-
Formula Size-Depth Tradeoffs for Iterated Sub-Permutation Matrix Multiplication
Authors:
Benjamin Rossman
Abstract:
We study the formula complexity of Iterated Sub-Permutation Matrix Multiplication, the logspace-complete problem of computing the product of $k$ $n$-by-$n$ Boolean matrices with at most a single $1$ in each row and column. For all $d \le \log k$, this problem is solvable by $n^{O(dk^{1/d})}$ size monotone formulas of two distinct types: (unbounded fan-in) $AC^0$ formulas of depth $d+1$ and (semi-u…
▽ More
We study the formula complexity of Iterated Sub-Permutation Matrix Multiplication, the logspace-complete problem of computing the product of $k$ $n$-by-$n$ Boolean matrices with at most a single $1$ in each row and column. For all $d \le \log k$, this problem is solvable by $n^{O(dk^{1/d})}$ size monotone formulas of two distinct types: (unbounded fan-in) $AC^0$ formulas of depth $d+1$ and (semi-unbounded fan-in) $SAC^0$ formulas of $\bigwedge$-depth $d$ and $\bigwedge$-fan-in $k^{1/d}$. The results of this paper give matching $n^{Ω(dk^{1/d})}$ lower bounds for monotone $AC^0$ and $SAC^0$ formulas for all $k \le \log\log n$, as well as slightly weaker $n^{Ω(dk^{1/2d})}$ lower bounds for non-monotone $AC^0$ and $SAC^0$ formulas. These size-depth tradeoffs converge at $d = \log k$ to tight $n^{Ω(\log k)}$ lower bounds for both unbounded-depth monotone formulas [Ros15] and bounded-depth non-monotone formulas [Ros18]. Our non-monotone lower bounds extend to the more restricted Iterated Permutation Matrix Multiplication problem, improving the previous $n^{k^{1/\exp(O(d))}}$ tradeoff for this problem [BIP98].
△ Less
Submitted 23 June, 2024;
originally announced June 2024.
-
Symmetric Formulas for Products of Permutations
Authors:
William He,
Benjamin Rossman
Abstract:
We study the formula complexity of the word problem $\mathsf{Word}_{S_n,k} : \{0,1\}^{kn^2} \to \{0,1\}$: given $n$-by-$n$ permutation matrices $M_1,\dots,M_k$, compute the $(1,1)$-entry of the matrix product $M_1\cdots M_k$. An important feature of this function is that it is invariant under action of $S_n^{k-1}$ given by \[
(π_1,\dots,π_{k-1})(M_1,\dots,M_k) = (M_1π_1^{-1},π_1M_2π_2^{-1},\dots…
▽ More
We study the formula complexity of the word problem $\mathsf{Word}_{S_n,k} : \{0,1\}^{kn^2} \to \{0,1\}$: given $n$-by-$n$ permutation matrices $M_1,\dots,M_k$, compute the $(1,1)$-entry of the matrix product $M_1\cdots M_k$. An important feature of this function is that it is invariant under action of $S_n^{k-1}$ given by \[
(π_1,\dots,π_{k-1})(M_1,\dots,M_k) = (M_1π_1^{-1},π_1M_2π_2^{-1},\dots,π_{k-2}M_{k-1}π_{k-1}^{-1},π_{k-1}M_k). \] This symmetry is also exhibited in the smallest known unbounded fan-in $\{\mathsf{AND},\mathsf{OR},\mathsf{NOT}\}$-formulas for $\mathsf{Word}_{S_n,k}$, which have size $n^{O(\log k)}$.
In this paper we prove a matching $n^{Ω(\log k)}$ lower bound for $S_n^{k-1}$-invariant formulas computing $\mathsf{Word}_{S_n,k}$. This result is motivated by the fact that a similar lower bound for unrestricted (non-invariant) formulas would separate complexity classes $\mathsf{NC}^1$ and $\mathsf{Logspace}$.
Our more general main theorem gives a nearly tight $n^{d(k^{1/d}-1)}$ lower bound on the $G^{k-1}$-invariant depth-$d$ $\{\mathsf{MAJ},\mathsf{AND},\mathsf{OR},\mathsf{NOT}\}$-formula size of $\mathsf{Word}_{G,k}$ for any finite simple group $G$ whose minimum permutation representation has degree~$n$. We also give nearly tight lower bounds on the $G^{k-1}$-invariant depth-$d$ $\{\mathsf{AND},\mathsf{OR},\mathsf{NOT}\}$-formula size in the case where $G$ is an abelian group.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.
-
Shrinkage of Decision Lists and DNF Formulas
Authors:
Benjamin Rossman
Abstract:
We establish nearly tight bounds on the expected shrinkage of decision lists and DNF formulas under the $p$-random restriction $\mathbf R_p$ for all values of $p \in [0,1]$. For a function $f$ with domain $\{0,1\}^n$, let $\mathrm{DL}(f)$ denote the minimum size of a decision list that computes $f$. We show that \[
\mathbb E[\ \mathrm{DL}(f{\upharpoonright}\mathbf R_p)\ ] \le
\mathrm{DL}(f)^{\…
▽ More
We establish nearly tight bounds on the expected shrinkage of decision lists and DNF formulas under the $p$-random restriction $\mathbf R_p$ for all values of $p \in [0,1]$. For a function $f$ with domain $\{0,1\}^n$, let $\mathrm{DL}(f)$ denote the minimum size of a decision list that computes $f$. We show that \[
\mathbb E[\ \mathrm{DL}(f{\upharpoonright}\mathbf R_p)\ ] \le
\mathrm{DL}(f)^{\log_{2/(1-p)}(\frac{1+p}{1-p})}. \] For example, this bound is $\sqrt{\mathrm{DL}(f)}$ when $p = \sqrt{5}-2 \approx 0.24$. For Boolean functions $f$, we obtain the same shrinkage bound with respect to DNF formula size plus $1$ (i.e., replacing $\mathrm{DL}(\cdot)$ with $\mathrm{DNF}(\cdot)+1$ on both sides of the inequality).
△ Less
Submitted 26 December, 2020; v1 submitted 9 December, 2020;
originally announced December 2020.
-
Monotone Circuit Lower Bounds from Robust Sunflowers
Authors:
Bruno Pasqualotto Cavalar,
Mrinal Kumar,
Benjamin Rossman
Abstract:
Robust sunflowers are a generalization of combinatorial sunflowers that have applications in monotone circuit complexity, DNF sparsification, randomness extractors, and recent advances on the Erdős-Rado sunflower conjecture. The recent breakthrough of Alweiss, Lovett, Wu and Zhang gives an improved bound on the maximum size of a $w$-set system that excludes a robust sunflower. In this paper, we us…
▽ More
Robust sunflowers are a generalization of combinatorial sunflowers that have applications in monotone circuit complexity, DNF sparsification, randomness extractors, and recent advances on the Erdős-Rado sunflower conjecture. The recent breakthrough of Alweiss, Lovett, Wu and Zhang gives an improved bound on the maximum size of a $w$-set system that excludes a robust sunflower. In this paper, we use this result to obtain an $\exp(n^{1/2-o(1)})$ lower bound on the monotone circuit size of an explicit $n$-variate monotone function, improving the previous best known $\exp(n^{1/3-o(1)})$ due to Andreev and Harnik and Raz. We also show an $\exp(Ω(n))$ lower bound on the monotone arithmetic circuit size of a related polynomial. Finally, we introduce a notion of robust clique-sunflowers and use this to prove an $n^{Ω(k)}$ lower bound on the monotone circuit size of the CLIQUE function for all $k \le n^{1/3-o(1)}$, strengthening the bound of Alon and Boppana.
△ Less
Submitted 5 August, 2022; v1 submitted 7 December, 2020;
originally announced December 2020.
-
Tree-depth and the Formula Complexity of Subgraph Isomorphism
Authors:
Deepanshu Kush,
Benjamin Rossman
Abstract:
For a fixed "pattern" graph $G$, the $\textit{colored $G$-subgraph isomorphism problem}$ (denoted $\mathrm{SUB}(G)$) asks, given an $n$-vertex graph $H$ and a coloring $V(H) \to V(G)$, whether $H$ contains a properly colored copy of $G$. The complexity of this problem is tied to parameterized versions of $\mathit{P}$ ${=}?$ $\mathit{NP}$ and $\mathit{L}$ ${=}?$ $\mathit{NL}$, among other questions…
▽ More
For a fixed "pattern" graph $G$, the $\textit{colored $G$-subgraph isomorphism problem}$ (denoted $\mathrm{SUB}(G)$) asks, given an $n$-vertex graph $H$ and a coloring $V(H) \to V(G)$, whether $H$ contains a properly colored copy of $G$. The complexity of this problem is tied to parameterized versions of $\mathit{P}$ ${=}?$ $\mathit{NP}$ and $\mathit{L}$ ${=}?$ $\mathit{NL}$, among other questions. An overarching goal is to understand the complexity of $\mathrm{SUB}(G)$, under different computational models, in terms of natural invariants of the pattern graph $G$.
In this paper, we establish a close relationship between the $\textit{formula complexity}$ of $\mathrm{SUB}$ and an invariant known as $\textit{tree-depth}$ (denoted $\mathrm{td}(G)$). $\mathrm{SUB}(G)$ is known to be solvable by monotone $\mathit{AC^0}$ formulas of size $O(n^{\mathrm{td}(G)})$. Our main result is an $n^{\tildeΩ(\mathrm{td}(G)^{1/3})}$ lower bound for formulas that are monotone $\textit{or}$ have sub-logarithmic depth. This complements a lower bound of Li, Razborov and Rossman (SICOMP 2017) relating tree-width and $\mathit{AC^0}$ circuit size. As a corollary, it implies a stronger homomorphism preservation theorem for first-order logic on finite structures (Rossman, ITCS 2017).
The technical core of this result is an $n^{Ω(k)}$ lower bound in the special case where $G$ is a complete binary tree of height $k$, which we establish using the $\textit{pathset framework}$ introduced in (Rossman, SICOMP 2018). (The lower bound for general patterns follows via a recent excluded-minor characterization of tree-depth (Czerwiński et al, arXiv:1904.13077).) Additional results of this paper extend the pathset framework and improve upon both, the best known upper and lower bounds on the average-case formula size of $\mathrm{SUB}(G)$ when $G$ is a path.
△ Less
Submitted 28 April, 2020;
originally announced April 2020.
-
Thresholds in the Lattice of Subspaces of $(\mathbb F_q)^n$
Authors:
Benjamin Rossman
Abstract:
Let $Q$ be an ideal (downward-closed set) in the lattice of linear subspaces of $(\mathbb F_q)^n$, ordered by inclusion. For $0 \le k \le n$, let $μ_k(Q)$ denote the fraction of $k$-dimensional subspaces that belong to $Q$. We show that these densities satisfy \[ μ_k(Q) = \frac{1}{1+z} \quad\Longrightarrow\quad μ_{k+1}(Q) \le \frac{1}{1+qz}. \] This implies a sharp threshold theorem: if…
▽ More
Let $Q$ be an ideal (downward-closed set) in the lattice of linear subspaces of $(\mathbb F_q)^n$, ordered by inclusion. For $0 \le k \le n$, let $μ_k(Q)$ denote the fraction of $k$-dimensional subspaces that belong to $Q$. We show that these densities satisfy \[ μ_k(Q) = \frac{1}{1+z} \quad\Longrightarrow\quad μ_{k+1}(Q) \le \frac{1}{1+qz}. \] This implies a sharp threshold theorem: if $μ_k(Q) \le 1-\varepsilon$, then $μ_\ell(Q) \le \varepsilon$ for $\ell = k + O(\log_q(1/\varepsilon))$.
△ Less
Submitted 1 October, 2019;
originally announced October 2019.
-
Subspace-Invariant AC$^0$ Formulas
Authors:
Benjamin Rossman
Abstract:
We consider the action of a linear subspace $U$ of $\{0,1\}^n$ on the set of AC$^0$ formulas with inputs labeled by literals in the set $\{X_1,\overline X_1,\dots,X_n,\overline X_n\}$, where an element $u \in U$ acts on formulas by transposing the $i$th pair of literals for all $i \in [n]$ such that $u_i=1$. A formula is {\em $U$-invariant} if it is fixed by this action. For example, there is a we…
▽ More
We consider the action of a linear subspace $U$ of $\{0,1\}^n$ on the set of AC$^0$ formulas with inputs labeled by literals in the set $\{X_1,\overline X_1,\dots,X_n,\overline X_n\}$, where an element $u \in U$ acts on formulas by transposing the $i$th pair of literals for all $i \in [n]$ such that $u_i=1$. A formula is {\em $U$-invariant} if it is fixed by this action. For example, there is a well-known recursive construction of depth $d+1$ formulas of size $O(n{\cdot}2^{dn^{1/d}})$ computing the $n$-variable PARITY function; these formulas are easily seen to be $P$-invariant where $P$ is the subspace of even-weight elements of $\{0,1\}^n$. In this paper we establish a nearly matching $2^{d(n^{1/d}-1)}$ lower bound on the $P$-invariant depth $d+1$ formula size of PARITY. Quantitatively this improves the best known $Ω(2^{\frac{1}{84}d(n^{1/d}-1)})$ lower bound for {\em unrestricted} depth $d+1$ formulas, while avoiding the use of the switching lemma. More generally, for any linear subspaces $U \subset V$, we show that if a Boolean function is $U$-invariant and non-constant over $V$, then its $U$-invariant depth $d+1$ formula size is at least $2^{d(m^{1/d}-1)}$ where $m$ is the minimum Hamming weight of a vector in $U^\bot \setminus V^\bot$.
△ Less
Submitted 23 July, 2019; v1 submitted 12 June, 2018;
originally announced June 2018.
-
Separation of AC$^0[\oplus]$ Formulas and Circuits
Authors:
Benjamin Rossman,
Srikanth Srinivasan
Abstract:
This paper gives the first separation between the power of {\em formulas} and {\em circuits} of equal depth in the $\mathrm{AC}^0[\oplus]$ basis (unbounded fan-in AND, OR, NOT and MOD$_2$ gates). We show, for all $d(n) \le O(\frac{\log n}{\log\log n})$, that there exist {\em polynomial-size depth-$d$ circuits} that are not equivalent to {\em depth-$d$ formulas of size $n^{o(d)}$} (moreover, this i…
▽ More
This paper gives the first separation between the power of {\em formulas} and {\em circuits} of equal depth in the $\mathrm{AC}^0[\oplus]$ basis (unbounded fan-in AND, OR, NOT and MOD$_2$ gates). We show, for all $d(n) \le O(\frac{\log n}{\log\log n})$, that there exist {\em polynomial-size depth-$d$ circuits} that are not equivalent to {\em depth-$d$ formulas of size $n^{o(d)}$} (moreover, this is optimal in that $n^{o(d)}$ cannot be improved to $n^{O(d)}$). This result is obtained by a combination of new lower and upper bounds for {\em Approximate Majorities}, the class of Boolean functions $\{0,1\}^n \to \{0,1\}$ that agree with the Majority function on $3/4$ fraction of inputs.
$\mathrm{AC}^0[\oplus]$ formula lower bound: We show that every depth-$d$ $\mathrm{AC}^0[\oplus]$ formula of size $s$ has a {\em $1/8$-error polynomial approximation} over $\mathbb{F}_2$ of degree $O(\frac{1}{d}\log s)^{d-1}$. This strengthens a classic $O(\log s)^{d-1}$ degree approximation for \underline{circuits} due to Razborov. Since the Majority function has approximate degree $Θ(\sqrt n)$, this result implies an $\exp(Ω(dn^{1/2(d-1)}))$ lower bound on the depth-$d$ $\mathrm{AC}^0[\oplus]$ formula size of all Approximate Majority functions for all $d(n) \le O(\log n)$.
Monotone $\mathrm{AC}^0$ circuit upper bound: For all $d(n) \le O(\frac{\log n}{\log\log n})$, we give a randomized construction of depth-$d$ monotone $\mathrm{AC}^0$ circuits (without NOT or MOD$_2$ gates) of size $\exp(O(n^{1/2(d-1)}))$ that compute an Approximate Majority function. This strengthens a construction of \underline{formulas} of size $\exp(O(dn^{1/2(d-1)}))$ due to Amano.
△ Less
Submitted 12 February, 2017;
originally announced February 2017.
-
An Improved Homomorphism Preservation Theorem From Lower Bounds in Circuit Complexity
Authors:
Benjamin Rossman
Abstract:
Previous work of the author [39] showed that the Homomorphism Preservation Theorem of classical model theory remains valid when its statement is restricted to finite structures. In this paper, we give a new proof of this result via a reduction to lower bounds in circuit complexity, specifically on the AC$^0$ formula size of the colored subgraph isomorphism problem. Formally, we show the following:…
▽ More
Previous work of the author [39] showed that the Homomorphism Preservation Theorem of classical model theory remains valid when its statement is restricted to finite structures. In this paper, we give a new proof of this result via a reduction to lower bounds in circuit complexity, specifically on the AC$^0$ formula size of the colored subgraph isomorphism problem. Formally, we show the following: if a first-order sentence $Φ$ of quantifier-rank $k$ is preserved under homomorphisms on finite structures, then it is equivalent on finite structures to an existential-positive sentence $Ψ$ of quantifier-rank $k^{O(1)}$. Quantitatively, this improves the result of [39], where the upper bound on the quantifier-rank of $Ψ$ is a non-elementary function of $k$.
△ Less
Submitted 24 December, 2016;
originally announced December 2016.
-
The Average Sensitivity of Bounded-Depth Formulas
Authors:
Benjamin Rossman
Abstract:
We show that unbounded fan-in boolean formulas of depth $d+1$ and size $s$ have average sensitivity $O(\frac{1}{d}\log s)^d$. In particular, this gives a tight $2^{Ω(d(n^{1/d}-1))}$ lower bound on the size of depth $d+1$ formulas computing the \textsc{parity} function. These results strengthen the corresponding $2^{Ω(n^{1/d})}$ and $O(\log s)^d$ bounds for circuits due to Håstad (1986) and Boppana…
▽ More
We show that unbounded fan-in boolean formulas of depth $d+1$ and size $s$ have average sensitivity $O(\frac{1}{d}\log s)^d$. In particular, this gives a tight $2^{Ω(d(n^{1/d}-1))}$ lower bound on the size of depth $d+1$ formulas computing the \textsc{parity} function. These results strengthen the corresponding $2^{Ω(n^{1/d})}$ and $O(\log s)^d$ bounds for circuits due to Håstad (1986) and Boppana (1997). Our proof technique studies a random process where the Switching Lemma is applied to formulas in an efficient manner.
△ Less
Submitted 31 August, 2015;
originally announced August 2015.
-
An average-case depth hierarchy theorem for Boolean circuits
Authors:
Benjamin Rossman,
Rocco A. Servedio,
Li-Yang Tan
Abstract:
We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of $\mathsf{AND}$, $\mathsf{OR}$, and $\mathsf{NOT}$ gates. Our hierarchy theorem says that for every $d \geq 2$, there is an explicit $n$-variable Boolean function $f$, computed by a linear-size depth-$d$ formula, which is such that any depth-$(d-1)$ circuit that agrees with $f$ on $(1/2 + o_n(1))$ fract…
▽ More
We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of $\mathsf{AND}$, $\mathsf{OR}$, and $\mathsf{NOT}$ gates. Our hierarchy theorem says that for every $d \geq 2$, there is an explicit $n$-variable Boolean function $f$, computed by a linear-size depth-$d$ formula, which is such that any depth-$(d-1)$ circuit that agrees with $f$ on $(1/2 + o_n(1))$ fraction of all inputs must have size $\exp({n^{Ω(1/d)}}).$ This answers an open question posed by Håstad in his Ph.D. thesis.
Our average-case depth hierarchy theorem implies that the polynomial hierarchy is infinite relative to a random oracle with probability 1, confirming a conjecture of Håstad, Cai, and Babai. We also use our result to show that there is no "approximate converse" to the results of Linial, Mansour, Nisan and Boppana on the total influence of small-depth circuits, thus answering a question posed by O'Donnell, Kalai, and Hatami.
A key ingredient in our proof is a notion of \emph{random projections} which generalize random restrictions.
△ Less
Submitted 13 April, 2015;
originally announced April 2015.
-
Formulas vs. Circuits for Small Distance Connectivity
Authors:
Benjamin Rossman
Abstract:
We give the first super-polynomial separation in the power of bounded-depth boolean formulas vs. circuits. Specifically, we consider the problem Distance $k(n)$ Connectivity, which asks whether two specified nodes in a graph of size $n$ are connected by a path of length at most $k(n)$. This problem is solvable (by the recursive doubling technique) on {\bf circuits} of depth $O(\log k)$ and size…
▽ More
We give the first super-polynomial separation in the power of bounded-depth boolean formulas vs. circuits. Specifically, we consider the problem Distance $k(n)$ Connectivity, which asks whether two specified nodes in a graph of size $n$ are connected by a path of length at most $k(n)$. This problem is solvable (by the recursive doubling technique) on {\bf circuits} of depth $O(\log k)$ and size $O(kn^3)$. In contrast, we show that solving this problem on {\bf formulas} of depth $\log n/(\log\log n)^{O(1)}$ requires size $n^{Ω(\log k)}$ for all $k(n) \leq \log\log n$. As corollaries:
(i) It follows that polynomial-size circuits for Distance $k(n)$ Connectivity require depth $Ω(\log k)$ for all $k(n) \leq \log\log n$. This matches the upper bound from recursive doubling and improves a previous $Ω(\log\log k)$ lower bound of Beame, Pitassi and Impagliazzo [BIP98].
(ii) We get a tight lower bound of $s^{Ω(d)}$ on the size required to simulate size-$s$ depth-$d$ circuits by depth-$d$ formulas for all $s(n) = n^{O(1)}$ and $d(n) \leq \log\log\log n$. No lower bound better than $s^{Ω(1)}$ was previously known for any $d(n) \nleq O(1)$.
Our proof technique is centered on a new notion of pathset complexity, which roughly speaking measures the minimum cost of constructing a set of (partial) paths in a universe of size $n$ via the operations of union and relational join, subject to certain density constraints. Half of our proof shows that bounded-depth formulas solving Distance $k(n)$ Connectivity imply upper bounds on pathset complexity. The other half is a combinatorial lower bound on pathset complexity.
△ Less
Submitted 2 December, 2013;
originally announced December 2013.
-
Interactive Small-Step Algorithms II: Abstract State Machines and the<br> Characterization Theorem
Authors:
Andreas Blass,
Yuri Gurevich,
Dean Rosenzweig,
Benjamin Rossman
Abstract:
In earlier work, the Abstract State Machine Thesis -- that arbitrary algorithms are behaviorally equivalent to abstract state machines -- was established for several classes of algorithms, including ordinary, interactive, small-step algorithms. This was accomplished on the basis of axiomatizations of these classes of algorithms. In Part I (Interactive Small-Step Algorithms I: Axiomatization), th…
▽ More
In earlier work, the Abstract State Machine Thesis -- that arbitrary algorithms are behaviorally equivalent to abstract state machines -- was established for several classes of algorithms, including ordinary, interactive, small-step algorithms. This was accomplished on the basis of axiomatizations of these classes of algorithms. In Part I (Interactive Small-Step Algorithms I: Axiomatization), the axiomatization was extended to cover interactive small-step algorithms that are not necessarily ordinary. This means that the algorithms (1) can complete a step without necessarily waiting for replies to all queries from that step and (2) can use not only the environment's replies but also the order in which the replies were received. In order to prove the thesis for algorithms of this generality, we extend here the definition of abstract state machines to incorporate explicit attention to the relative timing of replies and to the possible absence of replies. We prove the characterization theorem for extended abstract state machines with respect to general algorithms as axiomatized in Part I.
△ Less
Submitted 5 November, 2007; v1 submitted 25 July, 2007;
originally announced July 2007.
-
Interactive Small-Step Algorithms I: Axiomatization
Authors:
Andreas Blass,
Yuri Gurevich,
Dean Rosenzweig,
Benjamin Rossman
Abstract:
In earlier work, the Abstract State Machine Thesis -- that arbitrary algorithms are behaviorally equivalent to abstract state machines -- was established for several classes of algorithms, including ordinary, interactive, small-step algorithms. This was accomplished on the basis of axiomatizations of these classes of algorithms. Here we extend the axiomatization and, in a companion paper, the pr…
▽ More
In earlier work, the Abstract State Machine Thesis -- that arbitrary algorithms are behaviorally equivalent to abstract state machines -- was established for several classes of algorithms, including ordinary, interactive, small-step algorithms. This was accomplished on the basis of axiomatizations of these classes of algorithms. Here we extend the axiomatization and, in a companion paper, the proof, to cover interactive small-step algorithms that are not necessarily ordinary. This means that the algorithms (1) can complete a step without necessarily waiting for replies to all queries from that step and (2) can use not only the environment's replies but also the order in which the replies were received.
△ Less
Submitted 5 November, 2007; v1 submitted 25 July, 2007;
originally announced July 2007.
-
An O(n^3)-Time Algorithm for Tree Edit Distance
Authors:
Erik D. Demaine,
Shay Mozes,
Benjamin Rossman,
Oren Weimann
Abstract:
The {\em edit distance} between two ordered trees with vertex labels is the minimum cost of transforming one tree into the other by a sequence of elementary operations consisting of deleting and relabeling existing nodes, as well as inserting new nodes. In this paper, we present a worst-case $O(n^3)$-time algorithm for this problem, improving the previous best $O(n^3\log n)$-time algorithm~\cite…
▽ More
The {\em edit distance} between two ordered trees with vertex labels is the minimum cost of transforming one tree into the other by a sequence of elementary operations consisting of deleting and relabeling existing nodes, as well as inserting new nodes. In this paper, we present a worst-case $O(n^3)$-time algorithm for this problem, improving the previous best $O(n^3\log n)$-time algorithm~\cite{Klein}. Our result requires a novel adaptive strategy for deciding how a dynamic program divides into subproblems (which is interesting in its own right), together with a deeper understanding of the previous algorithms for the problem. We also prove the optimality of our algorithm among the family of \emph{decomposition strategy} algorithms--which also includes the previous fastest algorithms--by tightening the known lower bound of $Ω(n^2\log^2 n)$~\cite{Touzet} to $Ω(n^3)$, matching our algorithm's running time. Furthermore, we obtain matching upper and lower bounds of $Θ(n m^2 (1 + \log \frac{n}{m}))$ when the two trees have different sizes $m$ and~$n$, where $m < n$.
△ Less
Submitted 19 April, 2006; v1 submitted 9 April, 2006;
originally announced April 2006.