Undirected ST-Connectivity In Log Space Omer Reingold Slides by Sharon Bruckner.

Slides:



Advertisements
Similar presentations
Walk the Walk: On Pseudorandomness, Expansion, and Connectivity Omer Reingold Weizmann Institute Based on join works with Michael Capalbo, Kai-Min Chung,
Advertisements

Pseudorandom Walks: Looking Random in The Long Run or All The Way? Omer Reingold Weizmann Institute.
Undirected ST-Connectivity in Log-Space Omer Reingold Weizmann Institute.
1 Nondeterministic Space is Closed Under Complement Presented by Jing Zhang and Yingbo Wang Theory of Computation II Professor: Geoffrey Smith.
3.3 Spanning Trees Tucker, Applied Combinatorics, Section 3.3, by Patti Bodkin and Tamsen Hunter.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Approximation Algorithms for Unique Games Luca Trevisan Slides by Avi Eyal.
Noga Alon Institute for Advanced Study and Tel Aviv University
Random Walks Ben Hescott CS591a1 November 18, 2002.
Entropy Rates of a Stochastic Process
Analysis of Network Diffusion and Distributed Network Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization.
Complexity 12-1 Complexity Andrei Bulatov Non-Deterministic Space.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Complexity 11-1 Complexity Andrei Bulatov Space Complexity.
Complexity 13-1 Complexity Andrei Bulatov Hierarchy Theorem.
(Omer Reingold, 2005) Speaker: Roii Werner TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A AA A A A A AA A.
Computability and Complexity 19-1 Computability and Complexity Andrei Bulatov Non-Deterministic Space.
Undirected ST-Connectivity in Log-Space Author: Omer Reingold Presented by: Yang Liu.
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
1 Mazes In The Theory of Computer Science Dana Moshkovitz.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 8 May 4, 2005
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Undirected ST-Connectivity 2 DL Omer Reingold, STOC 2005: Presented by: Fenghui Zhang CPSC 637 – paper presentation.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Undirected ST-Connectivity in Log-Space By Omer Reingold (Weizmann Institute) Year 2004 Presented by Maor Mishkin.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
Zig-Zag Expanders Seminar in Theory and Algorithmic Research Sashka Davis UCSD, April 2005 “ Entropy Waves, the Zig-Zag Graph Product, and New Constant-
Expanders Eliyahu Kiperwasser. What is it? Expanders are graphs with no small cuts. The later gives several unique traits to such graph, such as: – High.
For slideshow: click “Research and Talks” from slideshow: click “Research and Talks”
Complexity 1 Mazes And Random Walks. Complexity 2 Can You Solve This Maze?
Undirected ST-Connectivity In Log Space
For slideshow: click “Research and Talks” from slideshow: click “Research and Talks”
1 Entropy Waves, The Zigzag Graph Product, and New Constant-Degree Expanders Omer Reingold Salil Vadhan Avi Wigderson Lecturer: Oded Levy.
Randomized Algorithms Morteza ZadiMoghaddam Amin Sayedi.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
The Effect of Induced Subgraphs on Quasi-randomness Asaf Shapira & Raphael Yuster.
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
An introduction to expander families and Ramanujan graphs
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
1 Steiner Tree Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
Markov Chains and Random Walks. Def: A stochastic process X={X(t),t ∈ T} is a collection of random variables. If T is a countable set, say T={0,1,2, …
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
NP-COMPLETE PROBLEMS. Admin  Two more assignments…  No office hours on tomorrow.
NP-Complete problems.
Artur Czumaj DIMAP DIMAP (Centre for Discrete Maths and it Applications) Computer Science & Department of Computer Science University of Warwick Testing.
Lower Bounds for Embedding Edit Distance into Normed Spaces A. Andoni, M. Deza, A. Gupta, P. Indyk, S. Raskhodnikova.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Lower bounds on data stream computations Seminar in Communication Complexity By Michael Umansky Instructor: Ronitt Rubinfeld.
Great Theoretical Ideas in Computer Science for Some.
Presented by Alon Levin
Expanders and Ramanujan Graphs Mike Krebs, Cal State LA For slideshow: click “Research and Talks” from
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
1 Entropy Waves, The Zigzag Graph Product, and New Constant-Degree Expanders Omer Reingold Salil Vadhan Avi Wigderson Lecturer: Oded Levy.
Space Complexity Guy Feigenblat Based on lecture by Dr. Ely Porat Complexity course Computer science department, Bar-Ilan university December 2008.
Expanders and Ramanujan Graphs Mike Krebs, Cal State LA For slideshow: click “Research and Talks” from
The NP class. NP-completeness
Lap Chi Lau we will only use slides 4 to 19
Probabilistic Algorithms
Markov Chains and Random Walks
Topics in Algorithms Lap Chi Lau.
Computing Connected Components on Parallel Computers
Markov Chains Mixing Times Lecture 5
Complexity of Expander-Based Reasoning and the Power of Monotone Proofs Sam Buss (UCSD), Valentine Kabanets (SFU), Antonina Kolokolova.
Enumerating Distances Using Spanners of Bounded Degree
Lectures on Graph Algorithms: searching, testing and sorting
Undirected ST-Connectivity In Log Space
Theory of Computability
Graphs G = (V, E) V are the vertices; E are the edges.
Presentation transcript:

Undirected ST-Connectivity In Log Space Omer Reingold Slides by Sharon Bruckner

Today Some history What are we adding to the mix? –Connectivity in expanders –Making expanders: powering it up and cutting it down –Putting it together in Log-Space In conclusion

Some History What is ST-Connectivity? What do we know about it? What are we trying to accomplish?

What is ST-Connectivity? Given a graph G and two vertices s and t: –Answer YES if there is a path from s to t in G. –Answer NO if there is no such path Two flavors to the problem: –STCON where G is a directed graph –USTCON where G is undirected. Today we’ll talk about USTCON

What do we know about it? Solved easily with BFS –But – polynomial space! USTCON is in NL (=NSPACE(log)) –Just guess the path USTCON is in DSPACE(log 2 n) (Savitch) –If there’s a path from s to t, then exists z such that there is a path from s to z and from z to t… USTCON is in RL –Random walk –Randomness is a resource!

What are we trying to accomplish? We would like an algorithm for USTCON which is deterministic and works in space logarithmic in the size of the graph

What are we adding to the mix?

Useful Notations The adjacency matrix of a graph G is a matrix with 1 in the (i,j) element if vertices i and j are connected, 0 otherwise. If the graph is D-regular, the sum of each row is equal. We will use the normalized adjancecy matrix, where we divide each value by D.

Useful Notations The normalized adjacency matrix M is a stochastic matrix, and serves as the “random walk” matrix. The largest eigenvalue of M is 1, with the vector (1,1,1…,1)єR n Let G’s 2 nd largest eigenvalue be λ(G). A (N,D,λ) graph is a D regular graph over N vertices with λ(G) <= λ

Connectivity in Expanders What would happen if each connected component of our graph was an expander? We could decide USTCON in logspace!

Expanders – a Reminder Two equivalent definitions of expander G = (N,D, λ) is an expander iff the spectral gap 1- λ > 0 G = (N,D, λ) is an expander if there exists ε >0 such that for any set S of at most half the vertices in G, at least (1+ ε)|S| vertices of G are connected to some vertex in S Note that the adjacency matrix in this case in normalized!

Every expander has a O(log(N)) diameter Theorem: For any s and t in an expander, there’s a path from s to t of length O(log(N))

Proof

Logspace Algorithm for paths in an expander For a (N,D, λ) expander there is a a space O(logD*logN) algorithm which decided USTCON for any s and t Idea: From any vertex s there are D l=O(logN) different paths. Simply enumerate them all and see if any of them reach t.

How much does it cost? At each vertex we have a choice of D vertices, log(D) to represent 1…D. Each path is log(N) long. we need log(D) at each stage of a log(N) path, altogether O(logD*logN)

So far We now know that if our graph G was an expander graph, USTCON can be solved in Log-Space. How can we turn G into a graph of expanders?

Making expanders: powering it up and cutting it down

What do we want from the expander graph G’? 1.There is a path from s to t in G if and only if there is a path from s’ to t’ in G’. 2.Each connected component is an expander, with constant expansion 3.Construction in Log-Space.

The Plan New tools for our toolbox –Rotation Maps –Powering –Zig Zag products The actual construction Why we got what we wanted Why we got it in Log-Space

Series of powering by 8 and zig zag, one increases the spectral gap and the other one decresases it, but not by much.

Rotation Maps This is the notation we’ll use in this algorithm Let G be a D regular undirected graph. The rotation map If the edge (v,w) exists and is the ith edge coming out of v and the jth edge coming out of w

Rotation Map Example Here or on the board

Powering If we had no limitations on the degree of the graph, we could make it into an expander graph by powering: The k-th power of the D-regular graph G is the graph G k where there is an edge (u,v) iff there is a path of length ≤ k between u and v in G. In rotation map notation, this means that

Zig Zag Product If G is a D-regular graph with N vertices and H is a d- regular graph with D vertices and rotation map Rot H, we replace each vertex v in G with a copy of H, H v. Therefore, our new graph has [N]x[D] vertices. H Part of G v is now Hv v

Zig-Zag Product The resulting graph is a d 2 regular graph, with edges as follows: HvHv HwHw (v,a) (v,a’) (w,b’) (w,b) G v w a’ b’ Rot ((v,a), (i,j)) = z G H z G H z i i’ j j’

Zig-Zag Product Take my word for it (no proof): If G is an (N,D,λ) graph and H is a (D,d,  ) graph, then z G H Therefore, the zig-zag product provides an expander with ample spectral gap! G H

The Actual Construction Show a transformation that turns every connected component of a graph into an expander. But! Not any graph, but a D 16 regular graph. We will see how to construct such a graph later

Main Transformation On input G and H, where G is a D 16 regular graph on N vertices, and H is a D-regular graph on D 16 vertices, the transformation  outputs a graph G l as follows: Set l to be the smallest integer s.t. If D is constant, then this number is O(logN). G 0 = G, z

Why is this an expander? Let G and H be inputs of  above. If and G is connected and non-bipartite then Which means that the output of  is indeed an expander. Non bipartite means that G cannot be split into two sets of vertices where all the edges of G are between those two sets

Proof Recall G 0 =G, connected and non-bipartite. Therefore, (known fact) Since l = O(logN) is the smallest integer such that it’s enough to see that We know that and because of the lemma from before we get that

Proof Continued Recall. Also, it’s a property of powering that if G is a (N,D,λ) graph then G t is a (N,D t,λ t ) graph. Therefore, we can bound λ(G i ) by For each i, one of two cases occurs: Otherwise,

Connected Components We’ve seen a construction  which takes a connected graph G and transforms it, using an appropriate H, to an expander. However, we still need to show that  is well defined and can operate on graphs that are not connected – composed of connected components

Connected Components G and H as before, if Is a connected component of G then In plain English : The output of  on a single connected component S of G is the same as taking  on G and looking at the sub-graph induced by the transformation of S. In plainer English : S is a connected component in G ↔ The transformation of S is a connected component in G l.

Proof Ask Oded

What do we want from the expander graph G’? 1.There is a path from s to t in G if and only if there is a path from s’ to t’ in G’. 2.Each connected component is an expander. 3.Construction in Log-Space.

Log Space Construction Prove that for any D,  can be calculated in space O(log(N)). We describe an algorithm A which constructs the rotation map of  (G,H) O(logN) space. The input tape will contain G,H and the output tape will contain

Proof Idea: Evaluating RotG i+1 takes just a constant additional amount of memory over evaluating RotG i. And all recursions use the same space!

Proof - Continued A will allocate the variables: v in [N] (from the original G) a 0, …, a l in [D 16 ] (vertex names in H)