Results 1  10
of
41
Some Connections between Bounded Query Classes and NonUniform Complexity
 In Proceedings of the 5th Structure in Complexity Theory Conference
, 1990
"... This paper is dedicated to the memory of Ronald V. Book, 19371997. ..."
Abstract

Cited by 70 (23 self)
 Add to MetaCart
This paper is dedicated to the memory of Ronald V. Book, 19371997.
The Polynomial Method in Circuit Complexity
 In Proceedings of the 8th IEEE Structure in Complexity Theory Conference
, 1993
"... The representation of functions as lowdegree polynomials over various rings has provided many insights in the theory of smalldepth circuits. We survey some of the closure properties, upper bounds, and lower bounds obtained via this approach. 1. Introduction There is a long history of using polyno ..."
Abstract

Cited by 67 (4 self)
 Add to MetaCart
The representation of functions as lowdegree polynomials over various rings has provided many insights in the theory of smalldepth circuits. We survey some of the closure properties, upper bounds, and lower bounds obtained via this approach. 1. Introduction There is a long history of using polynomials in order to prove complexity bounds. Minsky and Papert [39] used polynomials to prove early lower bounds on the order of perceptrons. Razborov [46] and Smolensky [49] used them to prove lower bounds on the size of ANDOR circuits. Other lower bounds via polynomials are due to [50, 4, 10, 51, 9, 55]. Paturi and Saks [44] discovered that rational functions could be used for lower bounds on the size of threshold circuits. Toda [53] used polynomials to prove upper bounds on the power of the polynomial hierarchy. This led to a series of upper bounds on the power of the polynomial hierarchy [54, 52], AC 0 [2, 3, 52, 19], and ACC [58, 20, 30, 37], and related classes [21, 42]. Beigel and Gi...
Uniform ConstantDepth Threshold Circuits for Division and Iterated Multiplication
, 2002
"... this paper. 2.1. Circuit Classes We begin by formally defining the three circuit complexity classes that will concern us here. These are given by combinatorial restrictions on the circuits of the family. We will then define the uniformity restrictions we will use. Finally, we will give the equival ..."
Abstract

Cited by 37 (8 self)
 Add to MetaCart
this paper. 2.1. Circuit Classes We begin by formally defining the three circuit complexity classes that will concern us here. These are given by combinatorial restrictions on the circuits of the family. We will then define the uniformity restrictions we will use. Finally, we will give the equivalent formulations of uniform circuit complexity classes in terms of descriptive complexity classes
Random Debaters and the Hardness of Approximating Stochastic Functions
, 1994
"... . A probabilistically checkable debate system (PCDS) for a language L consists of a probabilistic polynomialtime verifier V and a debate between Player 1, who claims that the input x is in L, and Player 0, who claims that the input x is not in L. It is known that there is a PCDS for L in which V ..."
Abstract

Cited by 29 (6 self)
 Add to MetaCart
. A probabilistically checkable debate system (PCDS) for a language L consists of a probabilistic polynomialtime verifier V and a debate between Player 1, who claims that the input x is in L, and Player 0, who claims that the input x is not in L. It is known that there is a PCDS for L in which V flips O(logn) coins and reads O(1) bits of the debate if and only if L is in PSPACE ([Condon et al., Proc. 25th ACM Symposium on Theory of Computing, 1993, pp. 304315]). In this paper, we restrict attention to RPCDS's, which are PCDS's in which Player 0 follows a very simple strategy: On each turn, Player 0 chooses uniformly at random from the set of legal moves. We prove the following result. Theorem: L has an RPCDS in which the verifier flips O(logn) coins and reads O(1) bits of the debate if and only if L is in PSPACE. This new characterization of PSPACE is used to show that certain stochastic PSPACEhard functions are as hard to approximate closely as they are to compute exactly. Exam...
The complexity of graph connectivity
, 1992
"... In this paper we survey the major developments in understanding the complexity of the graph connectivity problem in several computational models, and highlight some challenging open problems. 1 ..."
Abstract

Cited by 23 (1 self)
 Add to MetaCart
In this paper we survey the major developments in understanding the complexity of the graph connectivity problem in several computational models, and highlight some challenging open problems. 1
Ultrafast expected time parallel algorithms
 Proc. of the 2nd SODA
, 1991
"... It has been shown previously that sorting n items into n locations with a polynomial number of processors requires Ω(log n/log log n) time. We sidestep this lower bound with the idea of Padded Sorting, or sorting n items into n + o(n) locations. Since many problems do not rely on the exact rank of s ..."
Abstract

Cited by 20 (3 self)
 Add to MetaCart
It has been shown previously that sorting n items into n locations with a polynomial number of processors requires Ω(log n/log log n) time. We sidestep this lower bound with the idea of Padded Sorting, or sorting n items into n + o(n) locations. Since many problems do not rely on the exact rank of sorted items, a Padded Sort is often just as useful as an unpadded sort. Our algorithm for Padded Sort runs on the Tolerant CRCW PRAM and takes Θ(log log n/log log log n) expected time using n log log log n/log log n processors, assuming the items are taken from a uniform distribution. Using similar techniques we solve some computational geometry problems, including Voronoi Diagram, with the same processor and time bounds, assuming points are taken from a uniform distribution in the unit square. Further, we present an Arbitrary CRCW PRAM algorithm to solve the Closest Pair problem in constant expected time with n processors regardless of the distribution of points. All of these algorithms achieve linear speedup in expected time over their optimal serial counterparts. 1 Research done while at the University of Michigan and supported by an AT&T Fellowship.
A Lower Bound for Randomized ReadkTimes Branching Programs
 Electr. Coll. on Comp. Compl
, 1997
"... In this paper, we are concerned with randomized OBDDs and randomized readktimes branching programs. We present an example of a Boolean function which has polynomial size randomized OBDDs with small, onesided error, but only nondeterministic readonce branching programs of exponential size. Further ..."
Abstract

Cited by 15 (8 self)
 Add to MetaCart
In this paper, we are concerned with randomized OBDDs and randomized readktimes branching programs. We present an example of a Boolean function which has polynomial size randomized OBDDs with small, onesided error, but only nondeterministic readonce branching programs of exponential size. Furthermore, we discuss a lower bound technique for randomized OBDDs with twosided error and prove an exponential lower bound of this type. Our main result is an exponential lower bound for randomized readktimes branching programs with twosided error. 1 Introduction Branching programs are a theoretically and practically interesting data structure for the representation of Boolean functions. In complexity theory, among other problems, lower bounds for the size of branching programs for explicitly defined functions and the relations of the various branching program models are investigated. A branching program (BP) on the variable set fx 1 ; : : : ; x n g is a directed acyclic graph with one sour...
Optimal Deterministic Approximate Parallel Prefix Sums and Their Applications
 In Proc. Israel Symp. on Theory and Computing Systems (ISTCS'95
, 1995
"... We show that extremely accurate approximation to the prefix sums of a sequence of n integers can be computed deterministically in O(log log n) time using O(n= log log n) processors in the Common CRCW PRAM model. This complements randomized approximation methods obtained recently by Goodrich, Matias ..."
Abstract

Cited by 14 (0 self)
 Add to MetaCart
We show that extremely accurate approximation to the prefix sums of a sequence of n integers can be computed deterministically in O(log log n) time using O(n= log log n) processors in the Common CRCW PRAM model. This complements randomized approximation methods obtained recently by Goodrich, Matias and Vishkin and improves previous deterministic results obtained by Hagerup and Raman. Furthermore, our results completely match a lower bound obtained recently by Chaudhuri. Our results have many applications. Using them we improve upon the best known time bounds for deterministic approximate selection and for deterministic padded sorting. 1 Introduction The computation of prefix sums is one of the most basic tools in the design of fast parallel algorithms (see Blelloch [9] and J'aJ'a [33]). Prefixsums can be computed in O(logn) time and linear work in the EREW PRAM model (Ladner and Fischer [34]) and in O(log n= log log n) and linear work in the Common CRCW PRAM model (Cole and Vishkin...
Depth Reduction for Circuits of Unbounded FanIn
, 1991
"... We prove that constant depth circuits of size n over the basis AND, OR, PARITY are no more powerful than circuits of this size with depth four. Similar techniques are used to obtain several other depth reduction theorems; in particular, we show every set in AC can be recognized by a family of ..."
Abstract

Cited by 14 (5 self)
 Add to MetaCart
We prove that constant depth circuits of size n over the basis AND, OR, PARITY are no more powerful than circuits of this size with depth four. Similar techniques are used to obtain several other depth reduction theorems; in particular, we show every set in AC can be recognized by a family of depth three . The size bound n is optimal when considering depth reduction over AND, OR, and PARITY. Most of our results hold both for the uniform and the nonuniform case.
Deterministic restrictions in circuit complexity
 In ACM Symposium on Theory of Computing (STOC
, 1996
"... We study the complexity of computing Boolean functions using AND, OR and NOT gates. We show that a circuit of depth d with S gates can be made to output a constant by setting O(S 1−ɛ(d) ) (where ɛ(d) = 4 −d) of its input values. This implies a superlinear size lower bound for a large class of funct ..."
Abstract

Cited by 14 (1 self)
 Add to MetaCart
We study the complexity of computing Boolean functions using AND, OR and NOT gates. We show that a circuit of depth d with S gates can be made to output a constant by setting O(S 1−ɛ(d) ) (where ɛ(d) = 4 −d) of its input values. This implies a superlinear size lower bound for a large class of functions. Using this, we obtain a function computable by a uniform family of constant depth polynomial size circuits that cannot be computed by constant depth circuits of linear size. We give circuit constructions that show that the bound O(S 1−ɛ(d) ) is near optimal. We also study the complexity of computing threshold functions. The function T n r has the value 1 iff at least r of its inputs have the value 1. We show that a circuit computing T n r has at least Ω(r 2 (log n) / log r) gates, for r ≤ n 1/3, improving previous bounds. We also show a tradeoff between the number of gates and the number of wires in a threshold circuit, namely, a circuit with G (< n/2) gates and W wires computing T n r satisfies W ≥ Ω(nr(log n)/(log(G / log n))), showing that it is not possible to simultaneously optimize the number of gates and wires in a threshold circuit. Our bounds for threshold functions are based on a combinatorial lemma of independent interest. 1