Michael Sipser’s research while affiliated with Massachusetts Institute of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (49)


A topological view of some problems in complexity theory
  • Chapter

April 2006

·

111 Reads

·

18 Citations

Michael Sipser

We present a new, combinatorial proof of the classical theorem that the analytic sets are not closed under complement. Possible connections with questions in complexity theory are discussed.


Optimal Constructions of Hybrid Algorithms

January 2001

We study on-line strategies for solving problems with hybrid algorithms. There is a problem Q and w basic algorithms for solving Q. For some lambda <= w, we have a computer with lambda disjoint memory areas, each of which can be used to run a basic algorithm and store its intermediate results. In the worst case, only one basic algorithm can solve Q in finite time, and all the other basic algorithms run forever without solving Q. To solve Q with a hybrid algorithm constructed from the basic algorithms, we run a basic algorithm for some time, then switch to another, and continue this process until Q is solved. The goal is to solve Q in the least amount of time. Using competitive ratios to measure the efficiency of a hybrid algorithm, we construct an optimal deterministic hybrid algorithm and an efficient randomized hybrid algorithm. This resolves an open question on searching with multiple robots posed by Baeza-Yates, Culberson and Rawlins. We also prove that our randomized algorithm is optimal for lambda = 1, settling a conjecture of Kao, Reif and Tate.



Monotone Complexity

October 2000

·

15 Reads

·

1 Citation

We give a general complexity classification scheme for monotone computation, including monotone space-bounded and Turing machine models not previously considered. We propose monotone complexity classes including mAC i , mNC i , mLOGCFL, mBWBP , mL, mNL, mP , mBPP and mNP . We define a simple notion of monotone reducibility and exhibit complete problems. This provides a framework for stating existing results and asking new questions. We show that mNL (monotone nondeterministic log-space) is not closed under complementation, in contrast to Immerman's and Szelepcs 'enyi's nonmonotone result [Imm88, Sze87] that NL = co-NL; this is a simple extension of the monotone circuit depth lower bound of Karchmer and Wigderson [KW90] for st-connectivity. We also consider mBWBP (monotone bounded width branching programs) and study the question of whether mBWBP is properly contained in mNC 1 , motivated by Barrington's result [Bar89] that BWBP = NC 1 . Although we cannot answer t...


Quantum Computation by Adiabatic Evolution

February 2000

·

689 Reads

·

1,405 Citations

We give a quantum algorithm for solving instances of the satisfiability problem, based on adiabatic evolution. The evolution of the quantum state is governed by a time-dependent Hamiltonian that interpolates between an initial Hamiltonian, whose ground state is easy to construct, and a final Hamiltonian, whose ground state encodes the satisfying assignment. To ensure that the system evolves to the desired final ground state, the evolution time must be big enough. The time required depends on the minimum energy difference between the two lowest states of the interpolating Hamiltonian. We are unable to estimate this gap in general. We give some special symmetric cases of the satisfiability problem where the symmetry allows us to estimate the gap and we show that, in these cases, our algorithm runs in polynomial time.


Bound on the number of functions that can be distinguished with k quantum queries
  • Article
  • Full-text available

November 1999

·

67 Reads

·

24 Citations

Physical review A, Atomic, molecular, and optical physics

Suppose an oracle is known to hold one of a given set of D two-valued functions. To successfully identify which function the oracle holds with k classical queries, it must be the case that D is at most 2k. In this paper we derive a bound for how many functions can be distinguished with k quantum queries.

Download

Probabilistic computation and linear time

April 1999

·

62 Reads

·

13 Citations

In this paper, we give an oracle under which BPP is equal to probabilistic linear time, an unusual collapse of a complexity time hierarchy. In addition, we also give oracles where &Dgr;P2 is contained in probabilistic linear time and where BPP has linear sized circuits, as well as oracles for the negation of these questions. This indicates that these questions will not be solved by techniques that relativize. Finally, we note that probabilistic linear time can not contain both NP and BPP, implying that there are languages solvable by interactive proof systems that can not be solved in probabilistic linear time.


On the Power of Multi-Prover Interactive Protocols

April 1999

·

98 Reads

·

208 Citations

Theoretical Computer Science

this paper we consider a further generalization of the proof system model, due to Ben-Or, Goldwasser, Kilian and Wigderson [6], where instead of a single prover there may be many. This apparently gives the model additional power. The intuition for this may be seen by considering the case of two criminal suspects who are under interrogation to see if they are guilty of together robbing a bank. Of course they (the provers) are trying to convince Scotland Yard (the verifier) of their innocence. Assuming that they are in fact innocent, it is clear that their ability to convince the police of this is enhanced if they are questioned in separate rooms and can corroborate each other's stories without communicating. We shall see later in this paper that this sort of corroboration is the key to the additional power of multiple provers.



Invariant Quantum Algorithms for Insertion into an Ordered List

February 1999

·

27 Reads

·

46 Citations

We consider the problem of inserting one item into a list of N-1 ordered items. We previously showed that no quantum algorithm could solve this problem in fewer than log N/(2 log log N) queries, for N large. We transform the problem into a "translationally invariant" problem and restrict attention to invariant algorithms. We construct the "greedy" invariant algorithm and show numerically that it outperforms the best classical algorithm for various N. We also find invariant algorithms that succeed exactly in fewer queries than is classically possible, and iterating one of them shows that the insertion problem can be solved in fewer than 0.53 log N quantum queries for large N (where log N is the classical lower bound). We don't know whether a o(log N) algorithm exists.


Citations (43)


... This property is just like vertex expansion, except that it ensures a large neighborhood for sets of size exactly K (rather than all sets of size at most K). Indeed, this variant of vertex expansion was introduced in graph-theoretic form in [217,242,255], and is equivalent to the following relaxation of extractors. ...

Reference:

On the works of Avi Wigderson
Expanders, randomness, or time versus space
  • Citing Article
  • June 1988

Journal of Computer and System Sciences

... Recall that without loss of generality we may assume AM protocols satisfy perfect completeness [10,Section 3]. That is, given a system of polynomial equations in Z[y 1 , . . . ...

On Completeness and Soundness in Interactive Proof Systems
  • Citing Article
  • January 1989

·

·

Y. Mansour

·

[...]

·

... Since the integrality of the release dates and deadlines is not assumed, the same algorithm works if the jobs have the same but not necessarily unit processing time. Simons and Sipser [9] consider a scheduling problem, where n unit-length jobs have to be scheduled on m machines. Each job has several feasible intervals with integral endpoints in which it can be processed. ...

On Scheduling Unit-Length Jobs with Multiple Release Time/Deadline Intervals
  • Citing Article
  • February 1984

Operations Research

... None of these successive inclusions is known to be proper. Indeed, Rettinger and Verbeek [RV97] claim to have an oracle A relative to which BPTIME A [O(n)] = BPP A = BPTIME A [qpoly] (hence also BPE A = BPEXP A by translation), fixing a flawed result of Fortnow and Sipser [FS89,FS97]. Thus our simulation problem ties in to the important open question of whether bounded-error probabilistic time enjoys a tight time hierarchy like that of deterministic time. ...

Probabilistic computation and linear time

... In a related context, the authors in [31] extended Deutsch's algorithm to binary Boolean functions. It is also important to note that oracular algorithms designed for computing Boolean functions or for classification purposes are frequently discussed in the literature on Quantum Learning and Quantum Machine Learning, with notable studies including [32], [33], [34], [35], [36], and [37]. The vast majority of these works focus on the differentiation between constant and balanced functions, which are defined as functions where the number of elements in their domain that yield the value 0 is equal to those that yield the value 1. ...

Bound on the number of functions that can be distinguished with k quantum queries

Physical review A, Atomic, molecular, and optical physics

... Thus, NC 0 is unable to compute the AND function. It is a classical result that AC 0 is unable to compute Parity [FSS84]. The containment TC 0 ⊆ NC 1 (and hence, TC k ⊆ NC k+1 ) follows from the fact that NC 1 can simulate the unbounded fan-in Majority gate. ...

Parity, circuits, and the polynomial-time hierarchy
  • Citing Article
  • December 1984

Theory of Computing Systems

... We present a tool that has been used several times to show lower bounds against depth-3 circuits, in particular in [14]. The following definition is attributed to Sipser therein: [27]). Let be a set of words, all of same length , and > 0. A -limit for is a word of length such that for any set of positions, a word in matches on all these positions. ...

A topological view of some problems in complexity theory
  • Citing Chapter
  • April 2006

... For the case w = 2, deterministic and randomized search strategies were given that achieve the optimal competitive ratio of 9 [47] and approximately 4.5911 [47,48], respectively. This work has been extended by Kao et al. [49], who give optimal deterministic and randomized algorithms for all w ∈ N. The single-machine scheduling problem with kill-and-restart strategies can in fact be viewed in this framework: There are now n = w goals, and the jth goal is located at some unknown distance p j on the jth road. The agent can move at unit speed on any of the roads, and has the ability to teleport back to the origin at any point in time, which represents the action of aborting a job. ...

Optimal Constructions of Hybrid Algorithms

Journal of Algorithms

... Work on program size has been carried out in the setting of computability theory, for instance [14], [18], and [15] in relation to Kolmogorov complexity. In [17] program size is defined as the set of characters of a program and it is related with practical computational tasks, while [13] links program size with information theory. ...

Several results in program size complexity
  • Citing Article
  • January 1977

Foundations of Computer Science, 1975., 16th Annual Symposium on