-
Smaller Circuits for Bit Addition
Authors:
Mikhail Goncharov,
Alexander S. Kulikov,
Georgie Levtsov
Abstract:
Bit addition arises virtually everywhere in digital circuits: arithmetic operations, increment/decrement operators, computing addresses and table indices, and so on. Since bit addition is such a basic task in Boolean circuit synthesis, a lot of research has been done on constructing efficient circuits for various special cases of it. A vast majority of these results are devoted to optimizing the c…
▽ More
Bit addition arises virtually everywhere in digital circuits: arithmetic operations, increment/decrement operators, computing addresses and table indices, and so on. Since bit addition is such a basic task in Boolean circuit synthesis, a lot of research has been done on constructing efficient circuits for various special cases of it. A vast majority of these results are devoted to optimizing the circuit depth (also known as delay).
In this paper, we investigate the circuit size (also known as area) over the full binary basis of bit addition. Though most of the known circuits are built from Half Adders and Full Adders, we show that, in many interesting scenarios, these circuits have suboptimal size. Namely, we improve an upper bound $5n-3m$ to $4.5n-2m$, where $n$ is the number of input bits and $m$ is the number of output bits. In the regimes where $m$ is small compared to $n$ (for example, for computing the sum of $n$ bits or multiplying two $n$-bit integers), this leads to $10\%$ improvement.
We complement our theoretical result by an open-source implementation of generators producing circuits for bit addition and multiplication. The generators allow one to produce the corresponding circuits in two lines of code and to compare them to existing designs.
△ Less
Submitted 24 September, 2025; v1 submitted 17 September, 2025;
originally announced September 2025.
-
Simplifier: A New Tool for Boolean Circuit Simplification
Authors:
Daniil Averkov,
Gregory Emdin,
Viktoriia Krivogornitsyna,
Alexander S. Kulikov,
Fedor Kurmazov,
Alexander Smal,
Vsevolod Vaskin
Abstract:
The Boolean circuit simplification problem involves finding a smaller circuit that computes the same function as a given Boolean circuit. This problem is closely related to several key areas with both theoretical and practical applications, such as logic synthesis, satisfiability, and verification.
In this paper, we present Simplifier, a new open source tool for simplifying Boolean circuits. The…
▽ More
The Boolean circuit simplification problem involves finding a smaller circuit that computes the same function as a given Boolean circuit. This problem is closely related to several key areas with both theoretical and practical applications, such as logic synthesis, satisfiability, and verification.
In this paper, we present Simplifier, a new open source tool for simplifying Boolean circuits. The tool optimizes subcircuits with three inputs and at most three outputs, seeking to improve each one. It is designed as a low-effort method that runs in just a few seconds for circuits of reasonable size. This efficiency is achieved by combining two key strategies. First, the tool utilizes a precomputed database of optimized circuits, generated with SAT solvers after carefully clustering Boolean functions with three inputs and up to three outputs. Second, we demonstrate that it is sufficient to check a linear number of subcircuits, relative to the size of the original circuit. This allows a single iteration of the tool to be executed in linear time.
We evaluated the tool on a wide range of Boolean circuits, including both industrial and hand-crafted examples, in two popular formats: AIG and BENCH. For AIG circuits, after applying the state-of-the-art ABC framework, our tool achieved an additional 4% average reduction in size. For BENCH circuits, the tool reduced their size by an average of 30%.
△ Less
Submitted 24 March, 2025;
originally announced March 2025.
-
Cirbo: A New Tool for Boolean Circuit Analysis and Synthesis
Authors:
Daniil Averkov,
Tatiana Belova,
Gregory Emdin,
Mikhail Goncharov,
Viktoriia Krivogornitsyna,
Alexander S. Kulikov,
Fedor Kurmazov,
Daniil Levtsov,
Georgie Levtsov,
Vsevolod Vaskin,
Aleksey Vorobiev
Abstract:
We present an open-source tool for manipulating Boolean circuits. It implements efficient algorithms, both existing and novel, for a rich variety of frequently used circuit tasks such as satisfiability, synthesis, and minimization. We tested the tool on a wide range of practically relevant circuits (computing, in particular, symmetric and arithmetic functions) that have been optimized intensively…
▽ More
We present an open-source tool for manipulating Boolean circuits. It implements efficient algorithms, both existing and novel, for a rich variety of frequently used circuit tasks such as satisfiability, synthesis, and minimization. We tested the tool on a wide range of practically relevant circuits (computing, in particular, symmetric and arithmetic functions) that have been optimized intensively by the community for the last three years. The tool helped us to win the IWLS 2024 Programming Contest. In 2023, it was Google DeepMind who took the first place in the competition. We were able to reduce the size of the best circuits from 2023 by 12\% on average, whereas for some individual circuits, our size reduction was as large as 83\%.
△ Less
Submitted 19 December, 2024;
originally announced December 2024.
-
Conditional Complexity Hardness: Monotone Circuit Size, Matrix Rigidity, and Tensor Rank Under NSETH and Beyond
Authors:
Nikolai Chukhin,
Alexander S. Kulikov,
Ivan Mihajlin,
Arina Smirnova
Abstract:
Proving complexity lower bounds remains a challenging task: we only know how to prove conditional uniform lower bounds and nonuniform lower bounds in restricted circuit models. Williams (STOC 2010) showed how to derive nonuniform lower bounds from uniform upper bounds: by designing a fast algorithm for checking satisfiability of circuits, one gets a lower bound for this circuit class. Since then,…
▽ More
Proving complexity lower bounds remains a challenging task: we only know how to prove conditional uniform lower bounds and nonuniform lower bounds in restricted circuit models. Williams (STOC 2010) showed how to derive nonuniform lower bounds from uniform upper bounds: by designing a fast algorithm for checking satisfiability of circuits, one gets a lower bound for this circuit class. Since then, a number of results of this kind have been proved. For example, Jahanjou et al. (ICALP 2015) and Carmosino et al. (ITCS 2016) proved that if NSETH fails, then $\text{E}^{\text{NP}}$ has series-parallel circuit size $ω(n)$.
One can also derive nonuniform lower bounds from nondeterministic uniform lower bounds. Recent examples include lower bounds on tensor rank, arithmetic circuit size, $\text{ETHR} \circ \text{ETHR}$ circuit size under assumptions that various problems (like TSP, MAX-3-SAT, SAT, Set Cover) cannot be solved faster than in $2^n$ time. In this paper, we continue developing this line of research and show how uniform nondeterministic lower bounds can be used to construct generators of various types of combinatorial objects: Boolean functions of high circuit size, matrices of high rigidity, and tensors of high rank. Specifically, we prove the following. If $k$-SAT cannot be solved in input-oblivious co-nondeterministic time $O(2^{(1/2+\varepsilon)n})$, then there exists a monotone Boolean function family in coNP of monotone circuit size $2^{Ω(n / \log n)}$. This implies win-win circuit lower bounds: either $\text{E}^{\text{NP}}$ requires series-parallel circuits of size $ω(n)$ or coNP requires monotone circuits of size $2^{Ω(n / \log n)}$. If MAX-3-SAT cannot be solved in co-nondeterministic time $O(2^{(1 - \varepsilon)n})$, then there exist small families of matrices with high rigidity as well as small families of three-dimensional tensors of high rank.
△ Less
Submitted 4 April, 2025; v1 submitted 5 November, 2024;
originally announced November 2024.
-
Toward Better Depth Lower Bounds: Strong Composition of XOR and a Random Function
Authors:
Nikolai Chukhin,
Alexander S. Kulikov,
Ivan Mihajlin
Abstract:
Proving formula depth lower bounds is a fundamental challenge in complexity theory, with the strongest known bound of $(3 - o(1))\log n$ established by Hastad over 25 years ago. The Karchmer-Raz-Wigderson (KRW) conjecture offers a promising approach to advance these bounds and separate P from NC$^{1}$. It suggests that the depth complexity of a function composition $f \diamond g$ approximates the…
▽ More
Proving formula depth lower bounds is a fundamental challenge in complexity theory, with the strongest known bound of $(3 - o(1))\log n$ established by Hastad over 25 years ago. The Karchmer-Raz-Wigderson (KRW) conjecture offers a promising approach to advance these bounds and separate P from NC$^{1}$. It suggests that the depth complexity of a function composition $f \diamond g$ approximates the sum of the depth complexities of $f$ and $g$.
The Karchmer-Wigderson (KW) relation framework translates formula depth into communication complexity, restating the KRW conjecture as $\mathsf{CC}(\mathsf{KW}_f \diamond \mathsf{KW}_g) \approx \mathsf{CC}(\mathsf{KW}_f) + \mathsf{CC}(\mathsf{KW}_g)$. Prior work has confirmed the conjecture under various relaxations, often replacing one or both KW relations with the universal relation or constraining the communication game through strong composition.
In this paper, we examine the strong composition $\mathsf{KW}_{\mathsf{XOR}} \circledast \mathsf{KW}_f$ of the parity function and a random Boolean function $f$. We prove that with probability $1-o(1)$, any protocol solving this composition requires at least $n^{3 - o(1)}$ leaves. This result establishes a depth lower bound of $(3 - o(1))\log n$, matching Hastad's bound, but is applicable to a broader class of inner functions, even when the outer function is simple. Though bounds for the strong composition do not translate directly to formula depth bounds, they usually help to analyze the standard composition (of the corresponding two functions) which is directly related to formula depth.
△ Less
Submitted 29 January, 2025; v1 submitted 14 October, 2024;
originally announced October 2024.
-
Improved Space Bounds for Subset Sum
Authors:
Tatiana Belova,
Nikolai Chukhin,
Alexander S. Kulikov,
Ivan Mihajlin
Abstract:
More than 40 years ago, Schroeppel and Shamir presented an algorithm that solves the Subset Sum problem for $n$ integers in time $O^*(2^{0.5n})$ and space $O^*(2^{0.25n})$. The time upper bound remains unbeaten, but the space upper bound has been improved to $O^*(2^{0.249999n})$ in a recent breakthrough paper by Nederlof and Węgrzycki (STOC 2021). Their algorithm is a clever combination of a numbe…
▽ More
More than 40 years ago, Schroeppel and Shamir presented an algorithm that solves the Subset Sum problem for $n$ integers in time $O^*(2^{0.5n})$ and space $O^*(2^{0.25n})$. The time upper bound remains unbeaten, but the space upper bound has been improved to $O^*(2^{0.249999n})$ in a recent breakthrough paper by Nederlof and Węgrzycki (STOC 2021). Their algorithm is a clever combination of a number of previously known techniques with a new reduction and a new algorithm for the Orthogonal Vectors problem. In this paper, we improve the space bound by Nederlof and Węgrzycki to $O^*(2^{0.246n})$ and also simplify their algorithm and its analysis. We achieve this by using an idea, due to Howgrave-Graham and Joux, of using a random prime number to filter the family of subsets. We incorporate it into the algorithm by Schroeppel and Shamir and then use this amalgam inside the representation technique. This allows us to reduce an instance of Subset Sum to a larger number of instances of weighted orthogonal vector.
△ Less
Submitted 1 August, 2024; v1 submitted 20 February, 2024;
originally announced February 2024.
-
Computations with polynomial evaluation oracle: ruling out superlinear SETH-based lower bounds
Authors:
Tatiana Belova,
Alexander S. Kulikov,
Ivan Mihajlin,
Olga Ratseeva,
Grigory Reznikov,
Denil Sharipov
Abstract:
The field of fine-grained complexity aims at proving conditional lower bounds on the time complexity of computational problems. One of the most popular assumptions, Strong Exponential Time Hypothesis (SETH), implies that SAT cannot be solved in $2^{(1-ε)n}$ time. In recent years, it has been proved that known algorithms for many problems are optimal under SETH. Despite the wide applicability of SE…
▽ More
The field of fine-grained complexity aims at proving conditional lower bounds on the time complexity of computational problems. One of the most popular assumptions, Strong Exponential Time Hypothesis (SETH), implies that SAT cannot be solved in $2^{(1-ε)n}$ time. In recent years, it has been proved that known algorithms for many problems are optimal under SETH. Despite the wide applicability of SETH, for many problems, there are no known SETH-based lower bounds, so the quest for new reductions continues.
Two barriers for proving SETH-based lower bounds are known. Carmosino et al. (ITCS 2016) introduced the Nondeterministic Strong Exponential Time Hypothesis (NSETH) stating that TAUT cannot be solved in time $2^{(1-ε)n}$ even if one allows nondeterminism. They used this hypothesis to show that some natural fine-grained reductions would be difficult to obtain: proving that, say, 3-SUM requires time $n^{1.5+ε}$ under SETH, breaks NSETH and this, in turn, implies strong circuit lower bounds. Recently, Belova et al. (SODA 2023) introduced the so-called polynomial formulations to show that for many NP-hard problems, proving any explicit exponential lower bound under SETH also implies strong circuit lower bounds.
We prove that for a range of problems from P, including $k$-SUM and triangle detection, proving superlinear lower bounds under SETH is challenging as it implies new circuit lower bounds. To this end, we show that these problems can be solved in nearly linear time with oracle calls to evaluating a polynomial of constant degree. Then, we introduce a strengthening of SETH stating that solving SAT in time $2^{(1-\varepsilon)n}$ is difficult even if one has constant degree polynomial evaluation oracle calls. This hypothesis is stronger and less believable than SETH, but refuting it is still challenging: we show that this implies circuit lower bounds.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
Polynomial formulations as a barrier for reduction-based hardness proofs
Authors:
Tatiana Belova,
Alexander Golovnev,
Alexander S. Kulikov,
Ivan Mihajlin,
Denil Sharipov
Abstract:
The Strong Exponential Time Hypothesis (SETH) asserts that for every $\varepsilon>0$ there exists $k$ such that $k$-SAT requires time $(2-\varepsilon)^n$. The field of fine-grained complexity has leveraged SETH to prove quite tight conditional lower bounds for dozens of problems in various domains and complexity classes, including Edit Distance, Graph Diameter, Hitting Set, Independent Set, and Or…
▽ More
The Strong Exponential Time Hypothesis (SETH) asserts that for every $\varepsilon>0$ there exists $k$ such that $k$-SAT requires time $(2-\varepsilon)^n$. The field of fine-grained complexity has leveraged SETH to prove quite tight conditional lower bounds for dozens of problems in various domains and complexity classes, including Edit Distance, Graph Diameter, Hitting Set, Independent Set, and Orthogonal Vectors. Yet, it has been repeatedly asked in the literature whether SETH-hardness results can be proven for other fundamental problems such as Hamiltonian Path, Independent Set, Chromatic Number, MAX-$k$-SAT, and Set Cover.
In this paper, we show that fine-grained reductions implying even $λ^n$-hardness of these problems from SETH for any $λ>1$, would imply new circuit lower bounds: super-linear lower bounds for Boolean series-parallel circuits or polynomial lower bounds for arithmetic circuits (each of which is a four-decade open question).
We also extend this barrier result to the class of parameterized problems. Namely, for every $λ>1$ we conditionally rule out fine-grained reductions implying SETH-based lower bounds of $λ^k$ for a number of problems parameterized by the solution size $k$.
Our main technical tool is a new concept called polynomial formulations. In particular, we show that many problems can be represented by relatively succinct low-degree polynomials, and that any problem with such a representation cannot be proven SETH-hard (without proving new circuit lower bounds).
△ Less
Submitted 29 November, 2022; v1 submitted 16 May, 2022;
originally announced May 2022.
-
CNF Encodings of Parity
Authors:
Gregory Emdin,
Alexander S. Kulikov,
Ivan Mihajlin,
Nikita Slezkin
Abstract:
The minimum number of clauses in a CNF representation of the parity function $x_1 \oplus x_2 \oplus \dotsb \oplus x_n$ is $2^{n-1}$. One can obtain a more compact CNF encoding by using non-deterministic variables (also known as guess or auxiliary variables). In this paper, we prove the following lower bounds, that almost match known upper bounds, on the number $m$ of clauses and the maximum width…
▽ More
The minimum number of clauses in a CNF representation of the parity function $x_1 \oplus x_2 \oplus \dotsb \oplus x_n$ is $2^{n-1}$. One can obtain a more compact CNF encoding by using non-deterministic variables (also known as guess or auxiliary variables). In this paper, we prove the following lower bounds, that almost match known upper bounds, on the number $m$ of clauses and the maximum width $k$ of clauses: 1) if there are at most $s$ auxiliary variables, then $m \ge Ω\left(2^{n/(s+1)}/n\right)$ and $k \ge n/(s+1)$; 2) the minimum number of clauses is at least $3n$. We derive the first two bounds from the Satisfiability Coding Lemma due to Paturi, Pudlak, and Zane.
△ Less
Submitted 16 May, 2022; v1 submitted 2 March, 2022;
originally announced March 2022.
-
SAT-based Circuit Local Improvement
Authors:
Alexander S. Kulikov,
Danila Pechenev,
Nikita Slezkin
Abstract:
Finding exact circuit size is a notorious optimization problem in practice. Whereas modern computers and algorithmic techniques allow to find a circuit of size seven in blink of an eye, it may take more than a week to search for a circuit of size thirteen. One of the reasons of this behavior is that the search space is enormous: the number of circuits of size $s$ is $s^{Θ(s)}$, the number of Boole…
▽ More
Finding exact circuit size is a notorious optimization problem in practice. Whereas modern computers and algorithmic techniques allow to find a circuit of size seven in blink of an eye, it may take more than a week to search for a circuit of size thirteen. One of the reasons of this behavior is that the search space is enormous: the number of circuits of size $s$ is $s^{Θ(s)}$, the number of Boolean functions on $n$ variables is $2^{2^n}$.
In this paper, we explore the following natural heuristic idea for decreasing the size of a given circuit: go through all its subcircuits of moderate size and check whether any of them can be improved by reducing to SAT. This may be viewed as a local search approach: we search for a smaller circuit in a ball around a given circuit. Through this approach, we prove new upper bounds on the circuit size of various symmetric functions. We also demonstrate that some upper bounds that were proved by hand decades ago, nowadays can be found automatically in a few seconds.
△ Less
Submitted 27 April, 2022; v1 submitted 19 February, 2021;
originally announced February 2021.
-
Complexity of Linear Operators
Authors:
Alexander S. Kulikov,
Ivan Mikhailin,
Andrey Mokhov,
Vladimir Podolskii
Abstract:
Let $A \in \{0,1\}^{n \times n}$ be a matrix with $z$ zeroes and $u$ ones and $x$ be an $n$-dimensional vector of formal variables over a semigroup $(S, \circ)$. How many semigroup operations are required to compute the linear operator $Ax$?
As we observe in this paper, this problem contains as a special case the well-known range queries problem and has a rich variety of applications in such are…
▽ More
Let $A \in \{0,1\}^{n \times n}$ be a matrix with $z$ zeroes and $u$ ones and $x$ be an $n$-dimensional vector of formal variables over a semigroup $(S, \circ)$. How many semigroup operations are required to compute the linear operator $Ax$?
As we observe in this paper, this problem contains as a special case the well-known range queries problem and has a rich variety of applications in such areas as graph algorithms, functional programming, circuit complexity, and others. It is easy to compute $Ax$ using $O(u)$ semigroup operations. The main question studied in this paper is: can $Ax$ be computed using $O(z)$ semigroup operations? We prove that in general this is not possible: there exists a matrix $A \in \{0,1\}^{n \times n}$ with exactly two zeroes in every row (hence $z=2n$) whose complexity is $Θ(nα(n))$ where $α(n)$ is the inverse Ackermann function. However, for the case when the semigroup is commutative, we give a constructive proof of an $O(z)$ upper bound. This implies that in commutative settings, complements of sparse matrices can be processed as efficiently as sparse matrices (though the corresponding algorithms are more involved). Note that this covers the cases of Boolean and tropical semirings that have numerous applications, e.g., in graph theory.
As a simple application of the presented linear-size construction, we show how to multiply two $n\times n$ matrices over an arbitrary semiring in $O(n^2)$ time if one of these matrices is a 0/1-matrix with $O(n)$ zeroes (i.e., a complement of a sparse matrix).
△ Less
Submitted 4 January, 2019; v1 submitted 31 December, 2018;
originally announced December 2018.
-
Circuit Depth Reductions
Authors:
Alexander Golovnev,
Alexander S. Kulikov,
R. Ryan Williams
Abstract:
The best known size lower bounds against unrestricted circuits have remained around $3n$ for several decades. Moreover, the only known technique for proving lower bounds in this model, gate elimination, is inherently limited to proving lower bounds of less than $5n$. In this work, we propose a non-gate-elimination approach for obtaining circuit lower bounds, via certain depth-three lower bounds. W…
▽ More
The best known size lower bounds against unrestricted circuits have remained around $3n$ for several decades. Moreover, the only known technique for proving lower bounds in this model, gate elimination, is inherently limited to proving lower bounds of less than $5n$. In this work, we propose a non-gate-elimination approach for obtaining circuit lower bounds, via certain depth-three lower bounds. We prove that every (unbounded-depth) circuit of size $s$ can be expressed as an OR of $2^{s/3.9}$ $16$-CNFs. For DeMorgan formulas, the best known size lower bounds have been stuck at around $n^{3-o(1)}$ for decades. Under a plausible hypothesis about probabilistic polynomials, we show that $n^{4-\varepsilon}$-size DeMorgan formulas have $2^{n^{1-Ω(\varepsilon)}}$-size depth-3 circuits which are approximate sums of $n^{1-Ω(\varepsilon)}$-degree polynomials over ${\mathbb F}_2$. While these structural results do not immediately lead to new lower bounds, they do suggest new avenues of attack on these longstanding lower bound problems.
Our results complement the classical depth-$3$ reduction results of Valiant, which show that logarithmic-depth circuits of linear size can be computed by an OR of $2^{\varepsilon n}$ $n^δ$-CNFs, and slightly stronger results for series-parallel circuits. It is known that no purely graph-theoretic reduction could yield interesting depth-3 circuits from circuits of super-logarithmic depth. We overcome this limitation (for small-size circuits) by taking into account both the graph-theoretic and functional properties of circuits and formulas.
We show that improvements of the following pseudorandom constructions imply new circuit lower bounds: dispersers for varieties, correlation with constant degree polynomials, matrix rigidity, and hardness for depth-$3$ circuits with constant bottom fan-in.
△ Less
Submitted 7 December, 2020; v1 submitted 12 November, 2018;
originally announced November 2018.
-
Collapsing Superstring Conjecture
Authors:
Alexander Golovnev,
Alexander S. Kulikov,
Alexander Logunov,
Ivan Mihajlin,
Maksim Nikolaev
Abstract:
In the Shortest Common Superstring (SCS) problem, one is given a collection of strings, and needs to find a shortest string containing each of them as a substring. SCS admits $2\frac{11}{23}$-approximation in polynomial time (Mucha, SODA'13). While this algorithm and its analysis are technically involved, the 30 years old Greedy Conjecture claims that the trivial and efficient Greedy Algorithm giv…
▽ More
In the Shortest Common Superstring (SCS) problem, one is given a collection of strings, and needs to find a shortest string containing each of them as a substring. SCS admits $2\frac{11}{23}$-approximation in polynomial time (Mucha, SODA'13). While this algorithm and its analysis are technically involved, the 30 years old Greedy Conjecture claims that the trivial and efficient Greedy Algorithm gives a 2-approximation for SCS.
We develop a graph-theoretic framework for studying approximation algorithms for SCS. The framework is reminiscent of the classical 2-approximation for Traveling Salesman: take two copies of an optimal solution, apply a trivial edge-collapsing procedure, and get an approximate solution. In this framework, we observe two surprising properties of SCS solutions, and we conjecture that they hold for all input instances. The first conjecture, that we call Collapsing Superstring conjecture, claims that there is an elementary way to transform any solution repeated twice into the same graph $G$. This conjecture would give an elementary 2-approximate algorithm for SCS. The second conjecture claims that not only the resulting graph $G$ is the same for all solutions, but that $G$ can be computed by an elementary greedy procedure called Greedy Hierarchical Algorithm.
While the second conjecture clearly implies the first one, perhaps surprisingly we prove their equivalence. We support these equivalent conjectures by giving a proof for the special case where all input strings have length at most 3. We prove that the standard Greedy Conjecture implies Greedy Hierarchical Conjecture, while the latter is sufficient for an efficient greedy 2-approximate approximation of SCS. Except for its (conjectured) good approximation ratio, the Greedy Hierarchical Algorithm provably finds a 3.5-approximation.
△ Less
Submitted 3 June, 2020; v1 submitted 23 September, 2018;
originally announced September 2018.
-
Computing Majority by Constant Depth Majority Circuits with Low Fan-in Gates
Authors:
Alexander S. Kulikov,
Vladimir V. Podolskii
Abstract:
We study the following computational problem: for which values of $k$, the majority of $n$ bits $\text{MAJ}_n$ can be computed with a depth two formula whose each gate computes a majority function of at most $k$ bits? The corresponding computational model is denoted by $\text{MAJ}_k \circ \text{MAJ}_k$. We observe that the minimum value of $k$ for which there exists a…
▽ More
We study the following computational problem: for which values of $k$, the majority of $n$ bits $\text{MAJ}_n$ can be computed with a depth two formula whose each gate computes a majority function of at most $k$ bits? The corresponding computational model is denoted by $\text{MAJ}_k \circ \text{MAJ}_k$. We observe that the minimum value of $k$ for which there exists a $\text{MAJ}_k \circ \text{MAJ}_k$ circuit that has high correlation with the majority of $n$ bits is equal to $Θ(n^{1/2})$. We then show that for a randomized $\text{MAJ}_k \circ \text{MAJ}_k$ circuit computing the majority of $n$ input bits with high probability for every input, the minimum value of $k$ is equal to $n^{2/3+o(1)}$. We show a worst case lower bound: if a $\text{MAJ}_k \circ \text{MAJ}_k$ circuit computes the majority of $n$ bits correctly on all inputs, then $k\geq n^{13/19+o(1)}$. This lower bound exceeds the optimal value for randomized circuits and thus is unreachable for pure randomized techniques. For depth $3$ circuits we show that a circuit with $k= O(n^{2/3})$ can compute $\text{MAJ}_n$ correctly on all inputs.
△ Less
Submitted 9 October, 2016;
originally announced October 2016.
-
Philosophical Fictionalism and Problem of Artificial Intelligence
Authors:
Sergey B. Kulikov
Abstract:
The artificial intelligence received broad interpretation as a literary image. This approach did not have unambiguous refering to the scopes of logical studies and mathematical investigations. An author applied methods peculiar to the semiotic approach, offered by Boris Uspensky and Yury Lotman. In addition, the article presented the criticism of modern versions of educational technologies, which…
▽ More
The artificial intelligence received broad interpretation as a literary image. This approach did not have unambiguous refering to the scopes of logical studies and mathematical investigations. An author applied methods peculiar to the semiotic approach, offered by Boris Uspensky and Yury Lotman. In addition, the article presented the criticism of modern versions of educational technologies, which led to the unconditional expectations for possibilities of information and telecommunication technologies. Methodological culture's growth, which was described on the base of semiotics and functional approach to word formation of new meanings for the description of the studied subjects, provided the development of pupils' thought. As a result, the research opened new prospects on understanding of artificial intelligence within educational practice.
△ Less
Submitted 23 February, 2016;
originally announced February 2016.
-
Tight Lower Bounds on Graph Embedding Problems
Authors:
Marek Cygan,
Fedor V. Fomin,
Alexander Golovnev,
Alexander S. Kulikov,
Ivan Mihajlin,
Jakub Pachocki,
Arkadiusz Socała
Abstract:
We prove that unless the Exponential Time Hypothesis (ETH) fails, deciding if there is a homomorphism from graph $G$ to graph $H$ cannot be done in time $|V(H)|^{o(|V(G)|)}$. We also show an exponential-time reduction from Graph Homomorphism to Subgraph Isomorphism. This rules out (subject to ETH) a possibility of $|V(H)|^{o(|V(H)|)}$-time algorithm deciding if graph $G$ is a subgraph of $H$. For…
▽ More
We prove that unless the Exponential Time Hypothesis (ETH) fails, deciding if there is a homomorphism from graph $G$ to graph $H$ cannot be done in time $|V(H)|^{o(|V(G)|)}$. We also show an exponential-time reduction from Graph Homomorphism to Subgraph Isomorphism. This rules out (subject to ETH) a possibility of $|V(H)|^{o(|V(H)|)}$-time algorithm deciding if graph $G$ is a subgraph of $H$. For both problems our lower bounds asymptotically match the running time of brute-force algorithms trying all possible mappings of one graph into another. Thus, our work closes the gap in the known complexity of these fundamental problems.
Moreover, as a consequence of our reductions conditional lower bounds follow for other related problems such as Locally Injective Homomorphism, Graph Minors, Topological Graph Minors, Minimum Distortion Embedding and Quadratic Assignment Problem.
△ Less
Submitted 16 February, 2016;
originally announced February 2016.
-
Tight Bounds for Subgraph Isomorphism and Graph Homomorphism
Authors:
Fedor V. Fomin,
Alexander Golovnev,
Alexander S. Kulikov,
Ivan Mihajlin
Abstract:
We prove that unless Exponential Time Hypothesis (ETH) fails, deciding if there is a homomorphism from graph $G$ to graph $H$ cannot be done in time $|V(H)|^{o(|V(G)|)}$. Combined with the reduction of Cygan, Pachocki, and Socała, our result rules out (subject to ETH) a possibility of $|V(G)|^{o(|V(G)|)}$-time algorithm deciding if graph $H$ is a subgraph of $G$. For both problems our lower bounds…
▽ More
We prove that unless Exponential Time Hypothesis (ETH) fails, deciding if there is a homomorphism from graph $G$ to graph $H$ cannot be done in time $|V(H)|^{o(|V(G)|)}$. Combined with the reduction of Cygan, Pachocki, and Socała, our result rules out (subject to ETH) a possibility of $|V(G)|^{o(|V(G)|)}$-time algorithm deciding if graph $H$ is a subgraph of $G$. For both problems our lower bounds asymptotically match the running time of brute-force algorithms trying all possible mappings of one graph into another. Thus, our work closes the gap in the known complexity of these fundamental problems.
△ Less
Submitted 14 July, 2015;
originally announced July 2015.
-
Lower Bounds for the Graph Homomorphism Problem
Authors:
Fedor V. Fomin,
Alexander Golovnev,
Alexander S. Kulikov,
Ivan Mihajlin
Abstract:
The graph homomorphism problem (HOM) asks whether the vertices of a given $n$-vertex graph $G$ can be mapped to the vertices of a given $h$-vertex graph $H$ such that each edge of $G$ is mapped to an edge of $H$. The problem generalizes the graph coloring problem and at the same time can be viewed as a special case of the $2$-CSP problem. In this paper, we prove several lower bound for HOM under t…
▽ More
The graph homomorphism problem (HOM) asks whether the vertices of a given $n$-vertex graph $G$ can be mapped to the vertices of a given $h$-vertex graph $H$ such that each edge of $G$ is mapped to an edge of $H$. The problem generalizes the graph coloring problem and at the same time can be viewed as a special case of the $2$-CSP problem. In this paper, we prove several lower bound for HOM under the Exponential Time Hypothesis (ETH) assumption. The main result is a lower bound $2^{Ω\left( \frac{n \log h}{\log \log h}\right)}$. This rules out the existence of a single-exponential algorithm and shows that the trivial upper bound $2^{{\mathcal O}(n\log{h})}$ is almost asymptotically tight.
We also investigate what properties of graphs $G$ and $H$ make it difficult to solve HOM$(G,H)$. An easy observation is that an ${\mathcal O}(h^n)$ upper bound can be improved to ${\mathcal O}(h^{\operatorname{vc}(G)})$ where $\operatorname{vc}(G)$ is the minimum size of a vertex cover of $G$. The second lower bound $h^{Ω(\operatorname{vc}(G))}$ shows that the upper bound is asymptotically tight. As to the properties of the "right-hand side" graph $H$, it is known that HOM$(G,H)$ can be solved in time $(f(Δ(H)))^n$ and $(f(\operatorname{tw}(H)))^n$ where $Δ(H)$ is the maximum degree of $H$ and $\operatorname{tw}(H)$ is the treewidth of $H$. This gives single-exponential algorithms for graphs of bounded maximum degree or bounded treewidth. Since the chromatic number $χ(H)$ does not exceed $\operatorname{tw}(H)$ and $Δ(H)+1$, it is natural to ask whether similar upper bounds with respect to $χ(H)$ can be obtained. We provide a negative answer to this question by establishing a lower bound $(f(χ(H)))^n$ for any function $f$. We also observe that similar lower bounds can be obtained for locally injective homomorphisms.
△ Less
Submitted 18 February, 2015;
originally announced February 2015.
-
Parameterized Complexity of Secluded Connectivity Problems
Authors:
Fedor V. Fomin,
Petr A. Golovach,
Nikolay Karpov,
Alexander S. Kulikov
Abstract:
The Secluded Path problem models a situation where a sensitive information has to be transmitted between a pair of nodes along a path in a network. The measure of the quality of a selected path is its exposure, which is the total weight of vertices in its closed neighborhood. In order to minimize the risk of intercepting the information, we are interested in selecting a secluded path, i.e. a path…
▽ More
The Secluded Path problem models a situation where a sensitive information has to be transmitted between a pair of nodes along a path in a network. The measure of the quality of a selected path is its exposure, which is the total weight of vertices in its closed neighborhood. In order to minimize the risk of intercepting the information, we are interested in selecting a secluded path, i.e. a path with a small exposure. Similarly, the Secluded Steiner Tree problem is to find a tree in a graph connecting a given set of terminals such that the exposure of the tree is minimized. The problems were introduced by Chechik et al. in [ESA 2013]. Among other results, Chechik et al. have shown that Secluded Path is fixed-parameter tractable (FPT) on unweighted graphs being parameterized by the maximum vertex degree of the graph and that Secluded Steiner Tree is FPT parameterized by the treewidth of the graph. In this work, we obtain the following results about parameterized complexity of secluded connectivity problems.
We give FPT-algorithms deciding if a graph G with a given cost function contains a secluded path and a secluded Steiner tree of exposure at most k with the cost at most C.
We initiate the study of "above guarantee" parameterizations for secluded problems, where the lower bound is given by the size of a Steiner tree.
We investigate Secluded Steiner Tree from kernelization perspective and provide several lower and upper bounds when parameters are the treewidth, the size of a vertex cover, maximum vertex degree and the solution size. Finally, we refine the algorithmic result of Chechik et al. by improving the exponential dependence from the treewidth of the input graph.
△ Less
Submitted 21 April, 2015; v1 submitted 13 February, 2015;
originally announced February 2015.
-
Parameterized Complexity of Superstring Problems
Authors:
Ivan Bliznets,
Fedor V. Fomin,
Petr A. Golovach,
Nikolay Karpov,
Alexander S. Kulikov,
Saket Saurabh
Abstract:
In the Shortest Superstring problem we are given a set of strings $S=\{s_1, \ldots, s_n\}$ and integer $\ell$ and the question is to decide whether there is a superstring $s$ of length at most $\ell$ containing all strings of $S$ as substrings. We obtain several parameterized algorithms and complexity results for this problem.
In particular, we give an algorithm which in time…
▽ More
In the Shortest Superstring problem we are given a set of strings $S=\{s_1, \ldots, s_n\}$ and integer $\ell$ and the question is to decide whether there is a superstring $s$ of length at most $\ell$ containing all strings of $S$ as substrings. We obtain several parameterized algorithms and complexity results for this problem.
In particular, we give an algorithm which in time $2^{O(k)} \operatorname{poly}(n)$ finds a superstring of length at most $\ell$ containing at least $k$ strings of $S$. We complement this by the lower bound showing that such a parameterization does not admit a polynomial kernel up to some complexity assumption. We also obtain several results about "below guaranteed values" parameterization of the problem. We show that parameterization by compression admits a polynomial kernel while parameterization "below matching" is hard.
△ Less
Submitted 5 February, 2015;
originally announced February 2015.
-
Families with infants: speeding up algorithms for NP-hard problems using FFT
Authors:
Alexander Golovnev,
Alexander S. Kulikov,
Ivan Mihajlin
Abstract:
Assume that a group of people is going to an excursion and our task is to seat them into buses with several constraints each saying that a pair of people does not want to see each other in the same bus. This is a well-known coloring problem and it can be solved in $O^*(2^n)$ time by the inclusion-exclusion principle as shown by Björklund, Husfeldt, and Koivisto in 2009.Another approach to solve th…
▽ More
Assume that a group of people is going to an excursion and our task is to seat them into buses with several constraints each saying that a pair of people does not want to see each other in the same bus. This is a well-known coloring problem and it can be solved in $O^*(2^n)$ time by the inclusion-exclusion principle as shown by Björklund, Husfeldt, and Koivisto in 2009.Another approach to solve this problem in $O^*(2^n)$ time is to use the fast Fourier transform. A graph is $k$-colorable if and only if the $k$-th power of a polynomial containing a monomial $\prod_{i=1}^n x_i^{[i \in I]}$ for each independent set $I \subseteq [n]$ of the graph, contains the monomial $x_1x_2... x_n$.
Assume now that we have additional constraints: the group of people contains several infants and these infants should be accompanied by their relatives in a bus. We show that if the number of infants is linear then the problem can be solved in $O^*((2-\varepsilon)^n)$ time. We use this approach to improve known bounds for several NP-hard problems (the traveling salesman problem, the graph coloring problem, the problem of counting perfect matchings) on graphs of bounded average degree, as well as to simplify the proofs of several known results.
△ Less
Submitted 8 October, 2014;
originally announced October 2014.
-
Possibilities of technologization of philosophical knowledge
Authors:
Sergey Kulikov
Abstract:
Article purpose is the analysis of a question of possibility of technologization of philosophical knowledge. We understand the organization of cognitive activity which is guided by the set of methods guaranteed bringing to successful (i.e. to precisely corresponding set parameters) to applied results as technologization. Transformation of sense of philosophy allows revealing possibilities of its t…
▽ More
Article purpose is the analysis of a question of possibility of technologization of philosophical knowledge. We understand the organization of cognitive activity which is guided by the set of methods guaranteed bringing to successful (i.e. to precisely corresponding set parameters) to applied results as technologization. Transformation of sense of philosophy allows revealing possibilities of its technologization. The leading role in this process is played by philosophy of science which creates conditions for such transformation. At the same time there is justified an appeal to branch combination theory of the directions of scientific knowledge and partial refusal of understanding of philosophy as synthetic knowledge in which the main task is permission, instead of generation of paradoxes.
△ Less
Submitted 10 July, 2014;
originally announced July 2014.
-
Families with infants: a general approach to solve hard partition problems
Authors:
Alexander Golovnev,
Alexander S. Kulikov,
Ivan Mihajlin
Abstract:
We introduce a general approach for solving partition problems where the goal is to represent a given set as a union (either disjoint or not) of subsets satisfying certain properties. Many NP-hard problems can be naturally stated as such partition problems. We show that if one can find a large enough system of so-called families with infants for a given problem, then this problem can be solved fas…
▽ More
We introduce a general approach for solving partition problems where the goal is to represent a given set as a union (either disjoint or not) of subsets satisfying certain properties. Many NP-hard problems can be naturally stated as such partition problems. We show that if one can find a large enough system of so-called families with infants for a given problem, then this problem can be solved faster than by a straightforward algorithm. We use this approach to improve known bounds for several NP-hard problems as well as to simplify the proofs of several known results.
For the chromatic number problem we present an algorithm with $O^*((2-\varepsilon(d))^n)$ time and exponential space for graphs of average degree $d$. This improves the algorithm by Björklund et al. [Theory Comput. Syst. 2010] that works for graphs of bounded maximum (as opposed to average) degree and closes an open problem stated by Cygan and Pilipczuk [ICALP 2013].
For the traveling salesman problem we give an algorithm working in $O^*((2-\varepsilon(d))^n)$ time and polynomial space for graphs of average degree $d$. The previously known results of this kind is a polyspace algorithm by Björklund et al. [ICALP 2008] for graphs of bounded maximum degree and an exponential space algorithm for bounded average degree by Cygan and Pilipczuk [ICALP 2013].
For counting perfect matching in graphs of average degree~$d$ we present an algorithm with running time $O^*((2-\varepsilon(d))^{n/2})$ and polynomial space. Recent algorithms of this kind due to Cygan, Pilipczuk [ICALP 2013] and Izumi, Wadayama [FOCS 2012] (for bipartite graphs only) use exponential space.
△ Less
Submitted 9 October, 2014; v1 submitted 11 November, 2013;
originally announced November 2013.
-
Limits of Approximation Algorithms: PCPs and Unique Games (DIMACS Tutorial Lecture Notes)
Authors:
Prahladh Harsha,
Moses Charikar,
Matthew Andrews,
Sanjeev Arora,
Subhash Khot,
Dana Moshkovitz,
Lisa Zhang,
Ashkan Aazami,
Dev Desai,
Igor Gorodezky,
Geetha Jagannathan,
Alexander S. Kulikov,
Darakhshan J. Mir,
Alantha Newman,
Aleksandar Nikolov,
David Pritchard,
Gwen Spencer
Abstract:
These are the lecture notes for the DIMACS Tutorial "Limits of Approximation Algorithms: PCPs and Unique Games" held at the DIMACS Center, CoRE Building, Rutgers University on 20-21 July, 2009. This tutorial was jointly sponsored by the DIMACS Special Focus on Hardness of Approximation, the DIMACS Special Focus on Algorithmic Foundations of the Internet, and the Center for Computational Intracta…
▽ More
These are the lecture notes for the DIMACS Tutorial "Limits of Approximation Algorithms: PCPs and Unique Games" held at the DIMACS Center, CoRE Building, Rutgers University on 20-21 July, 2009. This tutorial was jointly sponsored by the DIMACS Special Focus on Hardness of Approximation, the DIMACS Special Focus on Algorithmic Foundations of the Internet, and the Center for Computational Intractability with support from the National Security Agency and the National Science Foundation.
The speakers at the tutorial were Matthew Andrews, Sanjeev Arora, Moses Charikar, Prahladh Harsha, Subhash Khot, Dana Moshkovitz and Lisa Zhang. The sribes were Ashkan Aazami, Dev Desai, Igor Gorodezky, Geetha Jagannathan, Alexander S. Kulikov, Darakhshan J. Mir, Alantha Newman, Aleksandar Nikolov, David Pritchard and Gwen Spencer.
△ Less
Submitted 20 February, 2010;
originally announced February 2010.