-
A lower bound on the Ramsey number $R_k(k+1,k+1)$
Authors:
Pavel Pudlák,
Vojtěch Rödl
Abstract:
We will prove that $R_k(k+1,k+1)\geq 4 tw_{\lfloor k/4\rfloor -3}(2)$, where $tw$ is the tower function defined by ${tw}_1(x)=x$ and ${tw}_{i+1}(x)=2^{{tw}_i(x)}$. We also give proofs of $R_k(k+1,k+2)\geq 4 tw_{k-7}(2)$, $R_k(k+1,2k+1)\geq 4 tw_{k-3}(2)$, and $R_k(k+2,k+2)\geq 4 tw_{k-4}(2)$.
We will prove that $R_k(k+1,k+1)\geq 4 tw_{\lfloor k/4\rfloor -3}(2)$, where $tw$ is the tower function defined by ${tw}_1(x)=x$ and ${tw}_{i+1}(x)=2^{{tw}_i(x)}$. We also give proofs of $R_k(k+1,k+2)\geq 4 tw_{k-7}(2)$, $R_k(k+1,2k+1)\geq 4 tw_{k-3}(2)$, and $R_k(k+2,k+2)\geq 4 tw_{k-4}(2)$.
△ Less
Submitted 1 January, 2025; v1 submitted 21 December, 2024;
originally announced December 2024.
-
Local Enumeration and Majority Lower Bounds
Authors:
Mohit Gurumukhani,
Ramamohan Paturi,
Pavel Pudlák,
Michael Saks,
Navid Talebanfard
Abstract:
Depth-3 circuit lower bounds and $k$-SAT algorithms are intimately related; the state-of-the-art $Σ^k_3$-circuit lower bound and the $k$-SAT algorithm are based on the same combinatorial theorem. In this paper we define a problem which reveals new interactions between the two. Define Enum($k$, $t$) problem as: given an $n$-variable $k$-CNF and an initial assignment $α$, output all satisfying assig…
▽ More
Depth-3 circuit lower bounds and $k$-SAT algorithms are intimately related; the state-of-the-art $Σ^k_3$-circuit lower bound and the $k$-SAT algorithm are based on the same combinatorial theorem. In this paper we define a problem which reveals new interactions between the two. Define Enum($k$, $t$) problem as: given an $n$-variable $k$-CNF and an initial assignment $α$, output all satisfying assignments at Hamming distance $t$ from $α$, assuming that there are no satisfying assignments of Hamming distance less than $t$ from $α$. Observe that: an upper bound $b(n, k, t)$ on the complexity of Enum($k$, $t$) implies:
- Depth-3 circuits: Any $Σ^k_3$ circuit computing the Majority function has size at least $\binom{n}{\frac{n}{2}}/b(n, k, \frac{n}{2})$.
- $k$-SAT: There exists an algorithm solving $k$-SAT in time $O(\sum_{t = 1}^{n/2}b(n, k, t))$.
A simple construction shows that $b(n, k, \frac{n}{2}) \ge 2^{(1 - O(\log(k)/k))n}$. Thus, matching upper bounds would imply a $Σ^k_3$-circuit lower bound of $2^{Ω(\log(k)n/k)}$ and a $k$-SAT upper bound of $2^{(1 - Ω(\log(k)/k))n}$. The former yields an unrestricted depth-3 lower bound of $2^{ω(\sqrt{n})}$ solving a long standing open problem, and the latter breaks the Super Strong Exponential Time Hypothesis.
In this paper, we propose a randomized algorithm for Enum($k$, $t$) and introduce new ideas to analyze it. We demonstrate the power of our ideas by considering the first non-trivial instance of the problem, i.e., Enum($3$, $\frac{n}{2}$). We show that the expected running time of our algorithm is $1.598^n$, substantially improving on the trivial bound of $3^{n/2} \simeq 1.732^n$. This already improves $Σ^3_3$ lower bounds for Majority function to $1.251^n$. The previous bound was $1.154^n$ which follows from the work of Håstad, Jukna, and Pudlák (Comput. Complex.'95).
△ Less
Submitted 23 May, 2024; v1 submitted 14 March, 2024;
originally announced March 2024.
-
Colorings of $k$-sets with low discrepancy on small sets
Authors:
Pavel Pudlák,
Vojtěch Rödl
Abstract:
According to Ramsey theorem, for every $k$ and $n$, if $N$ is sufficiently large, then for every 2-coloring $ψ$ of $k$-element subsets of $[N]$ there exists a monochromatic set $S\subseteq[N]$ (a set such that all $k$-element subsets of $S$ have the same color given by $ψ$), $|S|=m$. The least such number is denoted by $R_k(m)$. Old results of Erd\H os, Hajnal and Rado~\cite{erdos-hajnal-rado} imp…
▽ More
According to Ramsey theorem, for every $k$ and $n$, if $N$ is sufficiently large, then for every 2-coloring $ψ$ of $k$-element subsets of $[N]$ there exists a monochromatic set $S\subseteq[N]$ (a set such that all $k$-element subsets of $S$ have the same color given by $ψ$), $|S|=m$. The least such number is denoted by $R_k(m)$. Old results of Erd\H os, Hajnal and Rado~\cite{erdos-hajnal-rado} imply that $R_k(m)\leq {\rm tw}_{k}(c m)$, where ${\rm tw}_k(x)$ is the tower function defined by ${\rm tw}_1(x)=x$ and ${\rm tw}_{i+1}(x)=2^{{\rm tw}_i(x)}$. On the other hand, these authors also showed that if $N\leq {\rm tw}_{k-1}(c'm^2)$, then there exists a coloring~$ψ$ such that there is no monochromatic $S\subseteq[N]$, $|S|=m$. We are interested in the question what more one can say when $N$ is smaller than ${\rm tw}_{k-1}(m)$ and $m$ is only slightly larger than $k$. We will show that, for particular values of the parameters $k,m,N$, there are colorings such that on all subsets $S$, $|S|\geq m$, the number of $k$-subsets of one color is close to the number of $k$-subsets of the other color. In this abstract, for the sake of simplicity, we only state a special case of our main theorem.
Theorem
There exists $ε>0$ and $k_0$ such that for every $k\geq k_0$, if $N< {\rm tw}_{\lfloor\sqrt k\rfloor}(2)$, then there exists a coloring $γ:{[N]\choose k}\to\{-1,1\}$ such that for every $S\subseteq[N]$, $|S|\geq k+\sqrt k$, the following holds true \[ \left|\sum\{γ(X)\ |\ X\in\mbox{${S\choose k}$}\}\right| \leq 2^{-ε\sqrt k}\mbox{${|S|\choose k}$}. \]
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Bounds on Functionality and Symmetric Difference -- Two Intriguing Graph Parameters
Authors:
Pavel Dvořák,
Lukáš Folwarczný,
Michal Opler,
Pavel Pudlák,
Robert Šámal,
Tung Anh Vu
Abstract:
Functionality ($\mathrm{fun}$) is a graph parameter that generalizes graph degeneracy defined by Alecu et al. [JCTB, 2021]. They research the relation of functionality to many other graphs parameters (tree-width, clique-width, VC-dimension, etc.). Extending their research, we completely characterize the functionality of random graph $G(n,p)$ for all possible $p$. We provide matching (up to a const…
▽ More
Functionality ($\mathrm{fun}$) is a graph parameter that generalizes graph degeneracy defined by Alecu et al. [JCTB, 2021]. They research the relation of functionality to many other graphs parameters (tree-width, clique-width, VC-dimension, etc.). Extending their research, we completely characterize the functionality of random graph $G(n,p)$ for all possible $p$. We provide matching (up to a constant factor) lower and upper bound for a large range of $p$. It follows from our bounds for $G(n,p)$, that the maximum functionality (roughly $\sqrt{n}$) is achieved for $p \approx 1/\sqrt{n}$. We complement this by showing that every graph $G$ on $n$ vertices have $\mathrm{fun}(G) \le O(\sqrt{ n \ln n})$ and we give a nearly matching $Ω(\sqrt{n})$-lower bound provided by incident graphs of projective planes. Previously known lower bounds for functionality were only logarithmic in the number of vertices.
Further, we study a related graph parameter symmetric difference ($\mathrm{sd}$), the minimum of $|N(u) ~Δ~ N(v)|$ over all pairs of vertices of the ``worst possible'' induced subgraph. It was observed by Alecu et al. that $\mathrm{fun}(G) \le \mathrm{sd}(G)+1$ for every graph $G$. They asked whether the functionality of interval graphs is bounded. Recently, Dallard et al. [RiM, 2024] answered this positively and they constructed an interval graph $G$ with $\mathrm{sd}(G) = Θ(\sqrt[4]{n})$ (even though they did not mention the explicit bound), i.e., they separate the functionality and symmetric difference of interval graphs. We show that $\mathrm{sd}$ of interval graphs is at most $O(\sqrt[3]{n})$ and we provide a different example of an interval graph $G$ with $\mathrm{sd}(G) = Θ(\sqrt[4]{n})$. Further, we show that $\mathrm{sd}$ of circular arc graphs is $Θ(\sqrt{n})$.
△ Less
Submitted 30 May, 2025; v1 submitted 23 February, 2023;
originally announced February 2023.
-
On the Ramsey number of daisies I
Authors:
Pavel Pudlák,
Vojtěch Rödl,
Marcelo Sales
Abstract:
Daisies are a special type of hypergraphs introduced by Bollobás, Leader and Malvenuto. An $r$-daisy determined by a pair of disjoint sets $K$ and $M$ is the $(r+|K|)$-uniform hypergraph $\{K\cup P:\: P\in M^{(r)}\}$. In [Combin. Probab. Comput. 20, no. 5, 743-747, 2011] the authors studied Turán type density problems for daisies. This paper deals with Ramsey numbers of Daisies, which are natural…
▽ More
Daisies are a special type of hypergraphs introduced by Bollobás, Leader and Malvenuto. An $r$-daisy determined by a pair of disjoint sets $K$ and $M$ is the $(r+|K|)$-uniform hypergraph $\{K\cup P:\: P\in M^{(r)}\}$. In [Combin. Probab. Comput. 20, no. 5, 743-747, 2011] the authors studied Turán type density problems for daisies. This paper deals with Ramsey numbers of Daisies, which are natural generalizations of classical Ramsey numbers. We discuss upper and lower bounds for the Ramsey number of $r$-daisies and also for special cases where the size of the kernel is bounded.
△ Less
Submitted 17 June, 2024; v1 submitted 18 November, 2022;
originally announced November 2022.
-
Linear Branching Programs and Directional Affine Extractors
Authors:
Svyatoslav Gryaznov,
Pavel Pudlák,
Navid Talebanfard
Abstract:
A natural model of read-once linear branching programs is a branching program where queries are $\mathbb{F}_2$ linear forms, and along each path, the queries are linearly independent. We consider two restrictions of this model, which we call weakly and strongly read-once, both generalizing standard read-once branching programs and parity decision trees. Our main results are as follows.
- Average…
▽ More
A natural model of read-once linear branching programs is a branching program where queries are $\mathbb{F}_2$ linear forms, and along each path, the queries are linearly independent. We consider two restrictions of this model, which we call weakly and strongly read-once, both generalizing standard read-once branching programs and parity decision trees. Our main results are as follows.
- Average-case complexity. We define a pseudo-random class of functions which we call directional affine extractors, and show that these functions are hard on average for the strongly read-once model. We then present an explicit construction of such function with good parameters. This strengthens the result of Cohen and Shinkar (ITCS'16) who gave such average-case hardness for parity decision trees. Directional affine extractors are stronger than the more familiar class of affine extractors. Given the significance of these functions, we expect that our new class of functions might be of independent interest.
- Proof complexity. We also consider the proof system $\text{Res}[\oplus]$ which is an extension of resolution with linear queries. A refutation of a CNF in this proof system naturally defines a linear branching program solving the corresponding search problem. Conversely, we show that a weakly read-once linear BP solving the search problem can be converted to a $\text{Res}[\oplus]$ refutation with constant blow up.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
On matrices potentially useful for tree codes
Authors:
Pavel Pudlák
Abstract:
Motivated by a concept studied in [1], we consider a property of matrices over finite fields that generalizes triangular totally nonsingular matrices to block matrices. We show that (1) matrices with this property suffice to construct good tree codes and (2) a random block-triangular matrix over a field of quadratic size satisfies this property. We will also show that a generalization of this rand…
▽ More
Motivated by a concept studied in [1], we consider a property of matrices over finite fields that generalizes triangular totally nonsingular matrices to block matrices. We show that (1) matrices with this property suffice to construct good tree codes and (2) a random block-triangular matrix over a field of quadratic size satisfies this property. We will also show that a generalization of this randomized construction yields codes over quadratic size fields for which the sum of the rate and minimum relative distance gets arbitrarily close to 1.
△ Less
Submitted 5 December, 2020;
originally announced December 2020.
-
Reflection principles, propositional proof systems, and theories
Authors:
Pavel Pudlák
Abstract:
The reflection principle is the statement that if a sentence is provable then it is true. Reflection principles have been studied for first-order theories, but they also play an important role in propositional proof complexity. In this paper we will revisit some results about the reflection principles for propositional proofs systems using a finer scale of reflection principles. We will use the re…
▽ More
The reflection principle is the statement that if a sentence is provable then it is true. Reflection principles have been studied for first-order theories, but they also play an important role in propositional proof complexity. In this paper we will revisit some results about the reflection principles for propositional proofs systems using a finer scale of reflection principles. We will use the result that proving lower bounds on Resolution proofs is hard in Resolution. This appeared first in the recent article of Atserias and Müller as a key lemma and was generalized and simplified in some spin-off papers. We will also survey some results about arithmetical theories and proof systems associated with them. We will show a connection between a conjecture about proof complexity of finite consistency statements and a statement about proof systems associated with a theory.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
The canonical pairs of bounded depth Frege systems
Authors:
Pavel Pudlak
Abstract:
The canonical pair of a proof system $P$ is the pair of disjoint NP sets where one set is the set of all satisfiable CNF formulas and the other is the set of CNF formulas that have $P$-proofs bounded by some polynomial. We give a combinatorial characterization of the canonical pairs of depth~$d$ Frege systems. Our characterization is based on certain games, introduced in this article, that are par…
▽ More
The canonical pair of a proof system $P$ is the pair of disjoint NP sets where one set is the set of all satisfiable CNF formulas and the other is the set of CNF formulas that have $P$-proofs bounded by some polynomial. We give a combinatorial characterization of the canonical pairs of depth~$d$ Frege systems. Our characterization is based on certain games, introduced in this article, that are parametrized by a number~$k$, also called the depth. We show that the canonical pair of a depth~$d$ Frege system is polynomially equivalent to the pair $(A_{d+2},B_{d+2})$ where $A_{d+2}$ (respectively, $B_{d+1}$) are depth {$d+1$} games in which Player~I (Player II) has a positional winning strategy. Although this characterization is stated in terms of games, we will show that these combinatorial structures can be viewed as generalizations of monotone Boolean circuits. In particular, depth~1 games are essentially monotone Boolean circuits. Thus we get a generalization of the monotone feasible interpolation for Resolution, which is a property that enables one to reduce the task of proving lower bounds on the size of refutations to lower bounds on the size of monotone Boolean circuits. However, we do not have a method yet for proving lower bounds on the size of depth~$d$ games for $d>1$.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
Santha-Vazirani sources, deterministic condensers and very strong extractors
Authors:
Dmytro Gavinsky,
Pavel Pudlák
Abstract:
The notion of semi-random sources, also known as Santha-Vazirani (SV) sources, stands for a sequence of n bits, where the dependence of the i'th bit on the previous i-1 bits is limited for every $i\in[n]$. If the dependence of the i'th bit on the remaining n-1 bits is limited, then this is a strong SV-source. Even the strong SV-sources are known not to admit (universal) deterministic extractors,…
▽ More
The notion of semi-random sources, also known as Santha-Vazirani (SV) sources, stands for a sequence of n bits, where the dependence of the i'th bit on the previous i-1 bits is limited for every $i\in[n]$. If the dependence of the i'th bit on the remaining n-1 bits is limited, then this is a strong SV-source. Even the strong SV-sources are known not to admit (universal) deterministic extractors, but they have seeded extractors, as their min-entropy is $Ω(n)$. It is intuitively obvious that strong SV-sources are more than just high-min-entropy sources, and this work explores the intuition. Deterministic condensers are known not to exist for general high-min-entropy sources, and we construct for any constants $ε, δ\in (0,1)$ a deterministic condenser that maps n bits coming from a strong SV-source with bias at most $δ$ to $Ω(n)$ bits of min-entropy rate at least $1-ε$. In conclusion we observe that deterministic condensers are closely related to very strong extractors - a proposed strengthening of the notion of strong (seeded) extractors: in particular, our constructions can be viewed as very strong extractors for the family of strong Santha-Vazirani distributions. The notion of very strong extractors requires that the output remains unpredictable even to someone who knows not only the seed value (as in the case of strong extractors), but also the extractor's outputs corresponding to the same input value with each of the preceding seed values (say, under the lexicographic ordering). Very strong extractors closely resemble the original notion of SV-sources, except that the bits must satisfy the unpredictability requirement only on average.
△ Less
Submitted 22 February, 2020; v1 submitted 8 July, 2019;
originally announced July 2019.
-
Extractors for small zero-fixing sources
Authors:
Pavel Pudlák,
Vojtech Rödl
Abstract:
A random variable $X$ is an $(n,k)$-zero-fixing source if for some subset $V\subseteq[n]$, $X$ is the uniform distribution on the strings $\{0,1\}^n$ that are zero on every coordinate outside of $V$. An $ε$-extractor for $(n,k)$-zero-fixing sources is a mapping $F:\{0,1\}^n\to\{0,1\}^m$, for some $m$, such that $F(X)$ is $ε$-close in statistical distance to the uniform distribution on $\{0,1\}^m$…
▽ More
A random variable $X$ is an $(n,k)$-zero-fixing source if for some subset $V\subseteq[n]$, $X$ is the uniform distribution on the strings $\{0,1\}^n$ that are zero on every coordinate outside of $V$. An $ε$-extractor for $(n,k)$-zero-fixing sources is a mapping $F:\{0,1\}^n\to\{0,1\}^m$, for some $m$, such that $F(X)$ is $ε$-close in statistical distance to the uniform distribution on $\{0,1\}^m$ for every $(n,k)$-zero-fixing source $X$. Zero-fixing sources were introduced by Cohen and Shinkar in [10] in connection with the previously studied extractors for bit-fixing sources. They constructed, for every $μ>0$, an efficiently computable extractor that extracts a positive fraction of entropy, i.e., $Ω(k)$ bits, from $(n,k)$-zero-fixing sources where $k\geq(\log\log n)^{2+μ}$.
In this paper we present two different constructions of extractors for zero-fixing sources that are able to extract a positive fraction of entropy for $k$ essentially smaller than $\log\log n$. The first extractor works for $k\geq C\log\log\log n$, for some constant $C$. The second extractor extracts a positive fraction of entropy for $k\geq \log^{(i)}n$ for any fixed $i\in \mathbb{N}$, where $\log^{(i)}$ denotes $i$-times iterated logarithm. The fraction of extracted entropy decreases with $i$. The first extractor is a function computable in polynomial time in~$n$ (for $ε=o(1)$, but not too small); the second one is computable in polynomial time when $k\leqα\log\log n/\log\log\log n$, where $α$ is a positive constant.
The subject studied in this paper is closely related to Ramsey theory. We use methods developed in Ramsey theory and our results can also be interpreted as a contribution to this field.
△ Less
Submitted 17 December, 2019; v1 submitted 16 April, 2019;
originally announced April 2019.
-
Tighter Hard Instances for PPSZ
Authors:
Pavel Pudlák,
Dominik Scheder,
Navid Talebanfard
Abstract:
We construct uniquely satisfiable $k$-CNF formulas that are hard for the algorithm PPSZ. Firstly, we construct graph-instances on which "weak PPSZ" has savings of at most $(2 + ε) / k$; the saving of an algorithm on an input formula with $n$ variables is the largest $γ$ such that the algorithm succeeds (i.e. finds a satisfying assignment) with probability at least $2^{ - (1 - γ) n}$. Since PPSZ (b…
▽ More
We construct uniquely satisfiable $k$-CNF formulas that are hard for the algorithm PPSZ. Firstly, we construct graph-instances on which "weak PPSZ" has savings of at most $(2 + ε) / k$; the saving of an algorithm on an input formula with $n$ variables is the largest $γ$ such that the algorithm succeeds (i.e. finds a satisfying assignment) with probability at least $2^{ - (1 - γ) n}$. Since PPSZ (both weak and strong) is known to have savings of at least $\frac{π^2 + o(1)}{6k}$, this is optimal up to the constant factor. In particular, for $k=3$, our upper bound is $2^{0.333\dots n}$, which is fairly close to the lower bound $2^{0.386\dots n}$ of Hertli [SIAM J. Comput.'14]. We also construct instances based on linear systems over $\mathbb{F}_2$ for which strong PPSZ has savings of at most $O\left(\frac{\log(k)}{k}\right)$. This is only a $\log(k)$ factor away from the optimal bound. Our constructions improve previous savings upper bound of $O\left(\frac{\log^2(k)}{k}\right)$ due to Chen et al. [SODA'13].
△ Less
Submitted 4 November, 2016;
originally announced November 2016.
-
A wild model of linear arithmetic and discretely ordered modules
Authors:
Petr Glivický,
Pavel Pudlák
Abstract:
Linear arithmetics are extensions of Presburger arithmetic (Pr) by one or more unary functions, each intended as multiplication by a fixed element (scalar), and containing the full induction schemes for their respective languages. In this paper we construct a model M of the 2-linear arithmetic LA_2 (linear arithmetic with two scalars) in which an infinitely long initial segment of "Peano multiplic…
▽ More
Linear arithmetics are extensions of Presburger arithmetic (Pr) by one or more unary functions, each intended as multiplication by a fixed element (scalar), and containing the full induction schemes for their respective languages. In this paper we construct a model M of the 2-linear arithmetic LA_2 (linear arithmetic with two scalars) in which an infinitely long initial segment of "Peano multiplication" on M is 0-definable. This shows, in particular, that LA_2 is not model complete in contrast to theories LA_1 and LA_0=Pr that are known to satisfy quantifier elimination up to disjunctions of primitive positive formulas. As an application, we show that M, as a discretely ordered module over the discretely ordered ring generated by the two scalars, is not NIP, answering negatively a question of Chernikov and Hils.
△ Less
Submitted 8 January, 2017; v1 submitted 9 February, 2016;
originally announced February 2016.
-
Incompleteness in the finite domain
Authors:
Pavel Pudlak
Abstract:
Motivated by the problem of finding finite versions of classical incompleteness theorems, we present some conjectures that go beyond ${\bf NP\neq co NP}$. These conjectures formally connect computational complexity with the difficulty of proving some sentences, which means that high computational complexity of a problem associated with a sentence implies that the sentence is not provable in a weak…
▽ More
Motivated by the problem of finding finite versions of classical incompleteness theorems, we present some conjectures that go beyond ${\bf NP\neq co NP}$. These conjectures formally connect computational complexity with the difficulty of proving some sentences, which means that high computational complexity of a problem associated with a sentence implies that the sentence is not provable in a weak theory, or requires a long proof. Another reason for putting forward these conjectures is that some results in proof complexity seem to be special cases of such general statements and we want to formalize and fully understand these statements. In this paper we review some conjectures that we have presented earlier, introduce new conjectures, systematize them and prove new connections between them and some other statements studied before.
△ Less
Submitted 18 May, 2017; v1 submitted 7 January, 2016;
originally announced January 2016.
-
On the Joint Entropy of $d$-Wise-Independent Variables
Authors:
Dmytro Gavinsky,
Pavel Pudlák
Abstract:
How low can the joint entropy of $n$ $d$-wise independent (for $d\ge2$) discrete random variables be, subject to given constraints on the individual distributions (say, no value may be taken by a variable with probability greater than $p$, for $p<1$)? This question has been posed and partially answered in a recent work of Babai.
In this paper we improve some of his bounds, prove new bounds in…
▽ More
How low can the joint entropy of $n$ $d$-wise independent (for $d\ge2$) discrete random variables be, subject to given constraints on the individual distributions (say, no value may be taken by a variable with probability greater than $p$, for $p<1$)? This question has been posed and partially answered in a recent work of Babai.
In this paper we improve some of his bounds, prove new bounds in a wider range of parameters and show matching upper bounds in some special cases. In particular, we prove tight lower bounds for the min-entropy (as well as the entropy) of pairwise and three-wise independent balanced binary variables for infinitely many values of $n$.
△ Less
Submitted 27 October, 2016; v1 submitted 27 March, 2015;
originally announced March 2015.
-
On the complexity of finding falsifying assignments for Herbrand disjunctions
Authors:
Pavel Pudlak
Abstract:
Suppose that $Φ$ is a consistent sentence. Then there is no Herbrand proof of $\neg Φ$, which means that any Herbrand disjunction made from the prenex form of $\neg Φ$ is falsifiable. We show that the problem of finding such a falsifying assignment is hard in the following sense. For every total polynomial search problem $R$, there exists a consistent $Φ$ such that finding solutions to $R$ can be…
▽ More
Suppose that $Φ$ is a consistent sentence. Then there is no Herbrand proof of $\neg Φ$, which means that any Herbrand disjunction made from the prenex form of $\neg Φ$ is falsifiable. We show that the problem of finding such a falsifying assignment is hard in the following sense. For every total polynomial search problem $R$, there exists a consistent $Φ$ such that finding solutions to $R$ can be reduced to finding a falsifying assignment to an Herbrand disjunction made from $\neg Φ$. It has been conjectured that there are no complete total polynomial search problems. If this conjecture is true, then for every consistent sentence $Φ$, there exists a consistence sentence $Ψ$, such that the search problem associated with $Ψ$ cannot be reduced to the search problem associated with $Φ$.
△ Less
Submitted 12 November, 2014;
originally announced November 2014.
-
Partition Expanders
Authors:
Dmytro Gavinsky,
Pavel Pudlák
Abstract:
We introduce a new concept, which we call partition expanders. The basic idea is to study quantitative properties of graphs in a slightly different way than it is in the standard definition of expanders. While in the definition of expanders it is required that the number of edges between any pair of sufficiently large sets is close to the expected number, we consider partitions and require this…
▽ More
We introduce a new concept, which we call partition expanders. The basic idea is to study quantitative properties of graphs in a slightly different way than it is in the standard definition of expanders. While in the definition of expanders it is required that the number of edges between any pair of sufficiently large sets is close to the expected number, we consider partitions and require this condition only for most of the pairs of blocks. As a result, the blocks can be substantially smaller.
We show that for some range of parameters, to be a partition expander a random graph needs exponentially smaller degree than any expander would require in order to achieve similar expanding properties.
We apply the concept of partition expanders in communication complexity. First, we give a PRG for the SMP model of the optimal seed length, n+O(log k). Second, we compare the model of SMP to that of Simultaneous Two-Way Communication, and give a new separation that is stronger both qualitatively and quantitatively than the previously known ones.
△ Less
Submitted 22 January, 2014;
originally announced January 2014.
-
Linear tree codes and the problem of explicit constructions
Authors:
Pavel Pudlák
Abstract:
We reduce the problem of constructing asymptotically good tree codes to the construction of triangular totally nonsingular matrices over fields with polynomially many elements. We show a connection of this problem to Birkhoff interpolation in finite fields.
We reduce the problem of constructing asymptotically good tree codes to the construction of triangular totally nonsingular matrices over fields with polynomially many elements. We show a connection of this problem to Birkhoff interpolation in finite fields.
△ Less
Submitted 27 August, 2015; v1 submitted 21 October, 2013;
originally announced October 2013.
-
The complexity of proving that a graph is Ramsey
Authors:
Massimo Lauria,
Pavel Pudlák,
Vojtěch Rödl,
Neil Thapen
Abstract:
We say that a graph with $n$ vertices is $c$-Ramsey if it does not contain either a clique or an independent set of size $c \log n$. We define a CNF formula which expresses this property for a graph $G$. We show a superpolynomial lower bound on the length of resolution proofs that $G$ is $c$-Ramsey, for every graph $G$. Our proof makes use of the fact that every Ramsey graph must contain a large s…
▽ More
We say that a graph with $n$ vertices is $c$-Ramsey if it does not contain either a clique or an independent set of size $c \log n$. We define a CNF formula which expresses this property for a graph $G$. We show a superpolynomial lower bound on the length of resolution proofs that $G$ is $c$-Ramsey, for every graph $G$. Our proof makes use of the fact that every Ramsey graph must contain a large subgraph with some of the statistical properties of the random graph.
△ Less
Submitted 13 March, 2013;
originally announced March 2013.
-
Randomness, pseudorandomness and models of arithmetic
Authors:
Pavel Pudlak
Abstract:
Pseudorandmness plays an important role in number theory, complexity theory and cryptography. Our aim is to use models of arithmetic to explain pseudorandomness by randomness. To this end we construct a set of models $\cal M$, a common element $ι$ of these models and a probability distribution on $\cal M$, such that for every pseudorandom sequence $s$, the probability that $s(ι)=1$ holds true in a…
▽ More
Pseudorandmness plays an important role in number theory, complexity theory and cryptography. Our aim is to use models of arithmetic to explain pseudorandomness by randomness. To this end we construct a set of models $\cal M$, a common element $ι$ of these models and a probability distribution on $\cal M$, such that for every pseudorandom sequence $s$, the probability that $s(ι)=1$ holds true in a random model from $\cal M$ is equal to 1/2.
△ Less
Submitted 17 October, 2012;
originally announced October 2012.
-
Exponential Separation of Quantum and Classical Non-Interactive Multi-Party Communication Complexity
Authors:
Dmytro Gavinsky,
Pavel Pudlák
Abstract:
We give the first exponential separation between quantum and classical multi-party communication complexity in the (non-interactive) one-way and simultaneous message passing settings.
For every k, we demonstrate a relational communication problem between k parties that can be solved exactly by a quantum simultaneous message passing protocol of cost O(log n) and requires protocols of cost n^{c/…
▽ More
We give the first exponential separation between quantum and classical multi-party communication complexity in the (non-interactive) one-way and simultaneous message passing settings.
For every k, we demonstrate a relational communication problem between k parties that can be solved exactly by a quantum simultaneous message passing protocol of cost O(log n) and requires protocols of cost n^{c/k^2}, where c>0 is a constant, in the classical non-interactive one-way message passing model with shared randomness and bounded error.
Thus our separation of corresponding communication classes is superpolynomial as long as k=o(\sqrt{\log n / \log\log n}) and exponential for k=O(1).
△ Less
Submitted 6 August, 2007;
originally announced August 2007.