Algebraic Techniques
Prev: Markov Chains and Random Walks Next: Data Structures
Problems
7.1
In this problem we will see that Theorem 7.1 is actually just a special case of Theorem 7.2. In the setting of Theorem 7.1, construct a multivariate polynomial such that if and only if , and then apply Theorem 7.2 to derive the result in Theorem 7.1.
7.2
Two rooted trees and are said to be isomorphic if there exists a one-to-one onto mapping from the vertices of to those of satisfying the following condition: for each internal vertex of with the children , the vertex has as children exactly the vertices . Observe that no ordering is assumed on the children of any internal vertex. Devise an efficient randomized algorithm for testing the isomorphism of rooted trees and analyze its performance.
Hint: Associate a polynomial with each vertex in a tree . The polynomials are defined recursively, the base case being that the leaf vertices all have . An internal vertex of height with the children has its polynomial defined to be
Note that there is exactly one indeterminate for each level in the tree.
Remark: There is a linear time deterministic algorithm for this problem based on a similar approach. Refer to Aho, Hopcroft and Ullman [5].
7.3
Due to M. Blum, A.K. Chandra, and M.N. Wegman [64].
A labeled directed acyclic graph may be used to represent a Boolean function of variables , as follows. One vertex of is the start vertex, and another the finish vertex. Every vertex has out-degree zero or two; if two edges leave a vertex, one must be labeled with a variable and the other by the complement of this variable. Such a graph is said to be free if there is at most one occurrence of every variable, complemented or not, on any (directed) path of . The Boolean function represented by such a graph is the sum of all product terms, where each product term is a product of all the variables on a path from the start vertex to the finish vertex.
Devise a randomized algorithm that, given two free graphs, decides whether they represent the same Boolean function. If the functions are different, the algorithm should output NO; otherwise, it should output YES with probability at least .
7.4
Due to R.J. Lipton [277]; see also M. Blum and S. Kannan [66].
Consider the problem of deciding whether two integer multisets and are identical in the sense that each integer occurs the same number of times in both sets. This problem can be solved by sorting the two sets in time, where is the cardinality of the multisets. Suggest a way of representing this as a problem involving a verification of a polynomial identity, and thereby obtain an efficient randomized algorithm. Discuss the relative merits of the two algorithms, keeping in mind issues such as the model of computation and the size of the integers being operated upon. See also Problem 8.20.
7.5
Due to J. Naor.
Two matrices and over the field are said to be similar if there exists a non-singular matrix such that . Devise a randomized algorithm for testing the similarity of the matrices and .
Hint: View the entries in as a collection of variables, and from the definition of similarity, obtain a homogeneous set of linear equations that these variables must satisfy. Any solution must be a linear combination of the basic solutions to this family of equations. Apply the randomized techniques from this chapter to determining whether there exists a linear combination of the basic solutions that yields a non-singular matrix .
7.6
Let be a multivariate polynomial over a field with the degree sequence . A degree sequence is defined as follows: let be the maximum exponent of in , and be the coefficient of in ; then, let be the maximum exponent of in , and be the coefficient of in ; and, so on.
Let be arbitrary subsets. For chosen independently and uniformly at random, show that
7.7
Due to J. Edmonds [134].
Let be a bipartite graph, and let be the corresponding matrix of indeterminates as defined in Section 7.3. Show that the size of a maximum matching in is exactly equal to the rank of the matrix .
7.8
Tutte’s Theorem [398].
In this problem we generalize Theorem 7.3 to the case of an arbitrary (possibly non-bipartite) graph where . A skew-symmetric matrix is defined to be a matrix in which for all and , . Let be the skew-symmetric matrix obtained from as follows. A distinct indeterminate is associated with the edge , where , and the corresponding matrix entries are given by and ; more succinctly,
This matrix is called the Tutte matrix of the graph . Define the multivariate polynomial as being equal to . Show that has a perfect matching if and only if .
7.9
Due to M.O. Rabin and V.V. Vazirani [348, 349].
Consider the Tutte matrix of a (non-bipartite) graph defined in Problem 7.8. Show that the rank of the Tutte matrix of is twice the size of a maximum matching in .
Hint: Let be an skew-symmetric matrix of rank . For any two sets , denote by the sub-matrix of obtained by including only the rows with indices in and columns with indices in . Then, for any two sets of size ,
7.10
Given a randomized algorithm for testing the existence of a perfect matching in a graph , describe how you would actually construct such a matching. Assuming that you use the randomized testing algorithm from Problem 7.8, compare the running time of your approach with that of the best known deterministic algorithm for perfect matching mentioned in the Notes section.
7.11
Given a randomized algorithm for testing the existence of a perfect matching in a graph, describe how we can use this to construct a maximum matching in a graph .
7.12
Due to R.M. Karp and M.O. Rabin [249].
In this problem we will use a different fingerprinting technique to solve the pattern matching problem. The idea is to map any bit string into a matrix , as follows.
- For the empty string ,
- For non-empty strings and , .
Show that this fingerprint function has the following properties.
- is well-defined for all .
- .
- For , the entries in are bounded by Fibonacci number (see Appendix B).
By considering the matrices modulo a suitable prime , show how you would perform efficient randomized pattern matching. Explain how you would implement this as a “real-time” algorithm.
7.13
Due to R.M. Karp and M.O. Rabin [249].
Consider the two-dimensional version of the pattern matching problem. The text is an matrix , and the pattern is an matrix . A pattern match occurs if appears as a (contiguous) sub-matrix of . To apply the randomized algorithm described above, we convert the matrix into an -bit vector using the row-major format. The possible occurrences of in are the -bit vectors obtained by taking all sub-matrices of in a row-major form. It is clear that the earlier algorithm can now be applied to this scenario. Analyze the error probability in this case, and explain how the fingerprints of each can be computed at a small incremental cost.
7.14
Prove the following relations directly from the definition of , i.e., without invoking any results regarding stated in this chapter.
(a) Show that .
(b) Show that if the definition of is modified to require that the probability of error be zero, then the resulting complexity class would be exactly the class .
(c) Show that .
7.15
Prove Lemma 7.9.
7.16
Due to C.H. Papadimitriou [324].
Let be the class of all languages whose membership can be decided using space polynomial in the input size, with no explicit constraint on the running time. Show that .
7.17
Due to A. Shamir [372].
A quantified Boolean formula (QBF) is a Boolean formula of the form
where each is a Boolean variable, each is either the universal or the existential quantifier, and is quantifier-free Boolean formula. It is known that QBF is -complete. By devising an interactive proof system for QBF, show that .
Hint: The following is a brief sketch of a reformulation of Shamir’s proof as presented by A. Shen. The first step is to arithmetize the QBF formula . For any Boolean expression , possibly a single Boolean variable or a quantified formula, construct an integer polynomial using the following rules recursively: replace TRUE by and FALSE by ; replace Boolean variables by arithmetic variables ; replace by ; replace the negation of an expression by ; replace by ; replace by ; and replace by . Apply the ideas used in devising an interactive proof system for the arithmetized version of #3SAT to the problem of verifying the value of the arithmetized version, , of the QBF formula . One serious problem in the case of QBF is that the intermediate polynomials need not be of a small degree, primarily due to the arithmetization of the quantifiers. To handle this problem, assume that the arithmetization of the sequence of quantifiers is interleaved with the application of the following reduce operation: for each (integer) variable , replace any non-zero power by . Argue that in the case where we assign only the values or to each , the reduce operation does not change the value of the resulting polynomial.
Remark: Combining this result with that of Problem 7.16, we conclude that . It is known that is closed under complementation, and so it follows that .
7.18
Due to L. Fortnow, J. Rompel, and M. Sipser [153].
Define the complexity class as the generalization of where the verifier has access to two provers and the provers are not allowed to communicate with each other once the verifier starts executing. Show that .
7.19
Prove the following relations directly from the definition of , i.e., without invoking any results regarding stated in this chapter.
(a) Show that .
(b) Show that .
(c) Show that .
7.20
Due to S. Arora and S. Safra [33].
Show that .
7.21
Prove Lemma 7.11.
7.22
Consider a multivariate function . Show that is linear if and only if for all and ,
7.23
This problem is concerned with some properties of the distance measure defined in Definition 7.7.
(a) Show that the distance measure satisfies the triangle inequality: for all functions ,
(b) For a class of functions , define as the minimum distance between any two functions in . Show that for any function (not necessarily in ), there is at most one function from at distance or less.
(c) Suppose that is the set of all linear functions from to . What is ?
7.24
Due to M. Blum, M. Luby, and R. Rubinfeld [68].
Prove Lemma 7.12 using the following sketch of a proof due to D. Coppersmith. Define the function such that for each ,
where the “majority” denotes the value occurring most often over all choices of , breaking ties arbitrarily.
(a) Show that for all , and for chosen uniformly at random,
(b) Show that the functions and are -close.
(c) Show that is a linear function.
(d) Show that is uniquely defined.
7.25
Prove Lemma 7.13.
7.26
Appropriately generalizing Lemma 7.13, describe how the verifier can check that .