Perfect Code is W[1]-complete

Size: px
Start display at page:

Download "Perfect Code is W[1]-complete"

Transcription

1 Information Processing Letters 81 (2002) Perfect Code is W[1]-complete Marco Cesati Department of Computer Science, Systems, and Industrial Engineering, University of Rome Tor Vergata, via di Tor Vergata 110, I Rome, Italy Received 3 October 2000; received in revised form 1 March 2001 Communicated by L.A. Hemaspaandra Abstract We show that the parameterized problem PERFECT CODE belongs to W[1]. This result closes an old open question, because it was often conjectured that PERFECT CODE could be a natural problem having complexity degree intermediate between W[1] and W[2]. This result also shows W[1]-membership of the parameterized problem WEIGHTED EXACT CNF SATISFIABILITY Elsevier Science B.V. All rights reserved. Keywords: Computational complexity; Parameterized computational complexity; Perfect Code; Weighted Exact Conjunctive Normal Form Satisfiability; W[1]-completeness 1. Introduction Parameterized Complexity [8] was introduced by Downey and Fellows about ten years ago. It is a powerful framework with which to address the different parameterized behavior of many computational problems. Almost all natural problems have instances consisting of at least two logical items; many NPcomplete problems admit efficient algorithms for small values of one item (the parameter). A parameterized problem is said to be fixed parameter tractable if there exists a decision algorithm whose running time on instance (x, k) is bounded by f(k) x α,wheref is an arbitrary function and α is a constant not depending on the parameter k. The class of fixed parameter tractable problems is denoted by FPT. In order to characterize those problems that do not seem to admit a fixed parameter efficient algorithm, Downey and Fellows defined a fixed parameter reduc- address: cesati@uniroma2.it (M. Cesati). tion and a hierarchy of classes W[1] W[2] including likely fixed parameter intractable problems. Each W-class is the closure under fixed parameter reductions with respect to a kernel problem, which is usually formulated in terms of special mixed-type Boolean circuits. Many natural parameterized problems have been proved to be complete for the first two levels W[1] and W[2]. Although W[1]-complete problems are not fixed parameter tractable (unless W[1] =FPT, which is very unlikely), they appear to be easier than W[2]-complete problems. Essentially, candidate solutions for W[1]-complete problems (like INDEPEN- DENT SET [6,8]) can be verified using constant-depth Boolean circuits having just one level of gates with unbounded fan-in, while solutions for W[2]-complete problems (like DOMINATING SET [5,8]) do not. The parameterized complexity of a problem complete for a W-class is precisely determined. However, many problems have been shown to be hard for some level and to belong to a higher level in the hierarchy /02/$ see front matter 2002 Elsevier Science B.V. All rights reserved. PII: S (01)

2 164 M. Cesati / Information Processing Letters 81 (2002) Although we can safely assume that these problems are not fixed parameter tractable, it seems that we still lack some information about their complexity. Citing from Downey and Fellows book [8, p. 487]: [...] we find that there are many annoying gaps between hardness and membership results. For example, there is the PERFECT CODE problem that is hard for W[1] and a member of W[2]. It is very annoying not to know exactly where to put it. We conjecture that it either represents a natural degree intermediate between W[1] and W[2], or is complete for W[2]. In any case, it has resisted strenuous efforts to achieve a precise classification. This paper solves the question of the precise degree of parameterized complexity of the PERFECT CODE problem: we show that it belongs to W[1], and thus that it is W[1]-complete. As a corollary, the WEIGHTED EXACT CNF SATISFIABILITY problem, which is equivalent to PERFECT CODE, also belongs to W[1]. The structure of the paper is as follows. In Section 2 we introduce basic notions from Parameterized Complexity theory. In Section 3 we introduce the PERFECT CODE problem and we show that it belongs to W[1].In Section 4 we introduce the WEIGHTED EXACT CNF SATISFIABILITY problem. Finally, in Section 5 we discuss how the proof technique described in Section 3 could be used to establish other W-class membership results. 2. Parameterized computational complexity A parameterized problem is a set L Σ Σ, where Σ is a fixed alphabet. For convenience, we can always assume that L Σ N. 1 We say that a parameterized problem L is (uniformly) fixed parameter tractable if there exists a decision algorithm whose running time on instance (x, k) is bounded by f(k) x α,wheref is an arbitrary function and α is a constant not depending on the parameter k. The class of fixed parameter tractable problems is denoted by FPT. 1 In other words, it is always possible to establish a bijective mapping between the encoding of the parameter and the set of natural numbers N. Observe that the mapping function does not need to be polynomial. A parameterized problem A is (uniformly many: 1) reducible to a parameterized problem B if there is an algorithm Φ which transforms an instance (x, k) of A into an instance (x,k ) of B, and such that: (1) (x, k) A if and only if (x,k ) B; (2) k depends only on k (i.e., there exists a function g such that k = g(k)); (3) Φ s running time is bounded by f(k) x α,for some arbitrary function f and constant α. Consider Boolean circuits which have two kinds of gates: small gates with bounded fan-in (usually, at most 2), and large gates with unrestricted fan-in. The depth of a circuit C is defined to be the maximum number of small and large gates on an input output path in C. Theweft of C is the maximum number of large gates on an input output path in C.Theweight of a Boolean vector x is the number of 1 s in the vector. A decision circuit is a Boolean circuit having just one output line. A decision circuit is said to accept every input vector that forces the value 1 on the output line. Let F be a family of decision circuits, possibly having several circuits with a given number of input lines. Let L F ={(C, k): C F accepts an input vector of weight k}. A parameterized problem L belongs to W[t] if there is a constant h such that L reduces to the parameterized problem L F(t,h),whereF(t,h) is the family of decision circuits of weft at most t and depth at most h. Thus, there is a hierarchy of W classes: FPT W[1] W[2] W[t]. From these definitions, if a parameterized problem A reduces to B, andb W[t], thena W[t] as well. Many parameterized problems have been proved to be complete for W[1] and W[2], thatis,thefirsttwo levels of the W-hierarchy. As an example, INDEPEN- DENT SET is W[1]-complete [6]. Informally, W[1]- membership means that there exists an algorithm that, given a graph G and a parameter k, produces in time bounded by f(k) G α a constant-depth decision circuit C having just one large gate on every input output path, and such that C accepts an input vector x of weight k if and only if x encodes an independent set of G. W[1]-hardness implies that all parameterized problems in W[1] reduce to INDEPENDENT SET;since there are many problems in W[1] for which no FPT

3 M. Cesati / Information Processing Letters 81 (2002) algorithm is known, it is very unlikely that INDEPEN- DENT SET is fixed parameter tractable The PERFECT CODE problem A perfect code in a graph G = (V, E) is a subset of vertices V such that for each vertex v V,the subset V includes exactly one element of the closed neighborhood N[v] of v, that is, exactly one element among v and all vertices adjacent to v. Formally: PERFECT CODE Instance: AgraphG = (V, E); a positive integer k N. Question: Does G have a k-element perfect code? A perfect code is a set of vertices V V with the property that for each vertex v V there is precisely one vertex in N[v] V. Downey and Fellows proved that the PERFECT CODE problem is W[1]-hard by means of a reduction from INDEPENDENT SET [6]. Although PERFECT CODE may be easily placed in W[2] (see [6]), until now there was no evidence that it belongs to W[1]. Downey and Fellows conjectured that the problem could be of difficulty intermediate between W[1] and W[2], and thus not W[1]-complete [8, pp. 277, 458, 487]. The following theorem is the main result of this paper. Theorem 1. The PERFECT CODE problem belongs to W[1]. Proof. We show a parameterized reduction from PER- FECT CODE to the following problem: SHORT NONDETERMINISTIC TURING MACHINE COMPUTATION Instance: A single-tape, single-head nondeterministic Turing machine M; awordx on the alphabet of M; a positive integer k N. 2 Moreover, Downey and Fellows proved that if INDEPENDENT SET is fixed parameter tractable, then 3-CNF SATISFIABILITY belongs to DTIME(2 o(n) ),wheren denotes the number of variables in the Boolean formula [8]. Question: Is there a computation of M on input x that reaches a final accepting state in at most k steps? Since SHORT NONDETERMINISTIC TURING MA- CHINE COMPUTATION is W[1]-complete [9,2], thereduction proves that PERFECT CODE belongs to W[1]. Given a graph G = (V, E) with n vertices and a positive integer k, let us construct a nondeterministic Turing machine T = (Σ,Q,,,q A ),whereσ includes the alphabet symbols Σ ={ } {σ v : v V } {s i : i = 1,...,n}, Q contains the internal states Q ={q A,q R } {q i : i = 0,...,k} { q l v,qv r : v V } { qj s : j = 1,...,n}, is the blank symbol, and q A is the final accepting state. (Notice that both the alphabet size Σ and the state set size Q depend on n, hence the Turing machine behavior cannot be predicted with an FPTalgorithm unless W[1]=FPT [4].) When the Turing machine starts, the internal state is q 0 and all tape cells contain the blank symbol ( ). The machine operates in three phases. Phase 1: Guess k vertices. The Turing machine chooses nondeterministically k vertices of G writing the corresponding symbols onto the tape. This is achieved by including the following instructions in the transition table :,q i,σ v,q i+1, +1 ( ) i {0,...,k 2}, v V,,q k 1,σ v,q k, 0 ( v V). (Each instruction specifies, in order, the symbol scanned under the head, the internal state of the machine, the new symbol written by the head, the new internal state, and the movement of the head: 1 forleft,+1 for right, and 0 for no move.) Phase 2: Check that the k vertices are perfect. The Turing machine scans the guessed vertices and rejects as soon as it finds two vertices that violate one of the following conditions: For every pair of guessed vertices x and y, x and y are different. For every pair of guessed vertices x and y, x and y are not adjacent.

4 166 M. Cesati / Information Processing Letters 81 (2002) For every pair of guessed vertices x and y, thereis no vertex z V that is adjacent to both x and y. Moreover, in this phase each symbol σ v is replaced by the symbol s m,wherem represents the size of the neighborhood N[v] of v. This is achieved by including the following instructions into the transition table : σv,q k,σ v,q l v, 1 ( v V), σw,q l v,σ w,q, 1 ( v,w V), where q R if v = w, q R if (v, w) E, q = q R if z V such that (v, z) E and (w, z) E, otherwise, q l v,q l v,,q r v, +1 ( v V), σw,q r v,σ w,q r v, +1 ( v,w V,v w), σv,q r v,s m,q k, 1 ( v V), where m = N[v],,q k,,q k, +1. Phase 3: Taking the sum. The tape now contains exactly k symbols s i ; each of them represents the neighborhood size of a guessed vertex. The Turing machine must accept if and only if the sum of all neighborhood sizes is equal to n. In fact, the checks in Phase 2 grant that no vertex in G belongs to the neighborhood of two different guessed vertices. In other words, the guessed vertices cover non-overlapping subsets of V.Therefore, the sum cannot be greater than n; moreover,if the sum is equal to n, all vertices in G are dominated by the guessed k-element subset of V. The following instructions in computethe sum: si,q k,s i,q s i, +1 ( i {1,...,n} ) sj,q s i,s j,q s t, +1 ( i, j {1,...,n},i+ j n ), where t = i + j,,q s n,,q A, 0,,q s j,,q R, 0 ( j {1,...,n 1} ). It is straightforward to verify that the Turing machine T includes (5/2)n 2 +(k +7/2)n+1instructions, that it can be derived in polynomial time in the size of G, and that it accepts in k 2 + 4k + 2 steps if and only if there exists a perfect code of size k in G. 4. WEIGHTED EXACT CNF SATISFIABILITY The theoretical framework of parameterized computational complexity offers several results that are the analogs of fundamental results in classical computational complexity. In particular, the parameterized analog of the Cook s Theorem is based on the following problem: WEIGHTED t-normalized SATISFIABILITY Instance: A Boolean t-normalized expression E; a positive integer k N. Question: Does E have a satisfying truth assignment of Hamming weight k? Given t 2, E is t-normalized if it is of the form product-of-sums-of-products... of literals with t 1 alternations (that is, t occurrences of products and sums ). Thus, a 2-normalized expression is in conjunctive normal form. The Hamming weight of a truth assignment is the number of variables set to true. Downey and Fellows established [5] that WEIGHTED t-normalized SATISFIABILITY is W[t]-complete, for any t 2. The case t = 1 must be handled separately. In [6] Downey and Fellows proved that the class W[1] can be characterized as the closure under fixed parameter reductions of the WEIGHTED q-cnf SATISFIABILITY problem: the instance is restricted to Boolean expressions in conjunctive normal form and each clause has no more than q literals, where q is a fixed constant. We can now establish another analog of the Cook s Theorem for the class W[1]. In fact, PERFECT CODE is equivalent to the following parameterized version of the SATISFIABILITY problem: WEIGHTED EXACT CNF SATISFIABILITY Instance: A Boolean expression E in conjunctive normal form; a positive integer k N.

5 M. Cesati / Information Processing Letters 81 (2002) Question: Is there a truth assignment of Hamming weight k to the variables of E that makes exactly one literal in each clause of E true? Downey and Fellows showed that PERFECT CODE reduces to WEIGHTED EXACT CNF SATISFIABILI- TY, and vice versa [6,8]. As an immediate consequence of Theorem 1 we have the following: Corollary 1. The WEIGHTED EXACT CNF SATISFI- ABILITY problem is W[1]-complete. 5. Conclusions In this paper we have shown that PERFECT CODE belongs to W[1]; as an easy corollary, we also established a new analog of the Cook s Theorem for the class W[1]. In general, it seems fruitful to think in terms of Turing machine computations when trying to establish membership in W[1]. In order to prove that a parameterized problem A belongs to W[1], wealways pick (more or less randomly) a problem B W[1] and we try to show that A reduces to B. However,it could be very difficult to devise such a reduction, because problems A and B can be very different; thus, even if the reduction exists, it could be very complicated. This is quite different from what we do in classical computational complexity, where usually we just show that a suitable model of Turing machine (for instance, a polynomial-time nondeterministic Turing machine) is able to decide an instance of our problem. Apparently, the proof technique of Theorem 1 is the usual way to show membership in a W-class: a reduction from our candidate problem to a target problem already placed in W[1]. However, we recognize an important difference: the target problem is formulated in terms of a general-purpose Turing machine computation: to show W[1]-membership of PERFECT CODE we devised a single-tape, single-head nondeterministic Turing machine that guesses and verifies a candidate perfect code with a short computation. This is exactly the same as what we would have done to show that a problem belongs to NP: devise a nondeterministic Turing machine that guesses and verifies a candidate solution in polynomial time. To be fair, other reductions to the SHORT NON- DETERMINISTIC TURING MACHINE COMPUTATION problem have already been used (see for instance [2]). However, we suggest that devising a reduction to this particular problem should be the very first technique to consider when trying to show membership in W[1]. In fact, we believe that if the reduction exists, then it is usually simple, thanks to the computational power offered by the nondeterministic Turing machine model. For example, a simple reduction for the INDEPEN- DENT SET problem consists of a single-tape nondeterministic Turing machine that guesses a k-element subset of vertices and then checks that there is no edge between the guessed vertices. (The instructions of such Turing machine are a subset of the instructions of the Turing machine shown in this paper.) Thinking in terms of Turing machines may also be useful when establishing W[2]-membership. In fact, the SHORT NONDETERMINISTIC TURING MACHINE COMPUTATION problem extended to multi-tape machines is W[2]-complete [3,4,7]. Therefore, in order to prove that some problem belongs to W[2], we can simply try to solve it with a multi-tape nondeterministic Turing machine. This technique allowed us to close a long-standing open question by establishing W[2]-membership for a parameterized version of the STEINER TREE problem [3,1]. References [1] H.L. Bodlaender, D. Kratsch, A note on fixed parameter intractability of some domination-related problems, Private communication, April [2] L. Cai, J. Chen, R.G. Downey, M.R. Fellows, On the parameterized complexity of short computation and factorization, Arch. Math. Logic 36 (4 5) (1997) [3] M. Cesati, The Turing way to the parameterized intractability, in: Workshop on Parameterized Complexity, Chennai, India, December 7 9, [4] M. Cesati, M. Di Ianni, Computation models for parameterized complexity, Math. Logic Quarterly 43 (1997) [5] R.G. Downey, M.R. Fellows, Fixed-parameter tractability and completeness. I. Basic results, SIAM J. Comput. 24 (4) (1995) [6] R.G. Downey, M.R. Fellows, Fixed-parameter tractability and completeness. II. On completeness for W[1], Theoret. Comput. Sci. 141 (1 2) (1995) [7] R.G. Downey, M.R. Fellows, Threshold dominating set and an improved characterization of W[2], Theoret. Comput. Sci. 209 (1 2) (1998)

6 168 M. Cesati / Information Processing Letters 81 (2002) [8] R.G. Downey, M.R. Fellows, Parameterized Complexity, 1st edn., Monographs in Computer Science, Springer, New York, [9] R.G. Downey, M.R. Fellows, B. Kapron, M.T. Hallett, H.T. Wareham, Parameterized complexity of some problems in logic and linguistics (extended abstract), in: Proc. 2nd Workshop on Structural Complexity and Recursion-theoretic Methods in Logic Programming, 1993, Lecture Notes in Comput. Sci., Vol. 813, Springer, Berlin, 1994, pp

The Parameterized Complexity of Short Computation and Factorization

The Parameterized Complexity of Short Computation and Factorization The Parameterized Complexity of Short Computation and Factorization Liming Cai and Jianer Chen Department of Computer Science, Texas A & M University College Station, Texas 77843 U.S.A. Rodney G. Downey

More information

Lecture 7: NP-Complete Problems

Lecture 7: NP-Complete Problems IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit

More information

On the Relationship between Classes P and NP

On the Relationship between Classes P and NP Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,

More information

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms

Page 1. CSCE 310J Data Structures & Algorithms. CSCE 310J Data Structures & Algorithms. P, NP, and NP-Complete. Polynomial-Time Algorithms CSCE 310J Data Structures & Algorithms P, NP, and NP-Complete Dr. Steve Goddard goddard@cse.unl.edu CSCE 310J Data Structures & Algorithms Giving credit where credit is due:» Most of the lecture notes

More information

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification) Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:

More information

NP-Completeness and Cook s Theorem

NP-Completeness and Cook s Theorem NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:

More information

Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding

More information

How To Solve A K Path In Time (K)

How To Solve A K Path In Time (K) What s next? Reductions other than kernelization Dániel Marx Humboldt-Universität zu Berlin (with help from Fedor Fomin, Daniel Lokshtanov and Saket Saurabh) WorKer 2010: Workshop on Kernelization Nov

More information

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics NP-complete? NP-hard? Some Foundations of Complexity Prof. Sven Hartmann Clausthal University of Technology Department of Informatics Tractability of Problems Some problems are undecidable: no computer

More information

CSC 373: Algorithm Design and Analysis Lecture 16

CSC 373: Algorithm Design and Analysis Lecture 16 CSC 373: Algorithm Design and Analysis Lecture 16 Allan Borodin February 25, 2013 Some materials are from Stephen Cook s IIT talk and Keven Wayne s slides. 1 / 17 Announcements and Outline Announcements

More information

The Classes P and NP

The Classes P and NP The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the

More information

Invitation to Fixed-Parameter Algorithms

Invitation to Fixed-Parameter Algorithms Rolf Niedermeier Invitation to Fixed-Parameter Algorithms October 23, 2002 Preface This work is based on my occupation with parameterized complexity and fixed-parameter algorithms which began more than

More information

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012

OHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012 276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the

More information

1 Definitions. Supplementary Material for: Digraphs. Concept graphs

1 Definitions. Supplementary Material for: Digraphs. Concept graphs Supplementary Material for: van Rooij, I., Evans, P., Müller, M., Gedge, J. & Wareham, T. (2008). Identifying Sources of Intractability in Cognitive Models: An Illustration using Analogical Structure Mapping.

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information

Chapter. NP-Completeness. Contents

Chapter. NP-Completeness. Contents Chapter 13 NP-Completeness Contents 13.1 P and NP......................... 593 13.1.1 Defining the Complexity Classes P and NP...594 13.1.2 Some Interesting Problems in NP.......... 597 13.2 NP-Completeness....................

More information

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover

Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt

More information

A Working Knowledge of Computational Complexity for an Optimizer

A Working Knowledge of Computational Complexity for an Optimizer A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational

More information

CAD Algorithms. P and NP

CAD Algorithms. P and NP CAD Algorithms The Classes P and NP Mohammad Tehranipoor ECE Department 6 September 2010 1 P and NP P and NP are two families of problems. P is a class which contains all of the problems we solve using

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

Theoretical Computer Science (Bridging Course) Complexity

Theoretical Computer Science (Bridging Course) Complexity Theoretical Computer Science (Bridging Course) Complexity Gian Diego Tipaldi A scenario You are a programmer working for a logistics company Your boss asks you to implement a program that optimizes the

More information

Satisfiability and Resiliency in Workflow Systems

Satisfiability and Resiliency in Workflow Systems Satisfiability and Resiliency in Workflow Systems Qihua Wang Ninghui Li Center for Education and Research in Information Assurance and Security and Department of Computer Science Purdue University Abstract.

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

NP-Completeness I. Lecture 19. 19.1 Overview. 19.2 Introduction: Reduction and Expressiveness

NP-Completeness I. Lecture 19. 19.1 Overview. 19.2 Introduction: Reduction and Expressiveness Lecture 19 NP-Completeness I 19.1 Overview In the past few lectures we have looked at increasingly more expressive problems that we were able to solve using efficient algorithms. In this lecture we introduce

More information

Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles

Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Short Cycles make W-hard problems hard: FPT algorithms for W-hard Problems in Graphs with no short Cycles Venkatesh Raman and Saket Saurabh The Institute of Mathematical Sciences, Chennai 600 113. {vraman

More information

P versus NP, and More

P versus NP, and More 1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify

More information

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits

Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique

More information

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis

MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,

More information

Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU

Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Birgit Vogtenhuber Institute for Software Technology email: bvogt@ist.tugraz.at office hour: Tuesday 10:30 11:30 slides: http://www.ist.tugraz.at/pact.html

More information

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

SIMS 255 Foundations of Software Design. Complexity and NP-completeness SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

Offline 1-Minesweeper is NP-complete

Offline 1-Minesweeper is NP-complete Offline 1-Minesweeper is NP-complete James D. Fix Brandon McPhail May 24 Abstract We use Minesweeper to illustrate NP-completeness proofs, arguments that establish the hardness of solving certain problems.

More information

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.

Diagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Background One basic goal in complexity theory is to separate interesting complexity

More information

Complexity Classes P and NP

Complexity Classes P and NP Complexity Classes P and NP MATH 3220 Supplemental Presentation by John Aleshunas The cure for boredom is curiosity. There is no cure for curiosity Dorothy Parker Computational Complexity Theory In computer

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

Tutorial 8. NP-Complete Problems

Tutorial 8. NP-Complete Problems Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem

More information

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

NP-Completeness. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University NP-Completeness CptS 223 Advanced Data Structures Larry Holder School of Electrical Engineering and Computer Science Washington State University 1 Hard Graph Problems Hard means no known solutions with

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

1 The Line vs Point Test

1 The Line vs Point Test 6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

1 Definition of a Turing machine

1 Definition of a Turing machine Introduction to Algorithms Notes on Turing Machines CS 4820, Spring 2012 April 2-16, 2012 1 Definition of a Turing machine Turing machines are an abstract model of computation. They provide a precise,

More information

Introduction to computer science

Introduction to computer science Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.

More information

Chapter 1. NP Completeness I. 1.1. Introduction. By Sariel Har-Peled, December 30, 2014 1 Version: 1.05

Chapter 1. NP Completeness I. 1.1. Introduction. By Sariel Har-Peled, December 30, 2014 1 Version: 1.05 Chapter 1 NP Completeness I By Sariel Har-Peled, December 30, 2014 1 Version: 1.05 "Then you must begin a reading program immediately so that you man understand the crises of our age," Ignatius said solemnly.

More information

Cycle transversals in bounded degree graphs

Cycle transversals in bounded degree graphs Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.

More information

Notes on NP Completeness

Notes on NP Completeness Notes on NP Completeness Rich Schwartz November 10, 2013 1 Overview Here are some notes which I wrote to try to understand what NP completeness means. Most of these notes are taken from Appendix B in Douglas

More information

Introduction to Algorithms. Part 3: P, NP Hard Problems

Introduction to Algorithms. Part 3: P, NP Hard Problems Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter

More information

6.080/6.089 GITCS Feb 12, 2008. Lecture 3

6.080/6.089 GITCS Feb 12, 2008. Lecture 3 6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

Bounded-width QBF is PSPACE-complete

Bounded-width QBF is PSPACE-complete Bounded-width QBF is PSPACE-complete Albert Atserias 1 and Sergi Oliva 2 1 Universitat Politècnica de Catalunya Barcelona, Spain atserias@lsi.upc.edu 2 Universitat Politècnica de Catalunya Barcelona, Spain

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi

Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the

More information

Turing Machines: An Introduction

Turing Machines: An Introduction CIT 596 Theory of Computation 1 We have seen several abstract models of computing devices: Deterministic Finite Automata, Nondeterministic Finite Automata, Nondeterministic Finite Automata with ɛ-transitions,

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

GRAPH THEORY LECTURE 4: TREES

GRAPH THEORY LECTURE 4: TREES GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection

More information

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA

Nan Kong, Andrew J. Schaefer. Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA A Factor 1 2 Approximation Algorithm for Two-Stage Stochastic Matching Problems Nan Kong, Andrew J. Schaefer Department of Industrial Engineering, Univeristy of Pittsburgh, PA 15261, USA Abstract We introduce

More information

Guessing Game: NP-Complete?

Guessing Game: NP-Complete? Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Product irregularity strength of certain graphs

Product irregularity strength of certain graphs Also available at http://amc.imfm.si ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 7 (014) 3 9 Product irregularity strength of certain graphs Marcin Anholcer

More information

898 BOOK REVIEWS MICHAEL P. DRAZIN. irrespective of the statements in The New York Times, November 7, 1979, p. 1.

898 BOOK REVIEWS MICHAEL P. DRAZIN. irrespective of the statements in The New York Times, November 7, 1979, p. 1. 898 BOOK REVIEWS linear algebra texts; it would have been well worth taking space to develop this theme at some length. To summarize, after its renaissance in the 1950s, GI theory passed through its infancy

More information

CMPSCI611: Approximating MAX-CUT Lecture 20

CMPSCI611: Approximating MAX-CUT Lecture 20 CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to

More information

Cloud Computing is NP-Complete

Cloud Computing is NP-Complete Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J.

ARTICLE IN PRESS. European Journal of Operational Research xxx (2004) xxx xxx. Discrete Optimization. Nan Kong, Andrew J. A factor 1 European Journal of Operational Research xxx (00) xxx xxx Discrete Optimization approximation algorithm for two-stage stochastic matching problems Nan Kong, Andrew J. Schaefer * Department of

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

The Halting Problem is Undecidable

The Halting Problem is Undecidable 185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine

More information

3515ICT Theory of Computation Turing Machines

3515ICT Theory of Computation Turing Machines Griffith University 3515ICT Theory of Computation Turing Machines (Based loosely on slides by Harald Søndergaard of The University of Melbourne) 9-0 Overview Turing machines: a general model of computation

More information

On the independence number of graphs with maximum degree 3

On the independence number of graphs with maximum degree 3 On the independence number of graphs with maximum degree 3 Iyad A. Kanj Fenghui Zhang Abstract Let G be an undirected graph with maximum degree at most 3 such that G does not contain any of the three graphs

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Lecture 2: Universality

Lecture 2: Universality CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal

More information

Universality in the theory of algorithms and computer science

Universality in the theory of algorithms and computer science Universality in the theory of algorithms and computer science Alexander Shen Computational models The notion of computable function was introduced in 1930ies. Simplifying (a rather interesting and puzzling)

More information

Problem Set 7 Solutions

Problem Set 7 Solutions 8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in

More information

Introduction to Automata Theory. Reading: Chapter 1

Introduction to Automata Theory. Reading: Chapter 1 Introduction to Automata Theory Reading: Chapter 1 1 What is Automata Theory? Study of abstract computing devices, or machines Automaton = an abstract computing device Note: A device need not even be a

More information

The Complexity of Degree Anonymization by Vertex Addition

The Complexity of Degree Anonymization by Vertex Addition The Complexity of Degree Anonymization by Vertex Addition Robert Bredereck, Vincent Froese, Sepp Hartung, André Nichterlein, Rolf Niedermeier, and Nimrod Talmon Institut für Softwaretechnik und Theoretische

More information

On the Unique Games Conjecture

On the Unique Games Conjecture On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary

More information

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement

More information

Properties of Stabilizing Computations

Properties of Stabilizing Computations Theory and Applications of Mathematics & Computer Science 5 (1) (2015) 71 93 Properties of Stabilizing Computations Mark Burgin a a University of California, Los Angeles 405 Hilgard Ave. Los Angeles, CA

More information

NP-completeness and the real world. NP completeness. NP-completeness and the real world (2) NP-completeness and the real world

NP-completeness and the real world. NP completeness. NP-completeness and the real world (2) NP-completeness and the real world -completeness and the real world completeness Course Discrete Biological Models (Modelli Biologici Discreti) Zsuzsanna Lipták Imagine you are working for a biotech company. One day your boss calls you

More information

Types of Degrees in Bipolar Fuzzy Graphs

Types of Degrees in Bipolar Fuzzy Graphs pplied Mathematical Sciences, Vol. 7, 2013, no. 98, 4857-4866 HIKRI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.37389 Types of Degrees in Bipolar Fuzzy Graphs Basheer hamed Mohideen Department

More information

Faster Fixed Parameter Tractable Algorithms for Finding Feedback Vertex Sets

Faster Fixed Parameter Tractable Algorithms for Finding Feedback Vertex Sets Faster Fixed Parameter Tractable Algorithms for Finding Feedback Vertex Sets VENKATESH RAMAN, SAKET SAURABH, AND C. R. SUBRAMANIAN The Institute of Mathematical Sciences Abstract. A feedback vertex set

More information

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu

ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a

More information

One last point: we started off this book by introducing another famously hard search problem:

One last point: we started off this book by introducing another famously hard search problem: S. Dasgupta, C.H. Papadimitriou, and U.V. Vazirani 261 Factoring One last point: we started off this book by introducing another famously hard search problem: FACTORING, the task of finding all prime factors

More information

Bounded Treewidth in Knowledge Representation and Reasoning 1

Bounded Treewidth in Knowledge Representation and Reasoning 1 Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.

More information

Connectivity and cuts

Connectivity and cuts Math 104, Graph Theory February 19, 2013 Measure of connectivity How connected are each of these graphs? > increasing connectivity > I G 1 is a tree, so it is a connected graph w/minimum # of edges. Every

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Lecture 22: November 10

Lecture 22: November 10 CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny

More information

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. 3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

How To Solve A Minimum Set Covering Problem (Mcp)

How To Solve A Minimum Set Covering Problem (Mcp) Measuring Rationality with the Minimum Cost of Revealed Preference Violations Mark Dean and Daniel Martin Online Appendices - Not for Publication 1 1 Algorithm for Solving the MASP In this online appendix

More information

The Classes P and NP. mohamed@elwakil.net

The Classes P and NP. mohamed@elwakil.net Intractable Problems The Classes P and NP Mohamed M. El Wakil mohamed@elwakil.net 1 Agenda 1. What is a problem? 2. Decidable or not? 3. The P class 4. The NP Class 5. TheNP Complete class 2 What is a

More information

Lecture 16 : Relations and Functions DRAFT

Lecture 16 : Relations and Functions DRAFT CS/Math 240: Introduction to Discrete Mathematics 3/29/2011 Lecture 16 : Relations and Functions Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT In Lecture 3, we described a correspondence

More information

CS 3719 (Theory of Computation and Algorithms) Lecture 4

CS 3719 (Theory of Computation and Algorithms) Lecture 4 CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Goal: A general theory of the resources needed to solve computational problems What types of resources? Time What types of computational problems? decision problem Decision

More information

On the Dimensionality of Voting Games

On the Dimensionality of Voting Games Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008) On the Dimensionality of Voting Games Edith Elkind Electronics & Computer Science University of Southampton Southampton

More information

CS154. Turing Machines. Turing Machine. Turing Machines versus DFAs FINITE STATE CONTROL AI N P U T INFINITE TAPE. read write move.

CS154. Turing Machines. Turing Machine. Turing Machines versus DFAs FINITE STATE CONTROL AI N P U T INFINITE TAPE. read write move. CS54 Turing Machines Turing Machine q 0 AI N P U T IN TAPE read write move read write move Language = {0} q This Turing machine recognizes the language {0} Turing Machines versus DFAs TM can both write

More information

Asymptotically Faster Algorithms for the Parameterized face cover Problem

Asymptotically Faster Algorithms for the Parameterized face cover Problem Asymptotically Faster Algorithms for the Parameterized face cover Problem Faisal N. Abu-Khzam 1, Henning Fernau 2 and Michael A. Langston 3 1 Division of Computer Science and Mathematics, Lebanese American

More information