Results 1  10
of
56
Monotone Complexity
, 1990
"... We give a general complexity classification scheme for monotone computation, including monotone spacebounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a simple ..."
Abstract

Cited by 2429 (12 self)
 Add to MetaCart
We give a general complexity classification scheme for monotone computation, including monotone spacebounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a simple notion of monotone reducibility and exhibit complete problems. This provides a framework for stating existing results and asking new questions. We show that mNL (monotone nondeterministic logspace) is not closed under complementation, in contrast to Immerman's and Szelepcs 'enyi's nonmonotone result [Imm88, Sze87] that NL = coNL; this is a simple extension of the monotone circuit depth lower bound of Karchmer and Wigderson [KW90] for stconnectivity. We also consider mBWBP (monotone bounded width branching programs) and study the question of whether mBWBP is properly contained in mNC 1 , motivated by Barrington's result [Bar89] that BWBP = NC 1 . Although we cannot answer t...
The Complexity of XPath Query Evaluation
, 2003
"... In this paper, we study the precise complexity of XPath 1.0 query processing. Even though heavily used by its incorporation into a variety of XMLrelated standards, the precise cost of evaluating an XPath query is not yet wellunderstood. The first polynomialtime algorithm for XPath processing (wit ..."
Abstract

Cited by 87 (5 self)
 Add to MetaCart
In this paper, we study the precise complexity of XPath 1.0 query processing. Even though heavily used by its incorporation into a variety of XMLrelated standards, the precise cost of evaluating an XPath query is not yet wellunderstood. The first polynomialtime algorithm for XPath processing (with respect to combined complexity) was proposed only recently, and even to this day all major XPath engines take time exponential in the size of the input queries. From the standpoint of theory, the precise complexity of XPath query evaluation is open, and it is thus unknown whether the query evaluation problem can be parallelized.
The complexity of acyclic conjunctive queries
 Journal of the ACM
, 1998
"... This paper deals with the evaluation of acyclic Boolean conjunctive queries in relational databases. By wellknown results of Yannakakis [1981], this problem is solvable in polynomial time; its precise complexity, however, has not been pinpointed so far. We show that the problem of evaluating acyc ..."
Abstract

Cited by 77 (14 self)
 Add to MetaCart
This paper deals with the evaluation of acyclic Boolean conjunctive queries in relational databases. By wellknown results of Yannakakis [1981], this problem is solvable in polynomial time; its precise complexity, however, has not been pinpointed so far. We show that the problem of evaluating acyclic Boolean conjunctive queries is complete for LOGCFL, the class of decision problems that are logspacereducible to a contextfree language. Since LOGCFL is contained in AC 1 and NC 2, the evaluation problem of acyclic Boolean conjunctive queries is highly parallelizable. We present a parallel database algorithm solving this problem with a logarithmic number of parallel join operations. The algorithm is generalized to computing the output of relevant classes of nonBoolean queries. We also show that the acyclic versions of the following wellknown database and AI problems are all LOGCFLcomplete: The Query Output Tuple problem for conjunctive queries, Conjunctive Query Containment, Clause Subsumption, and Constraint Satisfaction. The LOGCFLcompleteness result is extended to the class of queries of bounded treewidth and to other relevant query classes which are more general than the acyclic queries.
Pure Nash Equilibria: Hard and Easy Games
"... In this paper we investigate complexity issues related to pure Nash equilibria of strategic games. We show that, even in very restrictive settings, determining whether a game has a pure Nash Equilibrium is NPhard, while deciding whether a game has a strong Nash equilibrium is Stcomplete. We then s ..."
Abstract

Cited by 70 (3 self)
 Add to MetaCart
In this paper we investigate complexity issues related to pure Nash equilibria of strategic games. We show that, even in very restrictive settings, determining whether a game has a pure Nash Equilibrium is NPhard, while deciding whether a game has a strong Nash equilibrium is Stcomplete. We then study practically relevant restrictions that lower the complexity. In particular, we are interested in quantitative and qualitative restrictions of the way each player's move depends on moves of other players. We say that a game has small neighborhood if the &quot; utility function for each player depends only on (the actions of) a logarithmically small number of other players, The dependency structure of a game G can he expressed by a graph G(G) or by a hypergraph II(G). Among other results, we show that if jC has small neighborhood and if II(G) has botmdecl hypertree width (or if G(G) has bounded treewidth), then finding pure Nash and Pareto equilibria is feasible in polynomial time. If the game is graphical, then these problems are LOGCFLcomplete and thus in the class _NC ~ of highly parallelizable problems. 1 Introduction and Overview of Results The theory of strategic games and Nash equilibria has important applications in economics and decision making [31, 2]. Determining whether Nash equilibria exist, and effectively computing
Undirected connectivity in O(log 1.5 (n)) space
 In Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science
, 1992
"... We present a deterministic algorithm for the connectivity problem on undirected graphs that runs in O(log 1.5 n) space. Thus, the recursive doubling technique of Savich which requires Θ(log 2 n) space is not optimal for this problem. 1 ..."
Abstract

Cited by 50 (5 self)
 Add to MetaCart
We present a deterministic algorithm for the connectivity problem on undirected graphs that runs in O(log 1.5 n) space. Thus, the recursive doubling technique of Savich which requires Θ(log 2 n) space is not optimal for this problem. 1
Structure and Importance of LogspaceMODClasses
, 1992
"... . We refine the techniques of Beigel, Gill, Hertrampf [4] who investigated polynomial time counting classes, in order to make them applicable to the case of logarithmic space. We define the complexity classes MOD k L and demonstrate their significance by proving that all standard problems of linear ..."
Abstract

Cited by 43 (1 self)
 Add to MetaCart
. We refine the techniques of Beigel, Gill, Hertrampf [4] who investigated polynomial time counting classes, in order to make them applicable to the case of logarithmic space. We define the complexity classes MOD k L and demonstrate their significance by proving that all standard problems of linear algebra over the finite rings Z/kZ are complete for these classes. We then define new complexity classes LogFew and LogFewNL and identify them as adequate logspace versions of Few and FewP. We show that LogFewNL is contained in MODZ k L and that LogFew is contained in MOD k L for all k. Also an upper bound for L #L in terms of computation of integer determinants is given from which we conclude that all logspace counting classes are contained in NC 2 . 1 Introduction Valiant [21] defined the class #P of functions f such that there is a nondeterministic polynomial time Turing machine which, on input x, has exactly f(x) accepting computation paths. Many complexity classes in the area betw...
Randomization and Derandomization in SpaceBounded Computation
 In Proceedings of the 11th Annual IEEE Conference on Computational Complexity
, 1996
"... This is a survey of spacebounded probabilistic computation, summarizing the present state of knowledge about the relationships between the various complexity classes associated with such computation. The survey especially emphasizes recent progress in the construction of pseudorandom generators tha ..."
Abstract

Cited by 35 (0 self)
 Add to MetaCart
This is a survey of spacebounded probabilistic computation, summarizing the present state of knowledge about the relationships between the various complexity classes associated with such computation. The survey especially emphasizes recent progress in the construction of pseudorandom generators that fool probabilistic spacebounded computations, and the application of such generators to obtain deterministic simulations.
Relationships Among PL, L, and the Determinant
, 1996
"... Recent results byToda, Vinay, Damm, and Valianthave shown that the complexity of the determinantischaracterized by the complexity of counting the number of accepting computations of a nondeterministic logspacebounded machine. #This class of functions is known as #L.# By using that characterizati ..."
Abstract

Cited by 33 (8 self)
 Add to MetaCart
(Show Context)
Recent results byToda, Vinay, Damm, and Valianthave shown that the complexity of the determinantischaracterized by the complexity of counting the number of accepting computations of a nondeterministic logspacebounded machine. #This class of functions is known as #L.# By using that characterization and by establishing a few elementary closure properties, we giveavery simple proof of a theorem of Jung, showing that probabilistic logspacebounded #PL# machines lose none of their computational power if they are restricted to run in polynomial time.
The complexity of graph connectivity
, 1992
"... In this paper we survey the major developments in understanding the complexity of the graph connectivity problem in several computational models, and highlight some challenging open problems. 1 ..."
Abstract

Cited by 25 (1 self)
 Add to MetaCart
In this paper we survey the major developments in understanding the complexity of the graph connectivity problem in several computational models, and highlight some challenging open problems. 1
TimeSpace Tradeoffs in the Counting Hierarchy
, 2001
"... We extend the lower bound techniques of [14], to the unboundederror probabilistic model. A key step in the argument is a generalization of Nepomnjasci's theorem from the Boolean setting to the arithmetic setting. This generalization is made possible, due to the recent discovery of logspaceuni ..."
Abstract

Cited by 18 (3 self)
 Add to MetaCart
(Show Context)
We extend the lower bound techniques of [14], to the unboundederror probabilistic model. A key step in the argument is a generalization of Nepomnjasci's theorem from the Boolean setting to the arithmetic setting. This generalization is made possible, due to the recent discovery of logspaceuniform TC 0 circuits for iterated multiplication [9]. Here is an