April 2006
·
111 Reads
·
18 Citations
We present a new, combinatorial proof of the classical theorem that the analytic sets are not closed under complement. Possible connections with questions in complexity theory are discussed.
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
April 2006
·
111 Reads
·
18 Citations
We present a new, combinatorial proof of the classical theorem that the analytic sets are not closed under complement. Possible connections with questions in complexity theory are discussed.
January 2001
We study on-line strategies for solving problems with hybrid algorithms. There is a problem Q and w basic algorithms for solving Q. For some lambda <= w, we have a computer with lambda disjoint memory areas, each of which can be used to run a basic algorithm and store its intermediate results. In the worst case, only one basic algorithm can solve Q in finite time, and all the other basic algorithms run forever without solving Q. To solve Q with a hybrid algorithm constructed from the basic algorithms, we run a basic algorithm for some time, then switch to another, and continue this process until Q is solved. The goal is to solve Q in the least amount of time. Using competitive ratios to measure the efficiency of a hybrid algorithm, we construct an optimal deterministic hybrid algorithm and an efficient randomized hybrid algorithm. This resolves an open question on searching with multiple robots posed by Baeza-Yates, Culberson and Rawlins. We also prove that our randomized algorithm is optimal for lambda = 1, settling a conjecture of Kao, Reif and Tate.
October 2000
·
27 Reads
·
27 Citations
Journal of Computer and System Sciences
this paper we show that monotone logarithmic depth circuits are strictly weaker than monotone polynomial size logarithmic width circuits, i.e. we prove that mNC
October 2000
·
15 Reads
·
1 Citation
We give a general complexity classification scheme for monotone computation, including monotone space-bounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a simple notion of monotone reducibility and exhibit complete problems. This provides a framework for stating existing results and asking new questions. We show that mNL (monotone nondeterministic log-space) is not closed under complementation, in contrast to Immerman's and Szelepcs 'enyi's nonmonotone result [Imm88, Sze87] that NL = co-NL; this is a simple extension of the monotone circuit depth lower bound of Karchmer and Wigderson [KW90] for st-connectivity. We also consider mBWBP (monotone bounded width branching programs) and study the question of whether mBWBP is properly contained in mNC 1 , motivated by Barrington's result [Bar89] that BWBP = NC 1 . Although we cannot answer t...
February 2000
·
689 Reads
·
1,405 Citations
We give a quantum algorithm for solving instances of the satisfiability problem, based on adiabatic evolution. The evolution of the quantum state is governed by a time-dependent Hamiltonian that interpolates between an initial Hamiltonian, whose ground state is easy to construct, and a final Hamiltonian, whose ground state encodes the satisfying assignment. To ensure that the system evolves to the desired final ground state, the evolution time must be big enough. The time required depends on the minimum energy difference between the two lowest states of the interpolating Hamiltonian. We are unable to estimate this gap in general. We give some special symmetric cases of the satisfiability problem where the symmetry allows us to estimate the gap and we show that, in these cases, our algorithm runs in polynomial time.
November 1999
·
67 Reads
·
24 Citations
Physical review A, Atomic, molecular, and optical physics
Suppose an oracle is known to hold one of a given set of D two-valued functions. To successfully identify which function the oracle holds with k classical queries, it must be the case that D is at most 2k. In this paper we derive a bound for how many functions can be distinguished with k quantum queries.
April 1999
·
62 Reads
·
13 Citations
In this paper, we give an oracle under which BPP is equal to probabilistic linear time, an unusual collapse of a complexity time hierarchy. In addition, we also give oracles where &Dgr;P2 is contained in probabilistic linear time and where BPP has linear sized circuits, as well as oracles for the negation of these questions. This indicates that these questions will not be solved by techniques that relativize. Finally, we note that probabilistic linear time can not contain both NP and BPP, implying that there are languages solvable by interactive proof systems that can not be solved in probabilistic linear time.
April 1999
·
98 Reads
·
208 Citations
Theoretical Computer Science
this paper we consider a further generalization of the proof system model, due to Ben-Or, Goldwasser, Kilian and Wigderson [6], where instead of a single prover there may be many. This apparently gives the model additional power. The intuition for this may be seen by considering the case of two criminal suspects who are under interrogation to see if they are guilty of together robbing a bank. Of course they (the provers) are trying to convince Scotland Yard (the verifier) of their innocence. Assuming that they are in fact innocent, it is clear that their ability to convince the police of this is enhanced if they are questioned in separate rooms and can corroborate each other's stories without communicating. We shall see later in this paper that this sort of corroboration is the key to the additional power of multiple provers.
April 1999
·
43 Reads
·
60 Citations
Information Processing Letters
This paper instead exhibits an oracle such that relative to this oracle there exists a language in co-NP that does not have an interactive protocol. From this we get that techniques which relativize will not settle our conjecture.
February 1999
·
27 Reads
·
46 Citations
We consider the problem of inserting one item into a list of N-1 ordered items. We previously showed that no quantum algorithm could solve this problem in fewer than log N/(2 log log N) queries, for N large. We transform the problem into a "translationally invariant" problem and restrict attention to invariant algorithms. We construct the "greedy" invariant algorithm and show numerically that it outperforms the best classical algorithm for various N. We also find invariant algorithms that succeed exactly in fewer queries than is classically possible, and iterating one of them shows that the insertion problem can be solved in fewer than 0.53 log N quantum queries for large N (where log N is the classical lower bound). We don't know whether a o(log N) algorithm exists.
... This property is just like vertex expansion, except that it ensures a large neighborhood for sets of size exactly K (rather than all sets of size at most K). Indeed, this variant of vertex expansion was introduced in graph-theoretic form in [217,242,255], and is equivalent to the following relaxation of extractors. ...
Reference:
On the works of Avi Wigderson
June 1988
Journal of Computer and System Sciences
... It is known that if we can solve this problem with KQ queries to the fractional phase oracle O b,ε , we can also solve it with at most K KQ queries to the regular phase oracle O b , with K = Θ(ε). 8 According to [14], Equation 4, this implies that ...
January 1999
... Recall that without loss of generality we may assume AM protocols satisfy perfect completeness [10,Section 3]. That is, given a system of polynomial equations in Z[y 1 , . . . ...
January 1989
... Since the integrality of the release dates and deadlines is not assumed, the same algorithm works if the jobs have the same but not necessarily unit processing time. Simons and Sipser [9] consider a scheduling problem, where n unit-length jobs have to be scheduled on m machines. Each job has several feasible intervals with integral endpoints in which it can be processed. ...
February 1984
Operations Research
... None of these successive inclusions is known to be proper. Indeed, Rettinger and Verbeek [RV97] claim to have an oracle A relative to which BPTIME A [O(n)] = BPP A = BPTIME A [qpoly] (hence also BPE A = BPEXP A by translation), fixing a flawed result of Fortnow and Sipser [FS89,FS97]. Thus our simulation problem ties in to the important open question of whether bounded-error probabilistic time enjoys a tight time hierarchy like that of deterministic time. ...
April 1999
... In a related context, the authors in [31] extended Deutsch's algorithm to binary Boolean functions. It is also important to note that oracular algorithms designed for computing Boolean functions or for classification purposes are frequently discussed in the literature on Quantum Learning and Quantum Machine Learning, with notable studies including [32], [33], [34], [35], [36], and [37]. The vast majority of these works focus on the differentiation between constant and balanced functions, which are defined as functions where the number of elements in their domain that yield the value 0 is equal to those that yield the value 1. ...
November 1999
Physical review A, Atomic, molecular, and optical physics
... Thus, NC 0 is unable to compute the AND function. It is a classical result that AC 0 is unable to compute Parity [FSS84]. The containment TC 0 ⊆ NC 1 (and hence, TC k ⊆ NC k+1 ) follows from the fact that NC 1 can simulate the unbounded fan-in Majority gate. ...
December 1984
Theory of Computing Systems
... We present a tool that has been used several times to show lower bounds against depth-3 circuits, in particular in [14]. The following definition is attributed to Sipser therein: [27]). Let be a set of words, all of same length , and > 0. A -limit for is a word of length such that for any set of positions, a word in matches on all these positions. ...
April 2006
... For the case w = 2, deterministic and randomized search strategies were given that achieve the optimal competitive ratio of 9 [47] and approximately 4.5911 [47,48], respectively. This work has been extended by Kao et al. [49], who give optimal deterministic and randomized algorithms for all w ∈ N. The single-machine scheduling problem with kill-and-restart strategies can in fact be viewed in this framework: There are now n = w goals, and the jth goal is located at some unknown distance p j on the jth road. The agent can move at unit speed on any of the roads, and has the ability to teleport back to the origin at any point in time, which represents the action of aborting a job. ...
October 1998
Journal of Algorithms
... Work on program size has been carried out in the setting of computability theory, for instance [14], [18], and [15] in relation to Kolmogorov complexity. In [17] program size is defined as the set of characters of a program and it is related with practical computational tasks, while [13] links program size with information theory. ...
January 1977
Foundations of Computer Science, 1975., 16th Annual Symposium on