Download presentation
Presentation is loading. Please wait.
1
Branching Programs Part 3
Paul Beame University of Washington
2
Outline Branching program basics Space (size) lower bounds
Multi-output functions Time-Space tradeoff lower bounds for general BPs Single-output functions Restricted classes of BPs OBDDs, Read-once (FBDDs), Oblivious, Read-k Lower bound methods for restricted classes Lower bound methods for general BPs Applying tradeoffs: BPs and static data structures Multi-output functions using single-output techniques Lower bound for encoding good codes
3
Limited Branching Program Forms
Structure-based Oblivious For each BP level, all the nodes on that level have the same variable name e.g. Parity BP Time-Based Read-Once On every path through the BP each variable is queried at most once e.g. Parity BP Read-π On every path through the BP each variable is queried at most π times Time-Bounded Every path in the BP has length at most π»=ππ
4
Oblivious vs Read-k and Best Bounds
Recall argument for oblivious BPs: If length π»=ππ then β₯π/π variables are read at most ππ times So oblivious length ππ β Read-2π Exponential Read-π size lower bounds for simple explicit Boolean functions for π=π(log π) Inspired by 2-party communication complexity [Borodin-Razborov-Smolensky 1989][Okolβnishnikova 1989] Exponential size lower bound for an explicit function over large domain for π=π(log2 π) Inspired by multiparty communication complexity [B-Vee 2002] Drawback: Function is not known to be in NP. No larger π possible until the oblivious case is improved
5
Read-k BPs On every path through the BP each variable is queried at most π times Unlike read-once, there may be paths that are not consistent with any input. We assume that those paths are restricted, too. Lower bound methods for read-π BPs often also apply to nondeterministic read-π BPs the βevery pathβ constraint is essential there Defn: Nondeterministic BPs (NBPs) generalize BPs by allowing many out-edges from a vertex with the same label: An NBP outputs 1 on input π iff there is some path that π can take that leads to the 1-sink node.
6
Read-k BPs We can also separate the levels of the Read-π BP hierarchy:
e.g., a small Read-2 BP can tell whether an π x π binary matrix is a permutation matrix, unlike small Read-Once BPs There are explicit Boolean functions with small Read-π+1 BPs that require exponential size Read-π BPs for π β€ log π /2, even allowing nondeterminism or randomization [Jayram S. Thathachar 1998] Techniques are easier but are similar enough to those for general time-bounded BPs in the case of non-Boolean inputs that we do them together
7
Limited Branching Program Forms
Structure-based Oblivious For each BP level, all the nodes on that level have the same variable name e.g. Parity BP Time-Based Read-Once On every path through the BP each variable is queried at most once e.g. Parity BP Read-π On every path through the BP each variable is queried at most π times Time-Bounded Every path in the BP has length at most π»=ππ
8
Breaking up a BP via its Traces
Split BP π· with input set π«π into π³ layers Let traces(π·)={trace(π)| πβπ«π} For π β traces(π·) let ππ be the function that has value 1 on input π iff trace(π)=π and π(π)=1 Since π· computes π π= πβππ«ππππ¬(π·) π π The ππ are disjoint and |traces(π·)| β€ 2πΊπ³ Can extend this to nondeterministic BPs: Each π may have multiple traces The ππ are no longer disjoint 1
9
Read-k BPs and Traces Split BP π· with input set π«π into π³ layers
If π· is a read-π BP then w.l.o.g. for every pair of nodes π, π in π· the same set of variables is read on every path from π to π Only must avoid variables read π times on some pair of paths above π and below π So, each trace π yields a fixed sequence of π³ sets of variables read, each of size β€ ππ/π³ Can assign the layers for each ππ as we did for oblivious BPs Get 2πΊπ³ assignments, one for each π 1
10
Recall: Strategy for Assigning Layers
Assign each of π³ layers to either Alice or Bob for π»β€ππ Goal: maximize # of bits per player π, while minimizing π³. Flip an independent coin for each layer: π=π/2π+1, π³=8π2 2π equal length layers [Borodin-Razborov-Smolensky 1989, B-Jayram-Saks 2001]
11
Recall: Strategy for Assigning Layers
Assign each of π³ layers to either Alice or Bob for π»β€ππ Goal: maximize # of bits per player π, while minimizing π³. Flip an independent coin for each layer: π=π/2π+1, π³=8π2 2π equal length layers [Borodin-Razborov-Smolensky 1989, B-Jayram-Saks 2001] Use 4π2 equal layers. Give a random subset of 2π of them to Bob. π=π/(2ππ)2π, π³=4π [Okolβnishnikova 1989, Ajtai 1999]
12
Communication Complexity
Input πβπΏ Input πβπ 010 11 Bob β¦ β¦ Alice π(π,π) πͺ(π) = # of bits Alice and Bob need to exchange to compute π on πΏο΄π
13
Communication Complexity
Defn: A (combinatorial) rectangle in πΏππ is a subset πΌππ½ where πΌβπΏ and π½βπ. Lemma: Any deterministic π-bit protocol for π:πΏππβ{0,1} yields a partition of πΏππ into 2π rectangles on which π is constant Lemma: Nondeterministic π-bit protocols correspond to coverings of π-1(1) by 2π rectangles. To prove that π requires large (non)deterministic communication complexity it suffices to prove π-1(1) is large Any rectangle in π-1(1) is small πΏ π πΌ π½
14
Best Partition and Fixed Variables
For BP lower bounds, we donβt know a priori how the input {0,1}π or [π]π to π is partitioned into πΏππ Need to analyze rectangles for all possible partitions of [π] βbest partitionβ communication complexity Also, in the case of oblivious BPs, most input variables (ones seen by both parties) were fixed ahead of time Implicitly, rectangle size was only important relative to the space of unfixed variables. For Read-π and general time-bounded BPs this aspect is even more important so we need to make it explicit.
15
Embedded Rectangles Defn: For disjoint sets π¨, π© β [π] and πΆ β π«[π]-π¨-π©, the embedded rectangle πΉ β π«π with footprint (π¨,π©), tail πΆ, and body πΉπ¨ππΉπ© for πΉπ¨βπ«π¨, πΉπ©βπ«π© is the set πΉ={πβπ«π | ππ¨βπΉπ¨, ππ©βπΉπ©, π[π]-π¨-π© = πΆ}. Defn: The density πΉπΉ of πΉ is |πΉπ¨ππΉπ©|/ |π«π¨ππ«π©| The footsize ππΉ of πΉ is min{|π¨|,|π©|}. For oblivious BP lower bounds, the footprint (π¨,π©) is the same for all of the embedded rectangles associated with the partition of the input sequence π Lets us use communication lower bounds over the reduced variable set π¨ βͺ π©.
16
Lower Bounds from Embedded Rectangles
Strategy: Write π= π=π π¬ π π where each ππ-1(1) is a union of embedded rectangles with footsize π, the same footprint (π¨π,π©π), but different tails For Read-π BPs π¬ β€ 2π³πΊ (one per trace). For general length ππ BPs? Show that any embedded rectangle in π-1(1) with footsize β₯ π has density β€ πΉ. Implies that π¬ β πΉ β₯ |π-1(1)|/|π«π|
17
Decomposition for Length ππ
Recall that π= π π π . Fix one the 2πΊπ³ traces π. Apply layer assignment separately for each π with trace π to the sequence of variables queried on input π. One of β€ 2π³ possible layer assignments π=layers(π) Let private(π) be the pair consisting of the first π variables in the private inputs for Alice and Bob, respectively under π At most π π π choices (π¨, π©) for private(π) Claim: For disjoint π¨,π©β[π] with |π¨|=|π©|=π, values πΆβπ«[π]-π¨-π©, trace π and layer assignment π, πΉ={πβπ«π| private(π)=(π¨,π©), π[π]-π¨-π©=πΆ, trace(π)=π, layers(π)=π} is an embedded rectangle with footprint (π¨,π©) in π-1(1). Claim β¨ we can choose π¬β€ 2πΊπ³ 2π³ π π π
18
Proving the Claim 1 Claim: For disjoint π¨,π©β[π] with |π¨|=|π©|=π, values πΆβπ«[π]-π¨-π©, trace π and layer assignment π πΉ={πβπ«π| private(π)=(π¨,π©), π[π]-π¨-π©=πΆ, trace(π)=π, layers(π)=π} is an embedded rectangle with footprint (π¨,π©) in π-1(1).
19
Lower Bounds from Embedded Rectangles
Strategy: Write π= π=π π¬ π π where each ππ-1(1) is a union of embedded rectangles with footsize π, the same footprint (π¨π,π©π), but different tails For Read-π BPs: π¬ β€ 2π³πΊ (one per trace). For general length ππ BPs: π¬β€ 2(πΊ+1)π³ π π π Show that any embedded rectangle in π-1(1) with footsize β₯ π has density β€ πΉ. Implies that π¬βπΉ β₯ |π-1(1)|/|π«π|
20
Functions with Embedded Rectangle Tradeoffs
Show that any embedded rectangle in π-1(1) with footsize = π has density β€ πΉ: Cannot be smaller than πΉ=|π«|-2π (just one point) Functions π with πΉ=|π«|-πΊ π: Hamming separation HAMπΈ : [Ajtai 2002] e.g. π«=[π6]={0,1}6log π Output is 1 iff π«(ππ,ππ)β₯5 log2 π for all πβ π Membership in linear codes over finite field π½ π ππ [Jukna 2009] Middle bit of integer multiplication of numbers with π«={0,1}π, i.e. π π-bit blocks. [Sauerhoff-Woelfel 2003] All have |π-1(1)|/|π«π| β₯ 1/|π«|.
21
Lower Bounds for BPs/NBPs/RAMs for large π«
Suppose that π»β€ππ and BRS layer assignment based on independent coin-flips is used. Then for 99% of π π=π/2π+1 π³=8π2 2π π¬ β πΉ β₯ 0.99|π-1(1)|/|π«π| β₯ 0.99/|π«| π¬ β€ 2(πΊ+1)π³ π π π and πΉ=|π«|-πΊ π For these values π π π β€ (π π π+π ) ππ < 2(2π+6)π. If log2|π«| > 4π/πΊ then 2πΊπ³ β₯ |π«|πΊ π/4 Taking logs we get πΊ π³ β₯ πΊβ π log2 |π«| Plugging in as before yields π»=π(π log((πlog π«)/πΊ)) [B-Jayram-Saks 2001, B-Saks-Sun-Vee 2003]
22
Boolean Domains and ππ π, π π
For ππ π, π π we only have πΉ=2-πΊπ Over π½23π Ajtai defined an explicit cubic form π(π,π)=ππ§ππ π that requires πΉ=2-πΊπ Alternatively: π(π)=1 iff # of (π,π) pairs s.t. π<π, ππ=ππ=ππ+π=1 is odd π1 π2n-1 π2n-2 πn+2 πn+1 πn π4 π3 π2 Mπ
23
BP Lower Bound Technology for πΉ=2-πΊπ
Much more complicated argument that holds only up to small amounts of nondeterminism. [Ajtai 2005] Uses correlations between private(π) values for related inputs. an independent layer assignment that leaves most layers unassigned to either player a probability of assigning a layer for input π to one of Alice or Bob that depends on the typical # of different layers in which input variables are read on input π. Theorem:[Ajtai 2005,B-Saks-Sun-Vee 2003] ππ π, π π and ππ§ππ π both require π»=π π π₯π¨π π πΊ π₯π¨π π₯π¨π π πΊ
24
BPs and Static Data Structures
Theorem: [Miltersen-Nisan-Safra-Wigderson 1998] With query set {0,1}π, time lower bounds of π(π) for size ππ(1) static cell-probe data structures require non-trivial time-space tradeoffs (i.e. π(log π) space requires superlinear time.) Proof: View the query πβ{0,1}π as the input vector For each fixed dataset π, have a different branching program π·π. Can use each cell of the cell-probe data structure to hold a node of π·π Values are the index of the variable and the names of the two pointers Size ππ(1) BP implies ππ(1) size cell-probe data structure with π=3log π-bit words (simply follow the branching program) Time is preserved. Can extend each step to full tree of height π at cost of 2π factor larger word-size π. Saves a factor π in time.
25
A Converse Theorem: [B-Vee 2002]
Static data structure: 2πΊ cells + extra work space at most πΊ time π» query algorithm that reads β€ π consecutive bits of the query in a one step yields a 2π-way BP π·π of time π(π») and space π(πΊ+log π») for every dataset π. Proof: Each BP node corresponds to a cell name + configuration of the extra storage. Memory contents are fixed by π. The input bits accessed are determined by the algorithm and the fixed memory cell contents just read.
26
Application to π-Near Neighbor [B-Vee 2002]
Hamming separation HAMπΈ : e.g. π«=[π6]={0,1}6log π Output is 1 iff π«(ππ,ππ)β₯5 log2 π for all πβ π Can solve HAMπΈ using a π-Near Neighbor data structure: Encode each coordinate ππ in π« as ππ using twice the bits so distance from 0 is fixed Choose π to be set of all possible strings of the form π-1π 0π-π-1 π 0π-π HAMπΈ(π)=0 iff π contains a close string to π So...BP lower bound for HAMπΈ implies: Theorem: Any π-Near Neighbor data structure for Hamming distance on {0,1}π that reads π(log π) consecutive bits per time step and π (ππ) π(π) memory cells requires time π(π).
27
Larger bounds for Huge Domains
Inspired by multiparty NOF communication complexity Uses embedded cylinder intersections instead of embedded rectangles Theorem: There is an explicit function over a huge domain for which π»=π(π log2 (πlog|π«|/πΊ)) is needed [B-Vee 2002] Drawbacks: Domain size |π«| requires π―(log3 π) bits to encode Function, which is based on tensored, interleaved Reed-Solomon codes, is not known to be in NP.
28
Single-Output Methods for Multi-output Problems
29
Open Problems Prove general BP lower bounds for out-degree 2 (arbitrary) directed graph reachability Savitchβs Theorem implies πΊ=π(log2 π) and we donβt expect πΊ=π(log π) is possible at all. (Would imply NL/poly=L/poly.) Prove that πΊ=π(log π) implies π»=π(π2) or π»= π(π1+πΊ) At least match oblivious BP bound of π»=π(π log2(π/πΊ)) for out-degree 1. Improve best lower bound for Boolean functions from π»=π π π₯π¨π π πΊ π₯π¨π π₯π¨π π πΊ to π»=π(π log(π/πΊ)) to match the large domain and oblivious BP bounds. Generalize embedded rectangle techniques for Boolean inputs to embedded cylinder intersections.
30
Open Problems Prove any oblivious BP lower bound for an explicit single-output function that holds for time π»= π logπ(1) π or even π»=π(π log2 π). Prove π»=π(π log2 (π/πΊ)) oblivious BP lower bound for a wider range of natural functions.
31
Open Problems Prove an π(π2) size lower bound for an explicit Boolean function Find better time-space tradeoff lower bounds for other multi-output functions, e.g. Encoding asymptotically good error-correcting codes [Bazzi-Mitter 2005] conjectured π»=π( π π /πΊ) Element distinctness in sliding windows [B-Clifford-Machmouchi 2013] π»=π( π π/π / πΊ π/π ) ?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.