The Complexity of Counting Problems in Equational Matching
نویسندگان
چکیده
We introduce a class of counting problems that arise naturally in equational matching and study their computational complexity. If E is an equational theory, then #E-Matching is the problem of counting the number of complete minimal E-matchers of two given terms. #E-Matching is a well-deened algorithmic problem for every nitary equational theory. Moreover, it captures more accurately the computational diiculties associated with nding complete sets of minimal E-matchers than the corresponding decision problem for E-matching does. In 1979, L. Valiant developed a computational model for measuring the complexity of counting problems and demonstrated the existence of #P-complete problems, i.e., counting problems that are complete for counting non-deterministic Turing machines of polynomial-time complexity. Using the theory of #P-completeness, we analyze the computational complexity of #E-matching for several important equa-tional theories E. We establish that if E is one of the equational theoriesMatching is a #P-complete problem. We also show that there are equational theories, such as the restriction of AC-matching to linear terms, for which the underlying decision matching problem is solvable in polynomial time, while the associated counting matching problem is #P-complete.
منابع مشابه
On the Complexity of Unification and Disunification in Commutative Idempotent Semigroups
We analyze the computational complexity of elementary uni-cation and disuniication problems for the equational theory ACI of commutative idempotent semigroups. From earlier work, it was known that the decision problem for elementary ACI-uniication is solvable in polynomial time. We show that this problem is inherently sequential by establishing that it is complete for polynomial time (P-complet...
متن کاملOn the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملUnification and Matching Modulo Nilpotence
We consider equational uniication and matching problems where the equational theory contains a nilpotent function, i.e., a function f satisfying f(x;x) = 0 where 0 is a constant. Nilpotent matching and uniication are shown to be NP-complete. In the presence of associativity and commutativity, the problems still remain NP-complete. But when 0 is also assumed to be the unity for the function f, t...
متن کاملUnification Algorithms Cannot be Combined in Polynomial Time
We establish that there is no polynomial-time general combination algorithm for uniication in nitary equational theories, unless the complexity class #P of counting problems is contained in the class FP of function problems solvable in polynomial-time. The prevalent view in complexity theory is that such a collapse is extremely unlikely for a number of reasons, including the fact that the conta...
متن کاملThe Collapse of the Polynomial Hierarchy: NP = P
We present a novel extension to the permutation group enumeration technique which is well known to have polynomial time algorithms. This extended technique allows each perfect matching in a bipartite graph of size O(n) to be expressed as a unique directed path in a directed acyclic graph of size O(n). Thus it transforms the perfect matching counting problem into a directed path counting problem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1994