Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings.

7-10 July 2003

Filter Results

Displaying Results 1 - 25 of 34
  • Quantum certificate complexity

    Publication Year: 2003, Page(s):171 - 178
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    Given a Boolean function f, we study two natural generalizations of the certificate complexity C(f): the randomized certificate complexity RC(f) and the quantum certificate complexity QC(f). Using Ambainis' adversary method, we exactly characterize QC(f) as the square root of RC(f). We then use this result to prove the new relation R0(f)=O(Q2(f)2Q0(f)log... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal separation of EROW and CROW PRAMs

    Publication Year: 2003, Page(s):93 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    We consider the problem of evaluating a Boolean function on PRAMs. We exhibit a Boolean function f:{0,1}n→{0,1} that can be evaluated in time O(log log n) in a deterministic CROW (concurrent read owner write) PRAM model, but requires time Ω(log n) in EROW (exclusive read owner write) PRAM. Our lower bound also holds in the randomized Monte Carlo EROW model. This Boolean funct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Memoization and DPLL: formula caching proof systems

    Publication Year: 2003, Page(s):248 - 259
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (585 KB) | HTML iconHTML

    A fruitful connection between algorithm design and proof complexity is the formalization of the DPLL approach to satisfiability testing in terms of tree-like resolution proofs. We consider extensions of the DPLL approach that add some version of memoization, remembering formulas the algorithm has previously shown unsatisfiable. Various versions of such formula caching algorithms have been suggeste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounded nondeterminism and alternation in parameterized complexity theory

    Publication Year: 2003, Page(s):13 - 29
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB) | HTML iconHTML

    We give machine characterisations and logical descriptions of a number of parameterized complexity classes. The focus of our attention is the class W[P], which we characterise as the class of all parameterized problems decidable by a nondeterministic fixed-parameter tractable algorithm, whose use of nondeterminism is bounded in terms of the parameter. We give similar characterisations for AW[P], t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantum query complexity and semi-definite programming

    Publication Year: 2003, Page(s):179 - 193
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (426 KB) | HTML iconHTML

    We reformulate quantum query complexity in terms of inequalities and equations for a set of positive semidefinite matrices. Using the new formulation we: 1) show that the workspace of a quantum computer can be limited to at most n+k qubits (where n and k are the number of input and output bits respectively) without reducing the computational power of the model; 2) give an algorithm that on input t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Near-optimal lower bounds on the multi-party communication complexity of set disjointness

    Publication Year: 2003, Page(s):107 - 117
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (564 KB) | HTML iconHTML

    We study the communication complexity of the set disjointness problem in the general multiparty model. For t players, each holding a subset of a universe of size n, we establish a near-optimal lower bound of Ω(n/(t log t)) on the communication complexity of the problem of determining whether their sets are disjoint. In the more restrictive one-way communication model, in which the players ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uniform hardness vs. randomness tradeoffs for Arthur-Merlin games

    Publication Year: 2003, Page(s):33 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1360 KB) | HTML iconHTML

    Impagliazzo and Wigderson proved a uniform hardness vs. randomness "gap result" for BPP. We show an analogous result for AM: Either Arthur-Merlin protocols are very strong and everything in E=DTIME(2O(n)) can be proved to a subexponential time verifier, or else Arthur-Merlin protocols are weak and every language in AM has a polynomial time nondeterministic algorithm in the uniform avera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On statistical query sampling and NMR quantum computing

    Publication Year: 2003, Page(s):194 - 205
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (614 KB) | HTML iconHTML

    We introduce a "statistical query sampling" model, in which the goal of an algorithm is to produce an element in a hidden set S⊆{0,1}n with reasonable probability. The algorithm gains information about S through oracle calls (statistical queries), where the algorithm submits a query function g(·) and receives an approximation to Prx∈S[g(x)=1]. We show how thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rectangle size bounds and threshold covers in communication complexity

    Publication Year: 2003, Page(s):118 - 134
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    We investigate the power of the most important lower bound technique in randomized communication complexity, which is based on an evaluation of the maximal size of approximately monochromatic rectangles, with respect to arbitrary distributions on the inputs. While it is known that the 0-error version of this bound is polynomially tight for deterministic communication, nothing in this direction is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proceedings 18th IEEE Annual Conference on Computational Complexity

    Publication Year: 2003
    Request permission for commercial reuse | PDF file iconPDF (217 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2003, Page(s): 339
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Holographic proofs and derandomization

    Publication Year: 2003, Page(s):269 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    We derive a stronger consequence of EXP having polynomial-size circuits than was known previously, namely that there is a simulation of P in MAPOLYLOG that fools all deterministic polynomial-time adversaries. Using the connection between circuit lower bounds and derandomization, we obtain uniform assumptions for derandomizing BPP. Our results strengthen the space-randomness tradeoffs of Sipser, Ni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extremal properties of polynomial threshold functions

    Publication Year: 2003, Page(s):3 - 12
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    We give new extremal bounds on polynomial threshold function (PTF) representations of Boolean functions. Our results include the following: 1) Almost every Boolean function has PTF degree at most n/2+O(√(n log n)). Together with results of Anthony and Alon, we establish a conjecture of Wang and Williams [1991] and Aspnes, Beigel, Furst, and Rudich [1994] up to lower order terms. 2) Every Boo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inapproximability - some history and some open problems

    Publication Year: 2003, Page(s):265 - 266
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    The purpose of this talk is to give an overview of the status of some problems in approximability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The complexity of stochastic sequences

    Publication Year: 2003, Page(s):230 - 235
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    We observe that known results on the Kolmogorov complexity of prefixes of effectively stochastic sequences extend to corresponding random sequences. First, there are recursively random sequences such that for any nondecreasing and unbounded computable function f and for almost all n, the uniform complexity of the length n prefix of the sequence is bounded by f(n). Second, a similar result with bou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strong inapproximability gap for a generalization of minimum bisection

    Publication Year: 2003, Page(s):371 - 378
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    As a problem with similar properties to minimum bisection, we consider the following: given a homogeneous system of linear equations over Z2, with exactly k variables in each equation, find a balanced assignment that minimizes the number of satisfied equations. A balanced assignment is one which contains an equal number of 0s and 1s. When k=2, this is the minimum bisection problem. We c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Are Cook and Karp ever the same?

    Publication Year: 2003, Page(s):333 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    We consider the question whether there exists a set A such that every set polynomial-time Turing equivalent to A is also many-one equivalent to A. We show that if E=NE then no sparse set has this property. We give the first relativized world where there exists a set with this property, and in this world the set A is sparse. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting the mutual information for a triple of binary strings

    Publication Year: 2003, Page(s):221 - 229
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (482 KB) | HTML iconHTML

    We say that the mutual information of a triple of binary strings a, b, c can be extracted if there exists a string d such that a, b, and c are independent given d, and d is simple conditional to each of the strings a, b, c. This is an analog of the well-known Gacs-Korner (1973) definition of extrability of the mutual information for a pair of binary strings. We prove that (in contrast to the case ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parameterized complexity for the skeptic

    Publication Year: 2003, Page(s):147 - 168
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    The goal is to provide a tourist guide, with an eye towards structural issues, to what I consider some of the major highlights of parameterized complexity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved inapproximability of lattice and coding problems with preprocessing

    Publication Year: 2003, Page(s):363 - 370
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (519 KB) | HTML iconHTML

    We show that the closest vector problem with preprocessing (CVPP) is NP-hard to approximate to within √3-ε for any ε>0. In addition, we show that the nearest codeword problem with preprocessing (NCPP) is NP-hard to approximate to within 3-ε. These results improve the results of Feige and Micciancio (2002). We also present the first inapproximability result for the relatively n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimization of decision trees is hard to approximate

    Publication Year: 2003, Page(s):84 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    Decision trees are representations of discrete functions with widespread applications in, e.g., complexity theory and data mining and exploration. In these areas it is important to obtain decision trees of small size. The minimization problem for decision trees is known to be NP-hard. The problem is even hard to approximate up to any constant factor. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three-query PCPs with perfect completeness over non-Boolean domains

    Publication Year: 2003, Page(s):284 - 299
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    We study nonBoolean PCPs that have perfect completeness and read three positions from the proof. For the case when the proof consists of values from a domain of size d for some integer constant d≥2, we construct a nonadaptive PCP with perfect completeness and soundness d-1+d-2+ε, for any constant ε>0, and an adaptive PCP with perfect completeness and soundness d<... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A combinatorial characterization of resolution width

    Publication Year: 2003, Page(s):239 - 247
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    We provide a characterization of the resolution width introduced in the context of propositional proof complexity in terms of the existential pebble game introduced in the context of finite model theory. The characterization is tight and purely combinatorial. Our first application of this result is a surprising proof that the minimum space of refuting a 3-CNF formula is always bounded from below b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vertex cover might be hard to approximate to within 2-ϵ

    Publication Year: 2003, Page(s):379 - 386
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (529 KB) | HTML iconHTML

    Based on a conjecture regarding the power of unique 2-prover-1-round games presented in [S. Khot, (2002)], we show that vertex cover is hard to approximate within any constant factor better than 2. We actually show a stronger result, namely, based on the same conjecture, vertex cover on k-uniform hypergraphs is hard to approximate within any constant factor better than k. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal languages and the power of diagonalization

    Publication Year: 2003, Page(s):337 - 346
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    We define and study strong diagonalization and compare it to weak diagonalization, implicit in the work of D. Kozen (1980). Kozen's result shows that virtually every separation can be recast as weak diagonalization. We show that there are classes of languages, which cannot be separated by strong diagonalization and provide evidence that strong diagonalization does not relativize. We also define tw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.