Results 1  10
of
60
NonDeterministic Exponential Time has TwoProver Interactive Protocols
"... We determine the exact power of twoprover interactive proof systems introduced by BenOr, Goldwasser, Kilian, and Wigderson (1988). In this system, two allpowerful noncommunicating provers convince a randomizing polynomial time verifier in polynomial time that the input z belongs to the language ..."
Abstract

Cited by 402 (40 self)
 Add to MetaCart
We determine the exact power of twoprover interactive proof systems introduced by BenOr, Goldwasser, Kilian, and Wigderson (1988). In this system, two allpowerful noncommunicating provers convince a randomizing polynomial time verifier in polynomial time that the input z belongs to the language L. It was previously suspected (and proved in a relativized sense) that coNPcomplete languages do not admit such proof systems. In sharp contrast, we show that the class of languages having twoprover interactive proof systems is nondeterministic exponential time. After the recent results that all languages in PSPACE have single prover interactive proofs (Lund, Fortnow, Karloff, Nisan, and Shamir), this represents a further step demonstrating the unexpectedly immense power of randomization and interaction in efficient provability. Indeed, it follows that multiple provers with coins are strictly stronger than without, since NEXP # NP. In particular, for the first time, provably polynomial time intractable languages turn out to admit “efficient proof systems’’ since NEXP # P. We show that to prove membership in languages in EXP, the honest provers need the power of EXP only. A consequence, linking more standard concepts of structural complexity, states that if EX P has polynomial size circuits then EXP = Cg = MA. The first part of the proof of the main result extends recent techniques of polynomial extrapolation of truth values used in the single prover case. The second part is a verification scheme for multilinearity of an nvariable function held by an oracle and can be viewed as an independent result on program verification. Its proof rests on combinatorial techniques including the estimation of the expansion rate of a graph.
A PolynomialTime Approximation Algorithm for the Permanent of a Matrix with NonNegative Entries
 Journal of the ACM
, 2004
"... Abstract. We present a polynomialtime randomized algorithm for estimating the permanent of an arbitrary n ×n matrix with nonnegative entries. This algorithm—technically a “fullypolynomial randomized approximation scheme”—computes an approximation that is, with high probability, within arbitrarily ..."
Abstract

Cited by 324 (25 self)
 Add to MetaCart
Abstract. We present a polynomialtime randomized algorithm for estimating the permanent of an arbitrary n ×n matrix with nonnegative entries. This algorithm—technically a “fullypolynomial randomized approximation scheme”—computes an approximation that is, with high probability, within arbitrarily small specified relative error of the true value of the permanent. Categories and Subject Descriptors: F.2.2 [Analysis of algorithms and problem complexity]: Nonnumerical
Arithmetization: A New Method In Structural Complexity Theory
, 1991
"... . We introduce a technique of arithmetization of the process of computation in order to obtain novel characterizations of certain complexity classes via multivariate polynomials. A variety of concepts and tools of elementary algebra, such as the degree of polynomials and interpolation, becomes there ..."
Abstract

Cited by 46 (9 self)
 Add to MetaCart
. We introduce a technique of arithmetization of the process of computation in order to obtain novel characterizations of certain complexity classes via multivariate polynomials. A variety of concepts and tools of elementary algebra, such as the degree of polynomials and interpolation, becomes thereby available for the study of complexity classes. The theory to be described provides a unified framework from which powerful recent results follow naturally. The central result is a characterization of ]P in terms of arithmetic straight line programs. The consequences include a simplified proof of Toda's Theorem that PH ` P ]P ; and an infinite class of natural and potentially inequivalent functions, checkable in the sense of Blum et al. Similar characterizations of PSPACE are also given. The arithmetization technique was independently discovered by Adi Shamir. While this simultaneous discovery was driven by applications to interactive proofs, the present paper demonstrates the applicabil...
Linear Assignment Problems and Extensions
"... This paper aims at describing the state of the art on linear assignment problems (LAPs). Besides sum LAPs it discusses also problems with other objective functions like the bottleneck LAP, the lexicographic LAP, and the more general algebraic LAP. We consider different aspects of assignment problems ..."
Abstract

Cited by 42 (0 self)
 Add to MetaCart
This paper aims at describing the state of the art on linear assignment problems (LAPs). Besides sum LAPs it discusses also problems with other objective functions like the bottleneck LAP, the lexicographic LAP, and the more general algebraic LAP. We consider different aspects of assignment problems, starting with the assignment polytope and the relationship between assignment and matching problems, and focusing then on deterministic and randomized algorithms, parallel approaches, and the asymptotic behaviour. Further, we describe different applications of assignment problems, ranging from the well know personnel assignment or assignment of jobs to parallel machines, to less known applications, e.g. tracking of moving objects in the space. Finally, planar and axial threedimensional assignment problems are considered, and polyhedral results, as well as algorithms for these problems or their special cases are discussed. The paper will appear in the Handbook of Combinatorial Optimization to be published
Relationships Among PL, L, and the Determinant
, 1996
"... Recent results byToda, Vinay, Damm, and Valianthave shown that the complexity of the determinantischaracterized by the complexity of counting the number of accepting computations of a nondeterministic logspacebounded machine. #This class of functions is known as #L.# By using that characterizati ..."
Abstract

Cited by 33 (8 self)
 Add to MetaCart
Recent results byToda, Vinay, Damm, and Valianthave shown that the complexity of the determinantischaracterized by the complexity of counting the number of accepting computations of a nondeterministic logspacebounded machine. #This class of functions is known as #L.# By using that characterization and by establishing a few elementary closure properties, we giveavery simple proof of a theorem of Jung, showing that probabilistic logspacebounded #PL# machines lose none of their computational power if they are restricted to run in polynomial time.
Logspace and Logtime Leaf Languages
, 1996
"... The computation tree of a nondeterministic machine M with input x gives rise to a leaf string formed by concatenating the outcomes of all the computations in the tree in lexicographical order. We may characterize problems by considering, for a particular "leaf language" Y , the set of all x for whi ..."
Abstract

Cited by 25 (2 self)
 Add to MetaCart
The computation tree of a nondeterministic machine M with input x gives rise to a leaf string formed by concatenating the outcomes of all the computations in the tree in lexicographical order. We may characterize problems by considering, for a particular "leaf language" Y , the set of all x for which the leaf string of M is contained in Y . In this way, in the context of polynomial time computation, leaf languages were shown to capture many complexity classes. In this paper, we study the expressibility of the leaf language mechanism in the contexts of logarithmic space and of logarithmic time computation. We show that logspace leaf languages yield a much finer classification scheme for complexity classes than polynomial time leaf languages, capturing also many classes within P. In contrast, logtime leaf languages basically behave like logtime reducibilities. Both cases are more subtle to handle than the polynomial time case. We also raise the issue of balanced versus nonbalanced comp...
Algorithmic Theory of Random graphs
, 1997
"... The theory of random graphs has been mainly concerned with structural properties, in particular the most likely values of various graph invariants  see Bollob`as [21]. There has been increasing interest in using random graphs as models for the average case analysis of graph algorithms. In this pap ..."
Abstract

Cited by 24 (1 self)
 Add to MetaCart
The theory of random graphs has been mainly concerned with structural properties, in particular the most likely values of various graph invariants  see Bollob`as [21]. There has been increasing interest in using random graphs as models for the average case analysis of graph algorithms. In this paper we survey some of the results in this area. 1 Introduction The theory of random graphs as initiated by Erdos and R'enyi [52] and developed along with others, has been mainly concerned with structural properties, in particular the most likely values of various graph invariantss  see Bollob`as [21]. There has been increasing interest in using random graphs as models for the average case analysis of graph algorithms. We would like in this paper to survey some of the results in this area. We hope to be fairly comprehensive in terms of the areas we tackle and so depth will be sacrificed in favour of breadth. One attractive feature of average case analysis is that it banishes the pessimism o...
Simple deterministic approximation algorithms for counting matchings
"... We construct a deterministic approximation algorithm for computing a permanent of a 0, 1 n by n matrix to within a multiplicative factor (1 + ǫ) n, for arbitrary ǫ> 0. When the graph underlying the matrix is a constant degree expander our algorithm runs in polynomial time (PTAS). In the general case ..."
Abstract

Cited by 22 (4 self)
 Add to MetaCart
We construct a deterministic approximation algorithm for computing a permanent of a 0, 1 n by n matrix to within a multiplicative factor (1 + ǫ) n, for arbitrary ǫ> 0. When the graph underlying the matrix is a constant degree expander our algorithm runs in polynomial time (PTAS). In the general case the running time of the algorithm is exp(O(n 2 3 log 3 n)). For the class of graphs which are constant degree expanders the first result is an improvement over the best known approximation factor e n obtained in [LSW00]. Our results use a recently developed deterministic approximation algorithm for counting partial matchings of a graph [BGK +] and JerrumVazirani expander decomposition method of [JV96]. 1
Counting without sampling. New algorithms for enumeration problems using statistical physics
 IN PROCEEDINGS OF SODA
, 2006
"... We propose a new type of approximate counting algorithms for the problems of enumerating the number of independent sets and proper colorings in low degree graphs with large girth. Our algorithms are not based on a commonly used Markov chain technique, but rather are inspired by developments in stati ..."
Abstract

Cited by 21 (6 self)
 Add to MetaCart
We propose a new type of approximate counting algorithms for the problems of enumerating the number of independent sets and proper colorings in low degree graphs with large girth. Our algorithms are not based on a commonly used Markov chain technique, but rather are inspired by developments in statistical physics in connection with correlation decay properties of Gibbs measures and its implications to uniqueness of Gibbs measures on infinite trees, reconstruction problems and local weak convergence methods. On a negative side, our algorithms provide ǫapproximations only to the logarithms of the size of a feasible set (also known as free energy in statistical physics). But on the positive side, our approach provides deterministic as opposed to probabilistic guarantee on approximations. Moreover, for some regular graphs we obtain explicit values for the counting problem. For example, we show that every 4regular nnode graph with large girth has approximately (1.494...) n independent sets, and in every rregular graph with n nodes and large girth the number of q ≥ r + 1proper colorings is approximately [q(1 − 1 r q) 2] n, for large n. In statistical physics terminology, we compute explicitly the limit of the logpartition function. We extend our results to random regular graphs. Our explicit results would be hard to derive via the Markov chain method.
Email and the unexpected power of interaction
 Structure in Complexity theory
, 1988
"... This is a true fable about Merlin, the infinitely intelligent but never trusted magician; and Arthur, the reasonable but impatient sovereign with an occasional unorthodox request; about the concept of an efficient proof; about polynomials and interpolation, electronic mail, coin flipping, and the in ..."
Abstract

Cited by 18 (3 self)
 Add to MetaCart
This is a true fable about Merlin, the infinitely intelligent but never trusted magician; and Arthur, the reasonable but impatient sovereign with an occasional unorthodox request; about the concept of an efficient proof; about polynomials and interpolation, electronic mail, coin flipping, and the incredible power of interaction. About MIP, IP, #P, P SP ACE, NEXP T IME, and new techniques that do not relativize. About fast progress, fierce competition, and email ethics. 1 How did Merlin end up in the cave? In the court of King Arthur1 there lived 150 knights and 150 ladies. “Why not 150 married couples, ” the King contemplated one rainy afternoon, and action followed the thought. He asked the Royal Secret Agent (RSA) to draw up a diagram with all the 300 names, indicating bonds of mutual interest between lady and knight by a red line; and the lack thereof, by a blue line. The diagram, with its 1502 = 22, 500 colored lines, looked somewhat confusing, yet it should not confuse Merlin, the court magician, to whom it was subsequently presented by Arthur with the express order to find a perfect matching consisting exclusively of red lines. Merlin walked away, looked at the diagram, and, with his unlimited intellectual ability, immediately recognized that none of the 150! possibilities gave an allred perfect matching. He quickly completed the 150! diagrams, highlighting the wrong blue line in