Skip to main content

Showing 1–11 of 11 results for author: Komarath, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.00831  [pdf, ps, other

    cs.CC

    Hazard-free Decision Trees

    Authors: Deepu Benson, Balagopal Komarath, Jayalal Sarma, Nalli Sai Soumya

    Abstract: Decision trees are one of the most fundamental computational models for computing Boolean functions $f : \{0, 1\}^n \mapsto \{0, 1\}$. It is well-known that the depth and size of decision trees are closely related to time and number of processors respectively for computing functions in the CREW-PRAM model. For a given $f$, a fundamental goal is to minimize the depth and/or the size of the decision… ▽ More

    Submitted 1 January, 2025; originally announced January 2025.

    Comments: 31 pages

  2. arXiv:2301.02569  [pdf, other

    cs.DS cs.CC

    Finding and Counting Patterns in Sparse Graphs

    Authors: Balagopal Komarath, Anant Kumar, Suchismita Mishra, Aditi Sethia

    Abstract: We consider algorithms for finding and counting small, fixed graphs in sparse host graphs. In the non-sparse setting, the parameters treedepth and treewidth play a crucial role in fast, constant-space and polynomial-space algorithms respectively. We discover two new parameters that we call matched treedepth and matched treewidth. We show that finding and counting patterns with low matched treedept… ▽ More

    Submitted 6 January, 2023; originally announced January 2023.

    ACM Class: F.2

  3. arXiv:2107.05128  [pdf, ps, other

    cs.CC cs.DM

    Karchmer-Wigderson Games for Hazard-free Computation

    Authors: Christian Ikenmeyer, Balagopal Komarath, Nitin Saurabh

    Abstract: We present a Karchmer-Wigderson game to study the complexity of hazard-free formulas. This new game is both a generalization of the monotone Karchmer-Wigderson game and an analog of the classical Boolean Karchmer-Wigderson game. Therefore, it acts as a bridge between the existing monotone and general games. Using this game, we prove hazard-free formula size and depth lower bounds that are provab… ▽ More

    Submitted 29 November, 2022; v1 submitted 11 July, 2021; originally announced July 2021.

    Comments: 34 pages, To appear in ITCS 2023

    ACM Class: F.1

  4. arXiv:2011.04778  [pdf, other

    cs.CC

    Graph Homomorphism Polynomials: Algorithms and Complexity

    Authors: Balagopal Komarath, Anurag Pandey, C. S. Rahul

    Abstract: We study homomorphism polynomials, which are polynomials that enumerate all homomorphisms from a pattern graph $H$ to $n$-vertex graphs. These polynomials have received a lot of attention recently for their crucial role in several new algorithms for counting and detecting graph patterns, and also for obtaining natural polynomial families which are complete for algebraic complexity classes… ▽ More

    Submitted 16 November, 2020; v1 submitted 9 November, 2020; originally announced November 2020.

    Comments: This version fixes a mistake in the proof of Lemma 1. It also fixes an incorrect citation. Thanks to Marc Roth for pointing out the mistake in the citation

  5. arXiv:2006.10592  [pdf, ps, other

    cs.CC

    On the complexity of detecting hazards

    Authors: Balagopal Komarath, Nitin Saurabh

    Abstract: Detecting and eliminating logic hazards in Boolean circuits is a fundamental problem in logic circuit design. We show that there is no $O(3^{(1-ε)n} \text{poly}(s))$ time algorithm, for any $ε> 0$, that detects logic hazards in Boolean circuits of size $s$ on $n$ variables under the assumption that the strong exponential time hypothesis is true. This lower bound holds even when the input circuits… ▽ More

    Submitted 18 June, 2020; originally announced June 2020.

    Comments: To appear in Information Processing Letters

  6. arXiv:1809.08858  [pdf, other

    cs.CC

    Graph Pattern Polynomials

    Authors: Markus Bläser, Balagopal Komarath, Karteek Sreenivasaiah

    Abstract: We study the time complexity of induced subgraph isomorphism problems where the pattern graph is fixed. The earliest known example of an improvement over trivial algorithms is by Itai and Rodeh (1978) who sped up triangle detection in graphs using fast matrix multiplication. This algorithm was generalized by Nešetřil and Poljak (1985) to speed up detection of k-cliques. Improved algorithms are k… ▽ More

    Submitted 24 September, 2018; originally announced September 2018.

    Comments: 29 pages

  7. On the complexity of hazard-free circuits

    Authors: Christian Ikenmeyer, Balagopal Komarath, Christoph Lenzen, Vladimir Lysikov, Andrey Mokhov, Karteek Sreenivasaiah

    Abstract: The problem of constructing hazard-free Boolean circuits dates back to the 1940s and is an important problem in circuit design. Our main lower-bound result unconditionally shows the existence of functions whose circuit complexity is polynomially bounded while every hazard-free implementation is provably of exponential size. Previous lower bounds on the hazard-free complexity were only valid for de… ▽ More

    Submitted 4 April, 2018; v1 submitted 6 November, 2017; originally announced November 2017.

    MSC Class: 03D15; 68Q17 ACM Class: F.1.3

    Journal ref: J. ACM 66(4), Article 25 (2019)

  8. On the Complexity of L-reachability

    Authors: Balagopal Komarath, Jayalal Sarma, K. S. Sunil

    Abstract: We initiate a complexity theoretic study of the language based graph reachability problem (L-REACH) : Fix a language L. Given a graph whose edges are labeled with alphabet symbols of the language L and two special vertices s and t, test if there is path P from s to t in the graph such that the concatenation of the symbols seen from s to t in the path P forms a string in the language L. We study va… ▽ More

    Submitted 12 January, 2017; originally announced January 2017.

    Comments: 14 pages, 4 figures, Published in Fundamenta Informaticae

    Journal ref: Fundam. Inform., volume 145, number 4, pages 471-483 (2016)

  9. arXiv:1604.05510  [pdf, ps, other

    cs.CC cs.DM math.CO

    Pebbling Meets Coloring: Reversible Pebble Game On Trees

    Authors: Balagopal Komarath, Jayalal Sarma, Saurabh Sawlani

    Abstract: The reversible pebble game is a combinatorial game played on rooted DAGs. This game was introduced by Bennett (1989) motivated by applications in designing space efficient reversible algorithms. Recently, Chan (2013) showed that the reversible pebble game number of any DAG is the same as its Dymond-Tompa pebble number and Raz-Mckenzie pebble number. We show, as our main result, that for any root… ▽ More

    Submitted 19 April, 2016; originally announced April 2016.

    Comments: 15 pages, 3 figures, Preliminary version appeared in COCOON 2015

  10. arXiv:1503.00275  [pdf, other

    cs.CC

    Comparator Circuits over Finite Bounded Posets

    Authors: Balagopal Komarath, Jayalal Sarma, K. S. Sunil

    Abstract: Comparator circuit model was originally introduced by Mayr and Subramanian (1992) (and further studied by Cook, Filmus and Le (2012)) to capture problems which are not known to be P-complete but still not known to admit efficient parallel algorithms. The class CC is the complexity class of problems many-one logspace reducible to the Comparator Circuit Value Problem and we know that NL is contained… ▽ More

    Submitted 19 July, 2017; v1 submitted 1 March, 2015; originally announced March 2015.

    Comments: 21 pages, previous version incorrectly claimed NL = L-SkewCC when in fact P = L-SkewCC

  11. arXiv:1301.1425  [pdf, ps, other

    cs.CC

    Pebbling, Entropy and Branching Program Size Lower Bounds

    Authors: Balagopal Komarath, Jayalal Sarma M. N

    Abstract: We contribute to the program of proving lower bounds on the size of branching programs solving the Tree Evaluation Problem introduced by Cook et. al. (2012). Proving a super-polynomial lower bound for the size of nondeterministic thrifty branching programs (NTBP) would separate $NL$ from $P$ for thrifty models solving the tree evaluation problem. First, we show that {\em Read-Once NTBPs} are equiv… ▽ More

    Submitted 16 November, 2013; v1 submitted 8 January, 2013; originally announced January 2013.

    Comments: 25 Pages, Manuscript submitted to Journal in June 2013 This version includes a proof for tight size bounds for (syntactic) read-once NTBPs. The proof is in the same spirit as the proof for size bounds for bitwise independent NTBPs present in the earlier version of the paper and is included in the journal version of the paper submitted in June 2013

    ACM Class: F.1.1