System BV is NP-complete
|
|
|
- Hugo Carroll
- 10 years ago
- Views:
Transcription
1 System BV is NP-complete Ozan Kahramanoğulları 1,2 Computer Science Institute, University of Leipzig International Center for Computational Logic, TU Dresden Abstract System BV is an extension of multiplicative linear logic (MLL) with the rules mix, nullary mix, and a self-dual, non-commutative logical operator, called seq. While the rules mix and nullary mix extend the deductive system, the operator seq extends the language of MLL. Due to the operator seq, system BV extends the applications of MLL to those where sequential composition is crucial, e.g., concurrency theory. System FBV is an extension of MLL with the rules mix and nullary mix. In this paper, by relying on the fact that system BV is a conservative extension of system FBV, I show that system BV is NP-complete by encoding the 3-Partition problem in FBV. I provide a simple completeness proof of this encoding by resorting to a novel proof theoretical method for reducing the nondeterminism in proof search, which is also of independent interest. 1 Introduction Since its emergence, the multiplicative fragment of linear logic [5] remained in focus of researchers due to its resource conscious features that capture properties of concurrent computation (see, e.g., [1]). Max Kanovich showed in [8,9] that multiplicative linear logic (MLL) is NP-complete. In [10], Lincoln and Winkler show that constant-only fragment of MLL is also NP-complete. However, from the point of view of applications, multiplicative linear logic lacks a natural notion of sequentiality, which is crucial for expressing many computational phenomena, e.g., sequential composition of processes in concurrency theory. In [6], Guglielmi introduced a system, called BV, which is an extension of MLL with the rules mix, nullary mix (mix0), and a self-dual, noncommutative logical operator, called seq. While the rules mix and mix0 extend 1 This work has been supported by the DFG Graduierten-kolleg 446, and accomplished during my stay at the International Center for Computational Logic as a visiting researcher. I would like to thank Alessio Guglielmi, Lutz Straßburger, and Alwen Tiu for valuable remarks and improvements. 2 [email protected] This is a preliminary version. The final version will be published in Electronic Notes in Theoretical Computer Science URL:
2 MLL (NP-complete, [8,10]) + mix + mix0 FBV (NP-complete, Corollary 6.2) + seq: self-dual, noncommutative operator BV (NP-complete, Theorem 6.1) + exponentials!,? + exponentials!,? MELL + mix + mix0 + seq: self-dual, noncommutative operator NEL (undecidable, [15]) Fig. 1. The relationship between MLL, FBV, BV, MELL and NEL the deductive system, the operator seq extends the language of MLL. This logic captures sequential and parallel composition of process algebra naturally by means of logical operators. In particular, Bruscoli showed, in [3], that there is a strict correspondence between a fragment of the process algebra CCS [11] and system BV. System BV can not be designed in any standard sequent calculus, as it was shown by Tiu in [16]: in the sequent calculus, during bottom-up proof search, inference rules are applied at the main connective; however, in order to get all the provable formula of system BV by means of a deductive system, a notion of deep rewriting is necessary. System BV is designed in the proof theoretical framework, the calculus of structures [6], which allows for such deep rewriting. In the calculus of structures, the notion of main connective disappears and the notions of formula and sequent of the sequent calculus are replaced with the notion of structure. The inference rules can be applied deep inside structures, resulting in one of the distinguishing features of this formalism, that is, deep inference. In several other related work (see, e.g., [2,14]), deep inference gives rise to many interesting proof theoretical properties of other logics, that are not observable within the sequent calculus presentation of these logics. Extending multiplicative linear logic with a self-dual, noncommutative operator was also considered in Retoré s pomset logic [12]. In [13], Retoré gives proof nets for the pomset logic, but so far there is no sequent calculus system for pomset logic with the cut-elimination property. In fact, Guglielmi conjectured, in [6], that pomset logic and system BV are equivalent. In [7], Guglielmi and Straßburger introduced a system, called NEL, which extends system BV with the exponentials of linear logic. In other words, system NEL is an extension of multiplicative exponential linear logic (MELL) with the rules mix, mix0, and the self-dual, noncommutative logical operator seq. Although it is unknown if multiplicative exponential linear logic is decidable or not, in [15], Straßburger showed that system NEL is undecidable. However, the complexity of the decision problem in system BV remained an open problem. In this paper, by encoding the 3-Partition problem [4] in multiplicative linear logic extended by the rules mix and mix0, i.e., system FBV, I show the NP-hardness of this logic. This result implies the NP-hardness of system BV, since system BV is a conservative extension of system FBV (MLL+mix+mix0): 2
3 every provable BV structure, which does not contain any seq structure, is also provable in FBV. Figure 1 summarizes the relationship between MLL, FBV, BV, MELL and NEL, and the contribution of this paper. Although the encoding in the sequent calculus, which was used in [8] for showing the NP-hardness of MLL, can be used to show the NP-hardness of MLL + mix + mix0, in this paper, I provide a simpler encoding and an easier proof, within the calculus of structures, by means of an analysis of the proof theory of this logic: in contrast to sequent calculus, while applying the inference rules in bottom-up proof search, deep applicability of the inference rules in the calculus of structures introduces a greater nondeterminism. I introduce a novel technique for controlling the nondeterminism in proof search, which is also of independent interest from the point of view of applications: despite the combinatoric explosion in the applicability of the inference rules in the calculus of structures, my method reduces the nondeterminism in proof search without damaging the completeness of the system. This way, it becomes possible to separate the redundant nondeterminism, in my encoding, from the concise nondeterminism, and prove the completeness of the encoding without going into incomprehensible and complicated case analysis. The rest of the paper is organized as follows: after introducing the calculus of structures and system BV in the next section, I present a method for controlling the nondeterminism in proof search in multiplicative linear logic extended by the rules mix and mix0, i.e., system FBV. I then present an encoding of the 3-partition problem in FBV, which is an NP-complete problem. Following this, by showing that the length of a proof in BV is bounded by a polynomial in the size of the structure being proved, I show that system BV is NP-complete. 2 The Calculus of Structures and System BV This section re-collects some notions and definitions of the calculus of structures and system BV, following [6]. In the language of BV atoms are denoted by a, b, c,... Structures are denoted by R, S, T,... and generated by S ::= a S;... ; S [ S,..., S ] ( S,..., S ) S, >0 >0 >0 where, the unit, is not an atom. S;... ; S is called a seq structure, [S,..., S] is called a par structure, and (S,..., S) is called a copar structure, S is the negation of the structure S. Structures are considered equivalent modulo the relation, which is the smallest congruence relation induced by the equalities shown in Figure 2. There R, T and U stand for finite, non-empty sequence of structures. A structure context, denoted as in S{ }, is a structure with a hole that does not appear in the scope of negation. The structure R is a substructure of S{R} and S{ } is its context. Context braces are omitted if no 3
4 Associativity Commutativity R; T ; U R; T ; U [ R, T ] [ T, R] [ R, [ T ]] [ R, T ] ( R, T ) ( T, R) ( R, ( T )) ( R, T ) Units Context Closure ; R R; R if R = T then S{R} = S{T } [, R] [ R] and R = T (, R) ( R) Negation R; T R; T [R, T ] (R, T ) (R, T ) [R, T ] R R Singleton R [R] (R) R Fig. 2. Equivalence relations underlying BV. ambiguity is possible: for instance S[R, T ] stands for S{[R, T ]}. A structure, or a structure context, is in normal form when the only negated structures appearing in it are atoms, no unit appears in it. We will call the BV structures, which do not involve seq structures, FBV structures. There is a straightforward correspondence between FBV structures and formulae of multiplicative linear logic (MLL), which do not contain the units 1 and. For example [(a, b), c, d] corresponds to ( (a b) c d ), and vice versa. Units 1 and are mapped into, since 1, when the rules mix and mix0 are added to MLL. Φ Ψ mix Φ, Ψ mix0 For a more detailed discussion on the proof theory of BV and the precise relation between BV and MLL, the reader is referred to [6]. In the calculus of structures, an inference rule is a scheme of the kind T ρ R, where ρ is the name of the rule, T is its premise and R is its conclusion. A typical (deep) inference rule has the shape S{T } ρ S{R} and specifies the implication T R inside a generic context S{ }, which is the implication being modeled in the system 3. When premise and conclusion in an instance of an inference rule are equivalent, that instance is trivial, otherwise it is non-trivial. An inference rule is called an axiom if its premise is empty. Rules with empty contexts correspond to the case of the sequent calculus. 3 Due to duality between T R and R T, rules come in pairs of dual rules: a downversion and an up-version. For instance, the dual of the ai rule in Figure 3 is the cut rule. In this paper, only the down rules, which provide a sound and complete system are considered. 4
5 S{ } ai S[a, ā] S([R, T ], U) s S[(R, U), T ] S [R, U ]; [T, V ] q S[ R; T, U; V ] Fig. 3. System BV A (formal) system S is a set of inference rules. A derivation in a certain formal system is a finite chain of instances of inference rules in the system. A derivation can consist of just one structure. The topmost structure in a derivation, if present, is called the premise of the derivation, and the bottommost structure is called its conclusion. A derivation whose premise is T, conclusion is R, and inference rules are in S will be written as T S. R Similarly, Π S R will denote a proof Π, which is a finite derivation, whose topmost inference rule is an axiom. The length of a derivation (proof) is the number of instances of inference rules appearing in it. Two systems S and S are equivalent if for every proof of a structure T in system S, there exists a proof of T in system S, and vice versa. The system {, ai, s, q }, shown in Figure 3, is denoted by BV, and called basic system V. The rules of the system are called unit ( ), atomic interaction (ai ), switch (s) and seq (q ). The multiplicative linear logic system extended by mix and mix0, or system {, ai, s}, is denoted by FBV. 3 Preliminaries In a proof search episode, the inference rules can be applied to a structure, nondeterministically, in many different ways, but only few of these rule instances can provide a proof. While providing a rich combinatorial analysis of the logic being studied, applicability of the inference rules at any depth causes an even greater nondeterminism. However, the mutual dependencies between atoms, which are easily observable due to the notion of structure, provides ways of controlling the nondeterminism without breaking the proof theoretical properties. In this section, I present a system equivalent to system FBV, where the nondeterminism in proof search is reduced by taking these mutual dependencies between dual atoms into consideration. Definition 3.1 Given a structure S, the notation at S indicates the set of all the atoms appearing in S. Let interaction switch be the rule S([R, T ], U) is S[(R, U), T ], where at T at R. Let system FBV with interaction switch, or system 5
6 be the system {, ai, is }. Lemma 3.2 For any FBV structures R, U and T, if [R, U ] has a proof in T, then there is a derivation. [(R, T ), U ] Proof. If at R at U, then trivial. Otherwise R and U must have separate proofs. Theorem 3.3 (Shallow Splitting for ) For all structures R, T and P, if [(R, T ), P ] is provable in then there exists P 1, P 2 and [P 1, P 2 ] such that [R, P 1 ] and [T, P 2 ] are provable in. P Proof. (Sketch) Proof by induction with Lemma 3.2. Take the induction measure (m, n) where m = [(R, T ), P ] and n is the length of the proof Π of [(R, T ), P ]. Single out the bottom most rule application ρ in Π. Apply the induction argument to ρ, similar to the proof of the splitting theorem for BV in [6]. The following are the non-trivial cases for ρ: ρ = is such that R = (R, R ), T = (T, T ), P = (P, P ) and [([(R, T ), P ], R, T ), P ] is. [(R, R, T, T ), P, P ] ρ = is such that P = [(P, P ), U, U ] and [([(R, T ), P, U ], P ), U ] is. [(R, T ), (P, P ), U, U ] Theorem 3.4 (Context Reduction for ) For all structures R and for all contexts S{ } such that S{R} is provable in, there exists a structure U such that for all structures X there exist derivations: [X, U ] S{X} and [R, U ]. Proof. (Sketch) By induction on the size of S{ } with Theorem 3.3 and Lemma 3.2, similar to the proof of context reduction for BV in [6]. Theorem 3.5 System FBV and are equivalent. Proof. Observe that every proof in is also a proof in FBV. For the other direction, single out the upper-most instance of the switch rule in the FBV 6
7 proof, which is not an instance of the interaction switch rule: S([R, U ], T ) s S[(R, T ), U ] From Theorem 3.4, we have [{ }, V ] S{ } such that [([R, U ], T ), V ]. Then, from Theorem 3.3, we have [K 1, K 2 ] V ; [R, U, K 1 ] ; and Π [K 2, T ]. We can then construct the following proof [R, U, K 1 ] [(R, T ), U, K 1, K 2 ] [(R, T ), U, V ] S[(R, T ), U ] where is the derivation delivered by Lemma 3.2 with the proof Π. Repeat the above procedure inductively till all the instances of the switch rule, which are not instances of interaction switch rule, are removed. Splitting technique was originally introduced, in [6], to prove cut elimination for system BV. Because of the splitting technique used in the completeness argument above, from which cut elimination immediately follows, system remains clean from a proof theoretic point of view. Proposition 3.6 System BV is a conservative extension of system FBV, that is, if a structure R, not containing any seq structures, is provable in BV, then it is also provable in FBV. Proof. Let R be a BV structure that does not contain any seq structures. By induction on the length of the proof Π of R in BV, construct the proof Π of R in FBV. Since the only rule that involves seq structures is the rule q, it must be Π = Π. 7
8 4 BV is NP-hard In this section, I present an encoding of the 3-Partition Problem in system FBV to show the NP-hardness of this logic, and system BV. This problem was also used by Lincoln and Winkler, in [10], to show the NP-hardness of the constant only fragment of MLL. By providing a similar encoding, and resorting to the proof theory of system FBV, in the lines of Section 3, I provide a very simple correctness proof without going into a complicated case analysis. Problem 4.1 [4] (3-Partition) Given a set of A = {a 1, a 2,..., a 3m } of elements, a bound B Z +, and a size S(a) Z + for each a A such that 1 B < S(a) < 1B and 4 2 a A S(a) = Bm, does there exist a partition of A into m disjoint subsets A i so that a A i S(a) = B for each A i in the partition. The constraints on the S(a) imply that such a partition must have exactly three elements in each of its sets. This problem is NP-complete in the strong sense, which implies that even when the input is represented in unary, the problem is NP-hard. This property of 3-Partition is essential for my encoding, since I represent the input problem by using atoms. 4.1 Encoding the 3-Partition Problem in FBV Given an instance of 3-Partition equipped with a set A = {a 1, a 2,..., a 3m }, a unary function S, and a natural number B, presented as a tuple A, m, B, S, the encoding function θ is defined as θ( A, m, B, S ) = [(k, [ c,..., c S(a 1 ) ]),..., (k, [ c,..., c S(a 3m ) ]), ([ k, k, k, ( c,..., c )],..., [ k, k, k, ( c,..., c )])] m Lemma 4.2 Let S(a 1 ), S(a 2 ) and S(a 3 ) be natural numbers such that, for some natural number B, it holds that 1B < S(a 4 1), S(a 2 ), S(a 3 ) < 1B. If 2 S(a 1 ) + S(a 2 ) + S(a 3 ) = B, then [R, (k, [ c,..., c S(a 1 ) ]), (k, [ c,..., c S(a 2 ) [R, Q] FBV ]), (k, [ c,..., c S(a 3 ) ]), (Q, [ k, k, k, ( c,..., c )])]. Proof. Take the following derivation where the redex in the conclusion of the 8
9 applied rule is highlighted. [R, Q] i [R, (Q, [ c,..., c, c,..., c, c,..., c, ( c,..., c )])] S(a 1 ) S(a 2 ) S(a 3 ) ai. s [R, (k, [c,..., c]), (k, [c,..., c]), (Q, [ k, k, c,..., c, ( c,..., c)])] ai [R, (k, [c,..., c]), (k, [c,..., c]), (Q, [([k, k], [c,..., c]), k, k, ( c,..., c)])] s [R, (k, [c,..., c]), (k, [c,..., c]), (Q, [(k, [c,..., c]), k, k, k, ( c,..., c)])] s [R, (k, [ c,..., c S(a 1 ) ]), (k, [ c,..., c S(a 2 ) ]), (k, [ c,..., c S(a 3 ) ]), (Q, [ k, k, k, ( c,..., c )])] Theorem 4.3 If a 3-Partition problem A, m, B, S is solvable, then there is a proof of θ( A, m, B, S ) in FBV. Proof. By induction on m, using Lemma Completeness of the Encoding Theorem 4.4 For A, m, B, and S satisfying the constraints of 3-Partition, if there is a proof of θ( A, m, B, S ) in FBV, then the 3-Partition problem A, m, B, S is solvable. Proof. By induction on m: the case for m = 0 corresponds to empty problem. Let A, m + 1, B, S be such that A = {a 1, a 2,..., a 3m, a 3m+1, a 3m+2, a 3m+3 }. Assuming that we have a proof of θ( A, m + 1, B, S ), we show that A, m + 1, B, S is solvable. Let R = [(k, [ c,..., c S(a 1 ) ]), (k, [ c,..., c ]),..., (k, [ c,..., c ]), (k, [ c,..., c ])] S(a 2 ) S(a 3m+2 ) S(a 3m+3 ) and Q = ([ k, k, k, ( c,..., c )],..., [ k, ( c,..., c )]) } {{ } m such that θ( A, m + 1, B, S ) = [R, (Q, [ k, k, k, ( c,..., c )])]. From Theorem 3.5 we have that θ( A, m + 1, B, S ) has a proof in FBV iff it 9
10 has a proof in. It follows from Theorem 3.3 that [K 1, K 2 ] R such that Π [K 1, Q] and [K 2, k, k, k, ( c,..., c)]. Since there are only positive atoms in R, it follows that none of the rules ai and is can be applied in, hence the derivation must be the structure R. This implies that [K 1, K 2 ] are two partitions of R. Observe that in K 2 there must be exactly 3 occurrences of k, which implies that K 2 = [(k, [ c,..., c S(a i ) ]), (k, [ c,..., c S(a j ) ]), (k, [ c,..., c ])] S(a k ) and S(a i ) + S(a j ) + S(a k ) = B, and Π is the proof delivered by the induction hypothesis. Corollary 4.5 System FBV is NP-hard. Proof. Follows immediately from Theorem 4.3 and Theorem 4.4. Since system BV is a conservative extension of system FBV, this result implies the NP-hardness of system BV. Corollary 4.6 System BV is NP-hard. Proof. Follows immediately from Proposition 3.6 and Corollary System BV is in NP In this section, I show that the proof of a BV structure is bounded by a polynomial in the size of this structure. Definition 5.1 [6] Given a structure S, we talk about atom occurrences when considering all the atoms appearing in S as distinct (for example, by indexing them so that two atoms, which are equal, get different indices). The notation occ S indicates the set of all the atom occurrences appearing in S. The size of S is the cardinality of the set occ S. Given a structure S in normal form, the structural relation (occ S) 2 and, for every S { }, U and V and for every a in U and b in V, the following holds: if S = S [U, V ] then a S b. To a structure that is not in normal form we associate the structural relation obtained from any of its normal forms, since they yield the same relation S. Remark 5.2 Let R = S[a, ā] and R = S{ } be BV structures with pairwise R distinct atoms. If ai, R then R = R \ { (a, ā), (ā, a) }. 10
11 Remark 5.3 Let R = S[(P, T ), U ] and R = S([P, U ], T ) be BV structures R with pairwise distinct atoms. If s, R then R = R \ ( { (x, y) x occ T y occ U } {(x, y) x occ U y occ T }). Remark 5.4 Let R = S[ P ; T, U; V ] and R = S [P, U ]; [T, V ] be BV R structures with pairwise distinct atoms. If q, R then R = R \ ({(x, y) x occ P y occ V } {(x, y) x occ V y occ P } {(x, y) x occ U y occ T } {(x, y) x occ T y occ U}). Proposition 5.5 The length of a proof of a BV structure R is bounded by O( occ R 2 ). Proof. With Remark 5.2, 5.3, and 5.4; observe that R (occr) 2, hence R < occr 2. For each (non-trivial) application of an inference rule such R that ρ, we have that R < R. R 6 Main Result The main result of the paper follows from the results in Sections 4 and 5: Theorem 6.1 System BV is NP-complete. Proof. Follows immediately from Corollary 4.6 and Proposition 5.5. Corollary 6.2 Multiplicative linear logic extended by the rules mix and mix0, or System FBV, is NP-complete. Proof. Follows immediately from Corollary 4.5 and Proposition 5.5. References [1] G. Bellin. Subnets of proof-nets in multiplicative linear logic with MIX. In Mathematical Structures in Computer Science, volume 7, pages Cambridge University Press, [2] Kai Brünnler. Deep Inference and Symmetry in Classical Proofs. PhD thesis, Technische Universität Dresden, [3] Paola Bruscoli. A purely logical account of sequentiality in proof search. In Peter J. Stuckey, editor, Logic Programming, 18th International Conference, 11
12 volume 2401 of Lecture Notes in Computer Science, pages Springer- Verlag, [4] M. R. Garey and D. S. Johnson. Computer and Intractability: A Guide to Theory of NP-Completeness. Freeman, San Francisco, [5] Jean-Yves Girard. Linear logic. Theoretical Computer Science, 50:1 102, [6] Alessio Guglielmi. A system of interaction and structure. Technical Report WV-02-10, TU Dresden, To app. in ACM Transactions on Computational Logic. [7] Alessio Guglielmi and Lutz Straßburger. A non-commutative extension of MELL. In M. Baaz and A. Voronkov, editors, LPAR 2002, volume 2514 of Lecture Notes in Artificial Intelligence, pages Springer-Verlag, [8] Max Kanovich. The multiplicative fragment of linear logic is NP-complete. Technical Report X-91-13, Institute for Language, Logic, and Information, [9] Max Kanovich. Horn programming in linear logic is NP-complete. In Proccedings of the 7th Annual IEEE Symposium on Logic in Computer Science, Santa Cruz, pages , Los Alamitos, California, IEEE Computer Society Press. [10] Patrick Lincoln and Timothy C. Winkler. Constant-only multiplicative linear logic is NP-complete. In Theoretical Computer Science, volume 135(1), pages [11] Robin Milner. Communication and Concurrency. International Series in Computer Science. Prentice Hall, [12] Christian Retoré. Pomset logic: A non-commutative extension of classical linear logic. In Ph. de Groote and J. R. Hindley, editors, Typed Lambda Calculus and Applications, TLCA 97, volume 1210 of Lecture Notes in Computer Science, pages Springer-Verlag, [13] Christian Retoré. Pomset logic as a calculus of directed cographs. In V. M. Abrusci and C. Casadio, editors, Dynamic Perspectives in Logic and Linguistics, pages Bulzoni, Rome, Also available as INRIA Rapport de Recherche RR [14] Lutz Straßburger. Linear Logic and Noncommutativity in the Calculus of Structures. PhD thesis, TU Dresden, [15] Lutz Straßburger. System NEL is undecidable. In Ruy De Queiroz, Elaine Pimentel, and Lucília Figueiredo, editors, 10th Workshop on Logic, Language, Information and Computation (WoLLIC), volume 84 of Electronic Notes in Theoretical Computer Science, [16] Alwen Fernanto Tiu. Properties of a logical system in the calculus of structures. Technical Report WV-01-06, Technische Universität Dresden,
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
Non-deterministic Semantics and the Undecidability of Boolean BI
1 Non-deterministic Semantics and the Undecidability of Boolean BI DOMINIQUE LARCHEY-WENDLING, LORIA CNRS, Nancy, France DIDIER GALMICHE, LORIA Université Henri Poincaré, Nancy, France We solve the open
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
A Propositional Dynamic Logic for CCS Programs
A Propositional Dynamic Logic for CCS Programs Mario R. F. Benevides and L. Menasché Schechter {mario,luis}@cos.ufrj.br Abstract This work presents a Propositional Dynamic Logic in which the programs are
CHAPTER 7 GENERAL PROOF SYSTEMS
CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
NP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
OPERATIONAL TYPE THEORY by Adam Petcher Prepared under the direction of Professor Aaron Stump A thesis presented to the School of Engineering of
WASHINGTON NIVERSITY SCHOOL OF ENGINEERING AND APPLIED SCIENCE DEPARTMENT OF COMPTER SCIENCE AND ENGINEERING DECIDING JOINABILITY MODLO GROND EQATIONS IN OPERATIONAL TYPE THEORY by Adam Petcher Prepared
Offline 1-Minesweeper is NP-complete
Offline 1-Minesweeper is NP-complete James D. Fix Brandon McPhail May 24 Abstract We use Minesweeper to illustrate NP-completeness proofs, arguments that establish the hardness of solving certain problems.
The Banach-Tarski Paradox
University of Oslo MAT2 Project The Banach-Tarski Paradox Author: Fredrik Meyer Supervisor: Nadia S. Larsen Abstract In its weak form, the Banach-Tarski paradox states that for any ball in R, it is possible
Scheduling Real-time Tasks: Algorithms and Complexity
Scheduling Real-time Tasks: Algorithms and Complexity Sanjoy Baruah The University of North Carolina at Chapel Hill Email: [email protected] Joël Goossens Université Libre de Bruxelles Email: [email protected]
Parametric Domain-theoretic models of Linear Abadi & Plotkin Logic
Parametric Domain-theoretic models of Linear Abadi & Plotkin Logic Lars Birkedal Rasmus Ejlers Møgelberg Rasmus Lerchedahl Petersen IT University Technical Report Series TR-00-7 ISSN 600 600 February 00
Exponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
On the Relationship between Classes P and NP
Journal of Computer Science 8 (7): 1036-1040, 2012 ISSN 1549-3636 2012 Science Publications On the Relationship between Classes P and NP Anatoly D. Plotnikov Department of Computer Systems and Networks,
Solving NP-complete problems in the tile assembly model
Theoretical Computer Science 395 (2008) 31 46 www.elsevier.com/locate/tcs Solving NP-complete problems in the tile assembly model Yuriy Brun Department of Computer Science, University of Southern California,
Stiffie's On Line Scheduling Algorithm
A class of on-line scheduling algorithms to minimize total completion time X. Lu R.A. Sitters L. Stougie Abstract We consider the problem of scheduling jobs on-line on a single machine and on identical
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
A first step towards modeling semistructured data in hybrid multimodal logic
A first step towards modeling semistructured data in hybrid multimodal logic Nicole Bidoit * Serenella Cerrito ** Virginie Thion * * LRI UMR CNRS 8623, Université Paris 11, Centre d Orsay. ** LaMI UMR
The Theory of Tetris
The Theory of Tetris Hendrik Jan Hoogeboom and Walter A. Kosters Leiden Institute of Advanced Computer Science Universiteit Leiden, The Netherlands {hoogeboo,kosters}@liacs.nl 1 Introduction Any algorithm
Theorem (informal statement): There are no extendible methods in David Chalmers s sense unless P = NP.
Theorem (informal statement): There are no extendible methods in David Chalmers s sense unless P = NP. Explication: In his paper, The Singularity: A philosophical analysis, David Chalmers defines an extendible
MATHEMATICS: CONCEPTS, AND FOUNDATIONS Vol. III - Logic and Computer Science - Phokion G. Kolaitis
LOGIC AND COMPUTER SCIENCE Phokion G. Kolaitis Computer Science Department, University of California, Santa Cruz, CA 95064, USA Keywords: algorithm, Armstrong s axioms, complete problem, complexity class,
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
The countdown problem
JFP 12 (6): 609 616, November 2002. c 2002 Cambridge University Press DOI: 10.1017/S0956796801004300 Printed in the United Kingdom 609 F U N C T I O N A L P E A R L The countdown problem GRAHAM HUTTON
MA651 Topology. Lecture 6. Separation Axioms.
MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples
Summary Last Lecture. Automated Reasoning. Outline of the Lecture. Definition sequent calculus. Theorem (Normalisation and Strong Normalisation)
Summary Summary Last Lecture sequent calculus Automated Reasoning Georg Moser Institute of Computer Science @ UIBK Winter 013 (Normalisation and Strong Normalisation) let Π be a proof in minimal logic
Foundational Proof Certificates
An application of proof theory to computer science INRIA-Saclay & LIX, École Polytechnique CUSO Winter School, Proof and Computation 30 January 2013 Can we standardize, communicate, and trust formal proofs?
Extending Semantic Resolution via Automated Model Building: applications
Extending Semantic Resolution via Automated Model Building: applications Ricardo Caferra Nicolas Peltier LIFIA-IMAG L1F1A-IMAG 46, Avenue Felix Viallet 46, Avenue Felix Viallei 38031 Grenoble Cedex FRANCE
Introduction to Logic in Computer Science: Autumn 2006
Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
Mathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
P versus NP, and More
1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify
Lecture 17 : Equivalence and Order Relations DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion
Neighborhood Data and Database Security
Neighborhood Data and Database Security Kioumars Yazdanian, FrkdCric Cuppens e-mail: yaz@ tls-cs.cert.fr - cuppens@ tls-cs.cert.fr CERT / ONERA, Dept. of Computer Science 2 avenue E. Belin, B.P. 4025,31055
3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
Theoretical Computer Science (Bridging Course) Complexity
Theoretical Computer Science (Bridging Course) Complexity Gian Diego Tipaldi A scenario You are a programmer working for a logistics company Your boss asks you to implement a program that optimizes the
CONTRIBUTIONS TO ZERO SUM PROBLEMS
CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg
Cycle transversals in bounded degree graphs
Electronic Notes in Discrete Mathematics 35 (2009) 189 195 www.elsevier.com/locate/endm Cycle transversals in bounded degree graphs M. Groshaus a,2,3 P. Hell b,3 S. Klein c,1,3 L. T. Nogueira d,1,3 F.
x < y iff x < y, or x and y are incomparable and x χ(x,y) < y χ(x,y).
12. Large cardinals The study, or use, of large cardinals is one of the most active areas of research in set theory currently. There are many provably different kinds of large cardinals whose descriptions
Classification - Examples
Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
About the inverse football pool problem for 9 games 1
Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute
Research Note. Bi-intuitionistic Boolean Bunched Logic
UCL DEPARTMENT OF COMPUTER SCIENCE Research Note RN/14/06 Bi-intuitionistic Boolean Bunched Logic June, 2014 James Brotherston Dept. of Computer Science University College London Jules Villard Dept. of
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
Chapter ML:IV. IV. Statistical Learning. Probability Basics Bayes Classification Maximum a-posteriori Hypotheses
Chapter ML:IV IV. Statistical Learning Probability Basics Bayes Classification Maximum a-posteriori Hypotheses ML:IV-1 Statistical Learning STEIN 2005-2015 Area Overview Mathematics Statistics...... Stochastics
High degree graphs contain large-star factors
High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a
Cloud Computing is NP-Complete
Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,
Online and Offline Selling in Limit Order Markets
Online and Offline Selling in Limit Order Markets Kevin L. Chang 1 and Aaron Johnson 2 1 Yahoo Inc. [email protected] 2 Yale University [email protected] Abstract. Completely automated electronic
CONTINUED FRACTIONS AND FACTORING. Niels Lauritzen
CONTINUED FRACTIONS AND FACTORING Niels Lauritzen ii NIELS LAURITZEN DEPARTMENT OF MATHEMATICAL SCIENCES UNIVERSITY OF AARHUS, DENMARK EMAIL: [email protected] URL: http://home.imf.au.dk/niels/ Contents
Which Semantics for Neighbourhood Semantics?
Which Semantics for Neighbourhood Semantics? Carlos Areces INRIA Nancy, Grand Est, France Diego Figueira INRIA, LSV, ENS Cachan, France Abstract In this article we discuss two alternative proposals for
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs
Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,
The chromatic spectrum of mixed hypergraphs
The chromatic spectrum of mixed hypergraphs Tao Jiang, Dhruv Mubayi, Zsolt Tuza, Vitaly Voloshin, Douglas B. West March 30, 2003 Abstract A mixed hypergraph is a triple H = (X, C, D), where X is the vertex
o-minimality and Uniformity in n 1 Graphs
o-minimality and Uniformity in n 1 Graphs Reid Dale July 10, 2013 Contents 1 Introduction 2 2 Languages and Structures 2 3 Definability and Tame Geometry 4 4 Applications to n 1 Graphs 6 5 Further Directions
The Classes P and NP
The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the
Indiana State Core Curriculum Standards updated 2009 Algebra I
Indiana State Core Curriculum Standards updated 2009 Algebra I Strand Description Boardworks High School Algebra presentations Operations With Real Numbers Linear Equations and A1.1 Students simplify and
INTRODUCTORY SET THEORY
M.Sc. program in mathematics INTRODUCTORY SET THEORY Katalin Károlyi Department of Applied Analysis, Eötvös Loránd University H-1088 Budapest, Múzeum krt. 6-8. CONTENTS 1. SETS Set, equal sets, subset,
Sets of Fibre Homotopy Classes and Twisted Order Parameter Spaces
Communications in Mathematical Physics Manuscript-Nr. (will be inserted by hand later) Sets of Fibre Homotopy Classes and Twisted Order Parameter Spaces Stefan Bechtluft-Sachs, Marco Hien Naturwissenschaftliche
Large induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
Updating Action Domain Descriptions
Updating Action Domain Descriptions Thomas Eiter, Esra Erdem, Michael Fink, and Ján Senko Institute of Information Systems, Vienna University of Technology, Vienna, Austria Email: (eiter esra michael jan)@kr.tuwien.ac.at
ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
Introduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France [email protected] November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
SMALL SKEW FIELDS CÉDRIC MILLIET
SMALL SKEW FIELDS CÉDRIC MILLIET Abstract A division ring of positive characteristic with countably many pure types is a field Wedderburn showed in 1905 that finite fields are commutative As for infinite
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison
Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Tomi Janhunen 1, Ilkka Niemelä 1, Johannes Oetsch 2, Jörg Pührer 2, and Hans Tompits 2 1 Aalto University, Department
Max-Min Representation of Piecewise Linear Functions
Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 43 (2002), No. 1, 297-302. Max-Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department,
Degree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
Turing Degrees and Definability of the Jump. Theodore A. Slaman. University of California, Berkeley. CJuly, 2005
Turing Degrees and Definability of the Jump Theodore A. Slaman University of California, Berkeley CJuly, 2005 Outline Lecture 1 Forcing in arithmetic Coding and decoding theorems Automorphisms of countable
ON UNIQUE FACTORIZATION DOMAINS
ON UNIQUE FACTORIZATION DOMAINS JIM COYKENDALL AND WILLIAM W. SMITH Abstract. In this paper we attempt to generalize the notion of unique factorization domain in the spirit of half-factorial domain. It
Bindings, mobility of bindings, and the -quantifier
ICMS, 26 May 2007 1/17 Bindings, mobility of bindings, and the -quantifier Dale Miller, INRIA-Saclay and LIX, École Polytechnique This talk is based on papers with Tiu in LICS2003 & ACM ToCL, and experience
Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011
Basic Concepts of Point Set Topology Notes for OU course Math 4853 Spring 2011 A. Miller 1. Introduction. The definitions of metric space and topological space were developed in the early 1900 s, largely
F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)
Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p
Tutorial 8. NP-Complete Problems
Tutorial 8 NP-Complete Problems Decision Problem Statement of a decision problem Part 1: instance description defining the input Part 2: question stating the actual yesor-no question A decision problem
The Student-Project Allocation Problem
The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.
THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS
THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear
ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP. A. K. Das and R. K. Nath
International Electronic Journal of Algebra Volume 7 (2010) 140-151 ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP A. K. Das and R. K. Nath Received: 12 October 2009; Revised: 15 December
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Linear Algebra. A vector space (over R) is an ordered quadruple. such that V is a set; 0 V ; and the following eight axioms hold:
Linear Algebra A vector space (over R) is an ordered quadruple (V, 0, α, µ) such that V is a set; 0 V ; and the following eight axioms hold: α : V V V and µ : R V V ; (i) α(α(u, v), w) = α(u, α(v, w)),
GROUPS ACTING ON A SET
GROUPS ACTING ON A SET MATH 435 SPRING 2012 NOTES FROM FEBRUARY 27TH, 2012 1. Left group actions Definition 1.1. Suppose that G is a group and S is a set. A left (group) action of G on S is a rule for
ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Mathematical Sciences 2012 1 p. 43 48 ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS I nf or m at i cs L. A. HAYKAZYAN * Chair of Programming and Information
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Group Theory. Contents
Group Theory Contents Chapter 1: Review... 2 Chapter 2: Permutation Groups and Group Actions... 3 Orbits and Transitivity... 6 Specific Actions The Right regular and coset actions... 8 The Conjugation
Notes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
Row Ideals and Fibers of Morphisms
Michigan Math. J. 57 (2008) Row Ideals and Fibers of Morphisms David Eisenbud & Bernd Ulrich Affectionately dedicated to Mel Hochster, who has been an inspiration to us for many years, on the occasion
The Ideal Class Group
Chapter 5 The Ideal Class Group We will use Minkowski theory, which belongs to the general area of geometry of numbers, to gain insight into the ideal class group of a number field. We have already mentioned
ON THE EMBEDDING OF BIRKHOFF-WITT RINGS IN QUOTIENT FIELDS
ON THE EMBEDDING OF BIRKHOFF-WITT RINGS IN QUOTIENT FIELDS DOV TAMARI 1. Introduction and general idea. In this note a natural problem arising in connection with so-called Birkhoff-Witt algebras of Lie
