists a wrong guess, and we will end up accepting everything! Essentially, if (G, s, t) is in Conn, then for any sequence of vertices of G, it cannot connect s to t. There is a universal quantifier “for any” in the statement. However, recall the verification definition of NP, what an NTM is capable of doing is to state an existential quantifier “there exists ...”. Thus, Theorem 1 is non-trivial in that it implicitly transforms the universal quantifier into an existential one. Without the space requirement, this can actually be done easily. For example, if there exists a cut1 (X,Y ) of G, such that s ∈ X and t ∈ Y , then we know that s and t are disconnected. However, a cut cannot be stored in logarithmic space. The proof of Theorem 1 uses a method called inductive counting. The idea is that, if we know how many vertices are reachable from s, then we can simply guess connectivity for every vertex, verify the guess, and then verify the total number is correct. The ability to verify the guess makes sure that we never overestimate the number of reachable vertices. Hence, if the total number in the end is correct, then we know all our guesses are correct, and thus know whether t is among reachable vertices. To find out this number, let Ck be the number of vertices that can be reached within k steps. To compute Cn, we do it inductively from C1 to Cn. If we know Ck, then we can reconstruct all vertices
منابع مشابه
INFR 11102 : Computational Complexity 25 / 01 / 2018 Lecture 4 : Robust Complexity Classes
1 Robust Complexity Classes A good complexity class should contain interesting problems, as well as be robust against small tweaks on the model of computation. The ones we see last time, like DTime[n], are not necessarily robust classes. For example, if we consider 1-tape machines instead of k-tape ones, then what DTime[n] contains is actually different. Also, in practise, it is realized that p...
متن کاملINFR 11102 : Computational Complexity 13 / 02 / 2018 Lecture 9 : Polynomial hierarchy
1.1 coNP Recall that by L we denote the complement language of L, namely x ∈ L if and only if x ̸∈ L. Define coNP = {L | L ∈ NP}. Similar to NP, there is an alternative definition of coNP. Definition 1. A language L is in coNP if there is a polynomial p(·) and a polynomial-time TM M such that x ∈ L ⇔ ∀y, |y| ≤ p(|x|), M(x, y) = 1. Recall that in the alternative definition of NP, a certificate y ...
متن کاملINFR 11102 : Computational Complexity 06 / 02 / 2018 Lecture 7 : More on NP - completeness
After Cook’s paper [Coo71] published, Dick Karp immediately realized that the notion of NP-hardness captures a large amount of intractable combinatorial optimization problems. In [Kar72], he showed 21 problems to be NP-complete. This list quickly increased and by the time of 1979, Garey and Johnson [GJ79] wrote a whole book on NP-complete problems. This book has became a classic nowadays, and t...
متن کاملINFR 11102 : Computational Complexity 15 / 02 / 2018 Lecture 10 : Circuit models
Proof. One direction is easy, namely TQBF ∈ PSpace. Once again, to achieve a spaceefficient algorithm, we use recursion. If the leading quantifier is ∃x, then we recursively check the two cases of setting x to 0 and 1, and return true if one of them is true. Similarly, if the leading quantifier is ∀x, then we recursively check the two cases of setting x to 0 and 1, and return true if both of th...
متن کاملINFR 11102 : Computational Complexity 27 / 02 / 2018 Lecture 11 : Karp - Lipton Theorem , Randomized computation
To show L ∈ Σp2, we need to somehow change the order of quantifiers in (1). Our assumption is that NP ∈ P/poly, namely Sat has a polynomial-size circuit family C = {C1, C2, · · · }. For an input x, |x| = n, we give an Σp2 algorithm to decide whether x ∈ L. We first guess a circuit C for Sat. It may have two types of error: φ ∈ Sat but C(φ) = 0 or φ ̸∈ Sat but C(φ) = 1. There is at least one corr...
متن کاملINFR 11102 : Computational Complexity 30 / 01 / 2018 Lecture 5 : Savitch ’ s Theorem
Savitch’s algorithm is a recursive procedure Reach(u, v, l) given in Algorithm 1, where 1(A) is the indicator function of an event A. Namely, 1(A) = 1 if A is true, and = 0 otherwise. Clearly Conn can be solved by Reach(s, t, n) where n = |V |. The basic idea is the following: we enumerate all possible “middle point” w of u and v, and recursively determine whether u and v are both connected to ...
متن کامل