SlideShare a Scribd company logo
1 of 61
Download to read offline
Improving the Space-Bounded Version of
Muchnik’s Conditional Complexity Theorem via
          “Naive” Derandomization

                  Daniil Musatov1
           1 Lomonosov   Moscow State University,


          St. Petersburg, June 14th, 2011
Some disclaimers




      This talk is in some sense a continuation of the previous one
Some disclaimers




      This talk is in some sense a continuation of the previous one
      A similar technique is used to obtain a different result
Some disclaimers




      This talk is in some sense a continuation of the previous one
      A similar technique is used to obtain a different result
      Why “naive”?
Some disclaimers




      This talk is in some sense a continuation of the previous one
      A similar technique is used to obtain a different result
      Why “naive”? Because we simply replace a random object by
      a pseudo-random one and it still does the job.
Kolmogorov complexity




      Kolmogorov complexity C (a|b) of a string a conditional to b
      is the minimal length of a program p that produces a given b,
      i.e., p(b) = a
Kolmogorov complexity




      Kolmogorov complexity C (a|b) of a string a conditional to b
      is the minimal length of a program p that produces a given b,
      i.e., p(b) = a
      Space-bounded version: C s (a|b) is the minimal length of a
      program p such that p(b) = a
Kolmogorov complexity




      Kolmogorov complexity C (a|b) of a string a conditional to b
      is the minimal length of a program p that produces a given b,
      i.e., p(b) = a
      Space-bounded version: C s (a|b) is the minimal length of a
      program p such that p(b) = a and the computation of p(b)
      performs in space s.
Muchnik’s theorem


      Muchnik’s theorem (TCS’2002): For any a and b of length n
      there exists p of length C (a|b) + O(log n) such that p(b) = a
Muchnik’s theorem


      Muchnik’s theorem (TCS’2002): For any a and b of length n
      there exists p of length C (a|b) + O(log n) such that p(b) = a
      and C (p|a) = O(log n).
Muchnik’s theorem


      Muchnik’s theorem (TCS’2002): For any a and b of length n
      there exists p of length C (a|b) + O(log n) such that p(b) = a
      and C (p|a) = O(log n).
      Space-bounded version (M., Romashchenko, Shen, CSR’2009,
      ToCS’2011): For any a and b of length n and for any s there
      exists p of length C s (a|b) + O(log3 n) such that:
Muchnik’s theorem


      Muchnik’s theorem (TCS’2002): For any a and b of length n
      there exists p of length C (a|b) + O(log n) such that p(b) = a
      and C (p|a) = O(log n).
      Space-bounded version (M., Romashchenko, Shen, CSR’2009,
      ToCS’2011): For any a and b of length n and for any s there
      exists p of length C s (a|b) + O(log3 n) such that:
          p(b) = a;
          the computation of p(b) performs in space O(s) + poly(n)
          and C poly(n) (p|a) = O(log3 n)
Muchnik’s theorem


      Muchnik’s theorem (TCS’2002): For any a and b of length n
      there exists p of length C (a|b) + O(log n) such that p(b) = a
      and C (p|a) = O(log n).
      Space-bounded version (M., Romashchenko, Shen, CSR’2009,
      ToCS’2011): For any a and b of length n and for any s there
      exists p of length C s (a|b) + O(log3 n) such that:
          p(b) = a;
          the computation of p(b) performs in space O(s) + poly(n)
          and C poly(n) (p|a) = O(log3 n)
      In current work we get rid of polylogarithmic terms and make
      them again logarithmic
Proof of Muchnik’s theorem: fingerprints




        {0, 1}n , n = |a|
                                 {0, 1}k , k = C(a|b)

                      a
Proof of Muchnik’s theorem: fingerprints


                                   p

         {0, 1}n , n = |a|
                                 {0, 1}k , k = C(a|b)

                       a




   p is a fingerprint of a
Proof of Muchnik’s theorem: fingerprints


                                              p

         {0, 1}n , n = |a|
                                           {0, 1}k , k = C(a|b)

                       a




   p is a fingerprint of a
   For C (p|a) to be small, there should be few fingerprints for each a
Proof of Muchnik’s theorem: fingerprints
                  S = {x: C(x|b) ≤ C(a|b)}



                                               p

         {0, 1}n , n = |a|
                                             {0, 1}k , k = C(a|b)

                       a




   p is a fingerprint of a
   For C (p|a) to be small, there should be few fingerprints for each a
   For C (a|p, b) to be small,
Proof of Muchnik’s theorem: fingerprints
                  S = {x: C(x|b) ≤ C(a|b)}



                                               p

         {0, 1}n , n = |a|
                                             {0, 1}k , k = C(a|b)

                       a




   p is a fingerprint of a
   For C (p|a) to be small, there should be few fingerprints for each a
   For C (a|p, b) to be small, there should be few preimages of p in S
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
      Each left-part vertex has constant degree D
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
      Each left-part vertex has constant degree D
      The fingerprint p is chosen among neighbors of a
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
      Each left-part vertex has constant degree D
      The fingerprint p is chosen among neighbors of a
          This guarantees that C (p|a, G ) = O(log D)
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
      Each left-part vertex has constant degree D
      The fingerprint p is chosen among neighbors of a
          This guarantees that C (p|a, G ) = O(log D)
      The statement that C (a|p, b, G ) is small for some p follows
      from some enumerable graph property (see later)
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
      Each left-part vertex has constant degree D
      The fingerprint p is chosen among neighbors of a
          This guarantees that C (p|a, G ) = O(log D)
      The statement that C (a|p, b, G ) is small for some p follows
      from some enumerable graph property (see later)
      It is proven by the probabilistic method that this property is
      non-empty
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
      Each left-part vertex has constant degree D
      The fingerprint p is chosen among neighbors of a
          This guarantees that C (p|a, G ) = O(log D)
      The statement that C (a|p, b, G ) is small for some p follows
      from some enumerable graph property (see later)
      It is proven by the probabilistic method that this property is
      non-empty
      Hence, the first graph in the enumeration has small complexity
How to find fingerprints


      There is an underlying bipartite graph G = (L, R, E ) with
      |L| = 2n and |R| = 2k
      Each left-part vertex has constant degree D
      The fingerprint p is chosen among neighbors of a
          This guarantees that C (p|a, G ) = O(log D)
      The statement that C (a|p, b, G ) is small for some p follows
      from some enumerable graph property (see later)
      It is proven by the probabilistic method that this property is
      non-empty
      Hence, the first graph in the enumeration has small complexity
      Hence, C (p|a) and C (a|p, b) are also small
What graph properties do we need?




   Some graph properties leading to Muchnik’s theorem:
       (Muchnik) Expander-like property
What graph properties do we need?




   Some graph properties leading to Muchnik’s theorem:
       (Muchnik) Expander-like property
       (MRS) Possibility of online matching
What graph properties do we need?




   Some graph properties leading to Muchnik’s theorem:
       (Muchnik) Expander-like property
       (MRS) Possibility of online matching
       (MRS) Extractor
What graph properties do we need?




   Some graph properties leading to Muchnik’s theorem:
       (Muchnik) Expander-like property
       (MRS) Possibility of online matching
       (MRS) Extractor
       (This paper) “Low-congesting”
The essential property: low-congesting graph

                                     S, |S| < 2k




                           {0, 1}n
      each vertex has D neighbors
                                                   {0, 1}k
The essential property: low-congesting graph

                                    S, |S| < 2k



                                                       α-clot
                           {0, 1}
                               n

      each vertex has D neighbors
                                                    {0, 1}k




      α-clot for S is the set of all vertices having more than αD
      neighbors in S.
The essential property: low-congesting graph

                                    S, |S| < 2k



                                                         α-clot
                           {0, 1}
                               n

      each vertex has D neighbors
                                                      {0, 1}k

              α-congested vertex




      α-clot for S is the set of all vertices having more than αD
      neighbors in S.
      A vertex is α-congested if all its neighbors lie in α-clot.
The essential property: low-congesting graph

                                    S, |S| < 2k



                                                         α-clot
                           {0, 1}
                               n

      each vertex has D neighbors
                                                      {0, 1}k

              α-congested vertex




      α-clot for S is the set of all vertices having more than αD
      neighbors in S.
      A vertex is α-congested if all its neighbors lie in α-clot.
      The set S is (α, β)-low-congested if it contains less than βK
      α-congested vertices.
The essential property: low-congesting graph



      α-clot for S is the set of all vertices having more than αD
      neighbors in S.
      A vertex is α-congested if all its neighbors lie in α-clot.
      The set S is (α, β)-low-congested if it contains less than βK
      α-congested vertices.
      We call a set relevant if it has the form {x|C s (x|b) < k}.
      We call a graph (α, β)-low-congesting if all relevant sets are
      (α, β)-low-congested.
How to get a low-congesting graph

      A random graph with certain parameters is an extractor with
      positive probability.
How to get a low-congesting graph

      A random graph with certain parameters is an extractor with
      positive probability.
      Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k,
       )-extractor graph any S is (2, 2 )-low-congested.
      Hence, in an extractor any relevant set is low-congested and
      the graph itself is low-congesting.
How to get a low-congesting graph

      A random graph with certain parameters is an extractor with
      positive probability.
      Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k,
       )-extractor graph any S is (2, 2 )-low-congested.
      Hence, in an extractor any relevant set is low-congested and
      the graph itself is low-congesting.
      But even the description of the graph is exponential in size, so
      we cannot find it in polynomial space.
How to get a low-congesting graph

      A random graph with certain parameters is an extractor with
      positive probability.
      Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k,
       )-extractor graph any S is (2, 2 )-low-congested.
      Hence, in an extractor any relevant set is low-congested and
      the graph itself is low-congesting.
      But even the description of the graph is exponential in size, so
      we cannot find it in polynomial space.
      Central idea: replace a random graph by a pseudorandom
      one
      To make this idea work, we need:
How to get a low-congesting graph

      A random graph with certain parameters is an extractor with
      positive probability.
      Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k,
       )-extractor graph any S is (2, 2 )-low-congested.
      Hence, in an extractor any relevant set is low-congested and
      the graph itself is low-congesting.
      But even the description of the graph is exponential in size, so
      we cannot find it in polynomial space.
      Central idea: replace a random graph by a pseudorandom
      one
      To make this idea work, we need:
          to prove that a pseudorandom graph is low-congesting with
          positive probability
How to get a low-congesting graph

      A random graph with certain parameters is an extractor with
      positive probability.
      Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k,
       )-extractor graph any S is (2, 2 )-low-congested.
      Hence, in an extractor any relevant set is low-congested and
      the graph itself is low-congesting.
      But even the description of the graph is exponential in size, so
      we cannot find it in polynomial space.
      Central idea: replace a random graph by a pseudorandom
      one
      To make this idea work, we need:
          to prove that a pseudorandom graph is low-congesting with
          positive probability
          to show that the seed this graph is generated from may be
          found in polynomial space
Why a pseudorandom graph fits


      We use the Nisan pseudorandom generator with polynomial
      seed length and exponential output.
Why a pseudorandom graph fits


      We use the Nisan pseudorandom generator with polynomial
      seed length and exponential output.
      It is well-known that this generator fools any circuit from AC0
Why a pseudorandom graph fits


      We use the Nisan pseudorandom generator with polynomial
      seed length and exponential output.
      It is well-known that this generator fools any circuit from AC0
          The size of a fooled circuit may be exponential since the size
          of output is exponential.
Why a pseudorandom graph fits


      We use the Nisan pseudorandom generator with polynomial
      seed length and exponential output.
      It is well-known that this generator fools any circuit from AC0
          The size of a fooled circuit may be exponential since the size
          of output is exponential.
      We cannot check the low-congesting property literally, but
      using circuits for approximate counting we build a circuit C
      such that:
Why a pseudorandom graph fits


      We use the Nisan pseudorandom generator with polynomial
      seed length and exponential output.
      It is well-known that this generator fools any circuit from AC0
          The size of a fooled circuit may be exponential since the size
          of output is exponential.
      We cannot check the low-congesting property literally, but
      using circuits for approximate counting we build a circuit C
      such that:
          If G is (2, 2 )-low-congesting then C (G ) = 1;
Why a pseudorandom graph fits


      We use the Nisan pseudorandom generator with polynomial
      seed length and exponential output.
      It is well-known that this generator fools any circuit from AC0
          The size of a fooled circuit may be exponential since the size
          of output is exponential.
      We cannot check the low-congesting property literally, but
      using circuits for approximate counting we build a circuit C
      such that:
          If G is (2, 2 )-low-congesting then C (G ) = 1;
          If C (G ) = 1 then G is (2.01, 2.01 )-low-congesting.
Why a pseudorandom graph fits


      We use the Nisan pseudorandom generator with polynomial
      seed length and exponential output.
      It is well-known that this generator fools any circuit from AC0
          The size of a fooled circuit may be exponential since the size
          of output is exponential.
      We cannot check the low-congesting property literally, but
      using circuits for approximate counting we build a circuit C
      such that:
          If G is (2, 2 )-low-congesting then C (G ) = 1;
          If C (G ) = 1 then G is (2.01, 2.01 )-low-congesting.
      This circuit accepts a random graph with sufficient probability,
      hence it does the same with a pseudorandom one.
The circuit
                                            S

  h1 (x1 ) h2 (x1 )   ···   hD (x1 )   h1 (x2 )        ···     hD (x2 )         ···



    ≡      ···    ≡         ≡   ···               ≡      ···     ≡        ···

           Counting circuit                              Counting circuit
  1, if Σinputs > 2.01D                         1, if Σinputs > 2.01D                 ···
  0, if Σinputs < 2D                            0, if Σinputs < 2D


                                        ∧        ···

                                 Counting circuit
                        1, if Σinputs < 2ϵK
                        0, if Σinputs > 2.01ϵK

                                       ∧S
How to get Muchnik’s theorem




      Firstly, we search for a good seed for the generator and fix it.
      This search needs only polynomial space.
How to get Muchnik’s theorem




      Firstly, we search for a good seed for the generator and fix it.
      This search needs only polynomial space.
      If a is not congested in {x|C s (x|b) < k} then it has a
      neighbor p outside the clot.
      This p satisfies all requirements.
How to get Muchnik’s theorem

                 S = {x: C s (x|b) ≤ k}



                                             p

      {0, 1}n , n = |a|
                                          {0, 1}k , k = C s (a|b)

                    a
How to get Muchnik’s theorem


      Firstly, we search for a good seed for the generator and fix it.
      This search needs only polynomial space.
      If a is not congested in {x|C s (x|b) < k} then it has a
      neighbor p outside the clot.
      This p satisfies all requirements.
      If a is congested then we repeat the whole construction
      replacing the relevant sets by the sets of congested vertices in
      relevant sets.
How to get Muchnik’s theorem


      Firstly, we search for a good seed for the generator and fix it.
      This search needs only polynomial space.
      If a is not congested in {x|C s (x|b) < k} then it has a
      neighbor p outside the clot.
      This p satisfies all requirements.
      If a is congested then we repeat the whole construction
      replacing the relevant sets by the sets of congested vertices in
      relevant sets.
      There may be several iterations but since the upper bound on
      the size of a relevant set decreases exponentially there is at
      most linear number of steps, hence all polynomial bounds
      remain.
The final formulation




   For any a and b of length n and for any s there exists p of length
   C s (a|b) + O(log log s + log n) such that:
       p(b) = a;
       the computation of p(b) performs in space O(s) + poly(n)
       and C O(s)+poly(n) (p|a) = O(log log s + log n)
Summary of the technology



      Take some theorem about Kolmogorov complexity relying on
      the existence of some combinatorial object
Summary of the technology



      Take some theorem about Kolmogorov complexity relying on
      the existence of some combinatorial object
      Build a constant-depth circuit recognizing this object
Summary of the technology



      Take some theorem about Kolmogorov complexity relying on
      the existence of some combinatorial object
      Build a constant-depth circuit recognizing this object
      Replace a random object by a pseudorandom one
Summary of the technology



      Take some theorem about Kolmogorov complexity relying on
      the existence of some combinatorial object
      Build a constant-depth circuit recognizing this object
      Replace a random object by a pseudorandom one
      Obtain a space-bounded version of the theorem
Summary of the technology



      Take some theorem about Kolmogorov complexity relying on
      the existence of some combinatorial object
      Build a constant-depth circuit recognizing this object
      Replace a random object by a pseudorandom one
      Obtain a space-bounded version of the theorem
      ???????
      PROFIT
Thank you!
   mailto:musatych@gmail.com
http://musatych.livejournal.com

More Related Content

What's hot

Fine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsFine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsAkankshaAgrawal55
 
Polyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometryPolyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometrySpringer
 
Path Contraction Faster than 2^n
Path Contraction Faster than 2^nPath Contraction Faster than 2^n
Path Contraction Faster than 2^nAkankshaAgrawal55
 
Parallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureParallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureIAEME Publication
 
Elliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaIAEME Publication
 
Polyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimizationPolyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimizationVissarion Fisikopoulos
 
Injecting image priors into Learnable Compressive Subsampling
Injecting image priors into Learnable Compressive SubsamplingInjecting image priors into Learnable Compressive Subsampling
Injecting image priors into Learnable Compressive SubsamplingMartino Ferrari
 
Volume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVolume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVissarion Fisikopoulos
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalencesatrajit
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control systemAlireza Mirzaei
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyDerek Callaway
 
A multi-objective optimization framework for a second order traffic flow mode...
A multi-objective optimization framework for a second order traffic flow mode...A multi-objective optimization framework for a second order traffic flow mode...
A multi-objective optimization framework for a second order traffic flow mode...Guillaume Costeseque
 
Introduction to Information Channel
Introduction to Information ChannelIntroduction to Information Channel
Introduction to Information ChannelAkhil Nadh PC
 
Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...
Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...
Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...T. E. BOGALE
 
Approximation Algorithms for the Directed k-Tour and k-Stroll Problems
Approximation Algorithms for the Directed k-Tour and k-Stroll ProblemsApproximation Algorithms for the Directed k-Tour and k-Stroll Problems
Approximation Algorithms for the Directed k-Tour and k-Stroll ProblemsSunny Kr
 

What's hot (20)

Fine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its VariantsFine Grained Complexity of Rainbow Coloring and its Variants
Fine Grained Complexity of Rainbow Coloring and its Variants
 
Polyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometryPolyhedral and algebraic method in computational geometry
Polyhedral and algebraic method in computational geometry
 
Path Contraction Faster than 2^n
Path Contraction Faster than 2^nPath Contraction Faster than 2^n
Path Contraction Faster than 2^n
 
Parallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureParallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architecture
 
Elliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsubaElliptic curve scalar multiplier using karatsuba
Elliptic curve scalar multiplier using karatsuba
 
Polyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimizationPolyhedral computations in computational algebraic geometry and optimization
Polyhedral computations in computational algebraic geometry and optimization
 
Injecting image priors into Learnable Compressive Subsampling
Injecting image priors into Learnable Compressive SubsamplingInjecting image priors into Learnable Compressive Subsampling
Injecting image priors into Learnable Compressive Subsampling
 
Volume computation and applications
Volume computation and applications Volume computation and applications
Volume computation and applications
 
Netautomata1
Netautomata1Netautomata1
Netautomata1
 
Temporal graph
Temporal graphTemporal graph
Temporal graph
 
Volume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensionsVolume and edge skeleton computation in high dimensions
Volume and edge skeleton computation in high dimensions
 
On Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational EquivalenceOn Resolution Proofs for Combinational Equivalence
On Resolution Proofs for Combinational Equivalence
 
How to design a linear control system
How to design a linear control systemHow to design a linear control system
How to design a linear control system
 
5th Semester Electronic and Communication Engineering (2013-June) Question Pa...
5th Semester Electronic and Communication Engineering (2013-June) Question Pa...5th Semester Electronic and Communication Engineering (2013-June) Question Pa...
5th Semester Electronic and Communication Engineering (2013-June) Question Pa...
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve Cryptography
 
A multi-objective optimization framework for a second order traffic flow mode...
A multi-objective optimization framework for a second order traffic flow mode...A multi-objective optimization framework for a second order traffic flow mode...
A multi-objective optimization framework for a second order traffic flow mode...
 
Introduction to Information Channel
Introduction to Information ChannelIntroduction to Information Channel
Introduction to Information Channel
 
Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...
Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...
Joint CSI Estimation, Beamforming and Scheduling Design for Wideband Massive ...
 
25010001
2501000125010001
25010001
 
Approximation Algorithms for the Directed k-Tour and k-Stroll Problems
Approximation Algorithms for the Directed k-Tour and k-Stroll ProblemsApproximation Algorithms for the Directed k-Tour and k-Stroll Problems
Approximation Algorithms for the Directed k-Tour and k-Stroll Problems
 

Viewers also liked

Csr2011 june14 11_30_winzen
Csr2011 june14 11_30_winzenCsr2011 june14 11_30_winzen
Csr2011 june14 11_30_winzenCSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCSR2011
 
Csr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCsr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCSR2011
 
Csr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohreyCsr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohreyCSR2011
 
Csr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCsr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCSR2011
 
Csr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCsr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCSR2011
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 
Csr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansenCsr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansenCSR2011
 
Csr2011 june15 11_00_sima
Csr2011 june15 11_00_simaCsr2011 june15 11_00_sima
Csr2011 june15 11_00_simaCSR2011
 
Csr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolovCsr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolovCSR2011
 
Csr2011 june14 17_00_pospelov
Csr2011 june14 17_00_pospelovCsr2011 june14 17_00_pospelov
Csr2011 june14 17_00_pospelovCSR2011
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCSR2011
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCSR2011
 
Csr2011 june16 11_30_georgiadis
Csr2011 june16 11_30_georgiadisCsr2011 june16 11_30_georgiadis
Csr2011 june16 11_30_georgiadisCSR2011
 
Csr2011 june16 14_00_kari
Csr2011 june16 14_00_kariCsr2011 june16 14_00_kari
Csr2011 june16 14_00_kariCSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCSR2011
 

Viewers also liked (20)

Csr2011 june14 11_30_winzen
Csr2011 june14 11_30_winzenCsr2011 june14 11_30_winzen
Csr2011 june14 11_30_winzen
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCsr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenko
 
Csr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohreyCsr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohrey
 
Csr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCsr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenko
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 
Csr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCsr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawal
 
Csr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilkaCsr2011 june18 09_30_shpilka
Csr2011 june18 09_30_shpilka
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
Csr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansenCsr2011 june14 12_00_hansen
Csr2011 june14 12_00_hansen
 
Csr2011 june15 11_00_sima
Csr2011 june15 11_00_simaCsr2011 june15 11_00_sima
Csr2011 june15 11_00_sima
 
Csr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolovCsr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolov
 
Csr2011 june14 17_00_pospelov
Csr2011 june14 17_00_pospelovCsr2011 june14 17_00_pospelov
Csr2011 june14 17_00_pospelov
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanov
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blin
 
Csr2011 june16 11_30_georgiadis
Csr2011 june16 11_30_georgiadisCsr2011 june16 11_30_georgiadis
Csr2011 june16 11_30_georgiadis
 
Csr2011 june16 14_00_kari
Csr2011 june16 14_00_kariCsr2011 june16 14_00_kari
Csr2011 june16 14_00_kari
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudan
 

Similar to Csr2011 june14 15_45_musatov

論文紹介:Towards Robust Adaptive Object Detection Under Noisy Annotations
論文紹介:Towards Robust Adaptive Object Detection Under Noisy Annotations論文紹介:Towards Robust Adaptive Object Detection Under Noisy Annotations
論文紹介:Towards Robust Adaptive Object Detection Under Noisy AnnotationsToru Tamaki
 
parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph MotifAMR koura
 
Kolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametriclineKolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametriclineAlina Barbulescu
 
Chap10 slides
Chap10 slidesChap10 slides
Chap10 slidesHJ DS
 
Optimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-peripheryOptimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-peripheryFrancesco Tudisco
 
Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007 Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007 Rohit Garg
 
Parallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsParallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsJonny Daenen
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptWahyuAde4
 
Three dim. geometry
Three dim. geometryThree dim. geometry
Three dim. geometryindu thakur
 
Divergence clustering
Divergence clusteringDivergence clustering
Divergence clusteringFrank Nielsen
 
Kolmogorov complexity and topological arguments
Kolmogorov complexity and topological argumentsKolmogorov complexity and topological arguments
Kolmogorov complexity and topological argumentsshenmontpellier
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization TechniquesAjay Bidyarthy
 
Diffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modelingDiffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modelingJeremyHeng10
 
Neural Collaborative Subspace Clustering
Neural Collaborative Subspace ClusteringNeural Collaborative Subspace Clustering
Neural Collaborative Subspace ClusteringTakahiro Hasegawa
 
Diffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modelingDiffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modelingJeremyHeng10
 

Similar to Csr2011 june14 15_45_musatov (20)

論文紹介:Towards Robust Adaptive Object Detection Under Noisy Annotations
論文紹介:Towards Robust Adaptive Object Detection Under Noisy Annotations論文紹介:Towards Robust Adaptive Object Detection Under Noisy Annotations
論文紹介:Towards Robust Adaptive Object Detection Under Noisy Annotations
 
parameterized complexity for graph Motif
parameterized complexity for graph Motifparameterized complexity for graph Motif
parameterized complexity for graph Motif
 
Kolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametriclineKolev skalna2018 article-exact_solutiontoa_parametricline
Kolev skalna2018 article-exact_solutiontoa_parametricline
 
Chap10 slides
Chap10 slidesChap10 slides
Chap10 slides
 
Optimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-peripheryOptimal L-shaped matrix reordering, aka graph's core-periphery
Optimal L-shaped matrix reordering, aka graph's core-periphery
 
Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007 Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007
 
Parallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-JoinsParallel Evaluation of Multi-Semi-Joins
Parallel Evaluation of Multi-Semi-Joins
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
Muchtadi
MuchtadiMuchtadi
Muchtadi
 
Three dim. geometry
Three dim. geometryThree dim. geometry
Three dim. geometry
 
Divergence clustering
Divergence clusteringDivergence clustering
Divergence clustering
 
Kolmogorov complexity and topological arguments
Kolmogorov complexity and topological argumentsKolmogorov complexity and topological arguments
Kolmogorov complexity and topological arguments
 
Lect 1_TMT 20303.pptx
Lect 1_TMT 20303.pptxLect 1_TMT 20303.pptx
Lect 1_TMT 20303.pptx
 
Optimization Techniques
Optimization TechniquesOptimization Techniques
Optimization Techniques
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Diffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modelingDiffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modeling
 
Neural Collaborative Subspace Clustering
Neural Collaborative Subspace ClusteringNeural Collaborative Subspace Clustering
Neural Collaborative Subspace Clustering
 
Diffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modelingDiffusion Schrödinger bridges for score-based generative modeling
Diffusion Schrödinger bridges for score-based generative modeling
 

More from CSR2011

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCSR2011
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCSR2011
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCSR2011
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCSR2011
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCSR2011
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCSR2011
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCSR2011
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCSR2011
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCSR2011
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCSR2011
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
 
Csr2011 june16 16_30_golovach
Csr2011 june16 16_30_golovachCsr2011 june16 16_30_golovach
Csr2011 june16 16_30_golovachCSR2011
 
Csr2011 june16 15_45_meer
Csr2011 june16 15_45_meerCsr2011 june16 15_45_meer
Csr2011 june16 15_45_meerCSR2011
 
Csr2011 june16 12_00_wagner
Csr2011 june16 12_00_wagnerCsr2011 june16 12_00_wagner
Csr2011 june16 12_00_wagnerCSR2011
 

More from CSR2011 (18)

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigoriev
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avron
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyen
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskin
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remila
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanov
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonati
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminski
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonati
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june16 16_30_golovach
Csr2011 june16 16_30_golovachCsr2011 june16 16_30_golovach
Csr2011 june16 16_30_golovach
 
Csr2011 june16 15_45_meer
Csr2011 june16 15_45_meerCsr2011 june16 15_45_meer
Csr2011 june16 15_45_meer
 
Csr2011 june16 12_00_wagner
Csr2011 june16 12_00_wagnerCsr2011 june16 12_00_wagner
Csr2011 june16 12_00_wagner
 

Csr2011 june14 15_45_musatov

  • 1. Improving the Space-Bounded Version of Muchnik’s Conditional Complexity Theorem via “Naive” Derandomization Daniil Musatov1 1 Lomonosov Moscow State University, St. Petersburg, June 14th, 2011
  • 2. Some disclaimers This talk is in some sense a continuation of the previous one
  • 3. Some disclaimers This talk is in some sense a continuation of the previous one A similar technique is used to obtain a different result
  • 4. Some disclaimers This talk is in some sense a continuation of the previous one A similar technique is used to obtain a different result Why “naive”?
  • 5. Some disclaimers This talk is in some sense a continuation of the previous one A similar technique is used to obtain a different result Why “naive”? Because we simply replace a random object by a pseudo-random one and it still does the job.
  • 6. Kolmogorov complexity Kolmogorov complexity C (a|b) of a string a conditional to b is the minimal length of a program p that produces a given b, i.e., p(b) = a
  • 7. Kolmogorov complexity Kolmogorov complexity C (a|b) of a string a conditional to b is the minimal length of a program p that produces a given b, i.e., p(b) = a Space-bounded version: C s (a|b) is the minimal length of a program p such that p(b) = a
  • 8. Kolmogorov complexity Kolmogorov complexity C (a|b) of a string a conditional to b is the minimal length of a program p that produces a given b, i.e., p(b) = a Space-bounded version: C s (a|b) is the minimal length of a program p such that p(b) = a and the computation of p(b) performs in space s.
  • 9. Muchnik’s theorem Muchnik’s theorem (TCS’2002): For any a and b of length n there exists p of length C (a|b) + O(log n) such that p(b) = a
  • 10. Muchnik’s theorem Muchnik’s theorem (TCS’2002): For any a and b of length n there exists p of length C (a|b) + O(log n) such that p(b) = a and C (p|a) = O(log n).
  • 11. Muchnik’s theorem Muchnik’s theorem (TCS’2002): For any a and b of length n there exists p of length C (a|b) + O(log n) such that p(b) = a and C (p|a) = O(log n). Space-bounded version (M., Romashchenko, Shen, CSR’2009, ToCS’2011): For any a and b of length n and for any s there exists p of length C s (a|b) + O(log3 n) such that:
  • 12. Muchnik’s theorem Muchnik’s theorem (TCS’2002): For any a and b of length n there exists p of length C (a|b) + O(log n) such that p(b) = a and C (p|a) = O(log n). Space-bounded version (M., Romashchenko, Shen, CSR’2009, ToCS’2011): For any a and b of length n and for any s there exists p of length C s (a|b) + O(log3 n) such that: p(b) = a; the computation of p(b) performs in space O(s) + poly(n) and C poly(n) (p|a) = O(log3 n)
  • 13. Muchnik’s theorem Muchnik’s theorem (TCS’2002): For any a and b of length n there exists p of length C (a|b) + O(log n) such that p(b) = a and C (p|a) = O(log n). Space-bounded version (M., Romashchenko, Shen, CSR’2009, ToCS’2011): For any a and b of length n and for any s there exists p of length C s (a|b) + O(log3 n) such that: p(b) = a; the computation of p(b) performs in space O(s) + poly(n) and C poly(n) (p|a) = O(log3 n) In current work we get rid of polylogarithmic terms and make them again logarithmic
  • 14. Proof of Muchnik’s theorem: fingerprints {0, 1}n , n = |a| {0, 1}k , k = C(a|b) a
  • 15. Proof of Muchnik’s theorem: fingerprints p {0, 1}n , n = |a| {0, 1}k , k = C(a|b) a p is a fingerprint of a
  • 16. Proof of Muchnik’s theorem: fingerprints p {0, 1}n , n = |a| {0, 1}k , k = C(a|b) a p is a fingerprint of a For C (p|a) to be small, there should be few fingerprints for each a
  • 17. Proof of Muchnik’s theorem: fingerprints S = {x: C(x|b) ≤ C(a|b)} p {0, 1}n , n = |a| {0, 1}k , k = C(a|b) a p is a fingerprint of a For C (p|a) to be small, there should be few fingerprints for each a For C (a|p, b) to be small,
  • 18. Proof of Muchnik’s theorem: fingerprints S = {x: C(x|b) ≤ C(a|b)} p {0, 1}n , n = |a| {0, 1}k , k = C(a|b) a p is a fingerprint of a For C (p|a) to be small, there should be few fingerprints for each a For C (a|p, b) to be small, there should be few preimages of p in S
  • 19. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k
  • 20. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k Each left-part vertex has constant degree D
  • 21. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k Each left-part vertex has constant degree D The fingerprint p is chosen among neighbors of a
  • 22. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k Each left-part vertex has constant degree D The fingerprint p is chosen among neighbors of a This guarantees that C (p|a, G ) = O(log D)
  • 23. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k Each left-part vertex has constant degree D The fingerprint p is chosen among neighbors of a This guarantees that C (p|a, G ) = O(log D) The statement that C (a|p, b, G ) is small for some p follows from some enumerable graph property (see later)
  • 24. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k Each left-part vertex has constant degree D The fingerprint p is chosen among neighbors of a This guarantees that C (p|a, G ) = O(log D) The statement that C (a|p, b, G ) is small for some p follows from some enumerable graph property (see later) It is proven by the probabilistic method that this property is non-empty
  • 25. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k Each left-part vertex has constant degree D The fingerprint p is chosen among neighbors of a This guarantees that C (p|a, G ) = O(log D) The statement that C (a|p, b, G ) is small for some p follows from some enumerable graph property (see later) It is proven by the probabilistic method that this property is non-empty Hence, the first graph in the enumeration has small complexity
  • 26. How to find fingerprints There is an underlying bipartite graph G = (L, R, E ) with |L| = 2n and |R| = 2k Each left-part vertex has constant degree D The fingerprint p is chosen among neighbors of a This guarantees that C (p|a, G ) = O(log D) The statement that C (a|p, b, G ) is small for some p follows from some enumerable graph property (see later) It is proven by the probabilistic method that this property is non-empty Hence, the first graph in the enumeration has small complexity Hence, C (p|a) and C (a|p, b) are also small
  • 27. What graph properties do we need? Some graph properties leading to Muchnik’s theorem: (Muchnik) Expander-like property
  • 28. What graph properties do we need? Some graph properties leading to Muchnik’s theorem: (Muchnik) Expander-like property (MRS) Possibility of online matching
  • 29. What graph properties do we need? Some graph properties leading to Muchnik’s theorem: (Muchnik) Expander-like property (MRS) Possibility of online matching (MRS) Extractor
  • 30. What graph properties do we need? Some graph properties leading to Muchnik’s theorem: (Muchnik) Expander-like property (MRS) Possibility of online matching (MRS) Extractor (This paper) “Low-congesting”
  • 31. The essential property: low-congesting graph S, |S| < 2k {0, 1}n each vertex has D neighbors {0, 1}k
  • 32. The essential property: low-congesting graph S, |S| < 2k α-clot {0, 1} n each vertex has D neighbors {0, 1}k α-clot for S is the set of all vertices having more than αD neighbors in S.
  • 33. The essential property: low-congesting graph S, |S| < 2k α-clot {0, 1} n each vertex has D neighbors {0, 1}k α-congested vertex α-clot for S is the set of all vertices having more than αD neighbors in S. A vertex is α-congested if all its neighbors lie in α-clot.
  • 34. The essential property: low-congesting graph S, |S| < 2k α-clot {0, 1} n each vertex has D neighbors {0, 1}k α-congested vertex α-clot for S is the set of all vertices having more than αD neighbors in S. A vertex is α-congested if all its neighbors lie in α-clot. The set S is (α, β)-low-congested if it contains less than βK α-congested vertices.
  • 35. The essential property: low-congesting graph α-clot for S is the set of all vertices having more than αD neighbors in S. A vertex is α-congested if all its neighbors lie in α-clot. The set S is (α, β)-low-congested if it contains less than βK α-congested vertices. We call a set relevant if it has the form {x|C s (x|b) < k}. We call a graph (α, β)-low-congesting if all relevant sets are (α, β)-low-congested.
  • 36. How to get a low-congesting graph A random graph with certain parameters is an extractor with positive probability.
  • 37. How to get a low-congesting graph A random graph with certain parameters is an extractor with positive probability. Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k, )-extractor graph any S is (2, 2 )-low-congested. Hence, in an extractor any relevant set is low-congested and the graph itself is low-congesting.
  • 38. How to get a low-congesting graph A random graph with certain parameters is an extractor with positive probability. Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k, )-extractor graph any S is (2, 2 )-low-congested. Hence, in an extractor any relevant set is low-congested and the graph itself is low-congesting. But even the description of the graph is exponential in size, so we cannot find it in polynomial space.
  • 39. How to get a low-congesting graph A random graph with certain parameters is an extractor with positive probability. Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k, )-extractor graph any S is (2, 2 )-low-congested. Hence, in an extractor any relevant set is low-congested and the graph itself is low-congesting. But even the description of the graph is exponential in size, so we cannot find it in polynomial space. Central idea: replace a random graph by a pseudorandom one To make this idea work, we need:
  • 40. How to get a low-congesting graph A random graph with certain parameters is an extractor with positive probability. Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k, )-extractor graph any S is (2, 2 )-low-congested. Hence, in an extractor any relevant set is low-congested and the graph itself is low-congesting. But even the description of the graph is exponential in size, so we cannot find it in polynomial space. Central idea: replace a random graph by a pseudorandom one To make this idea work, we need: to prove that a pseudorandom graph is low-congesting with positive probability
  • 41. How to get a low-congesting graph A random graph with certain parameters is an extractor with positive probability. Lemma. (Buhrman, Fortnow, Laplante ’2002) In an (k, )-extractor graph any S is (2, 2 )-low-congested. Hence, in an extractor any relevant set is low-congested and the graph itself is low-congesting. But even the description of the graph is exponential in size, so we cannot find it in polynomial space. Central idea: replace a random graph by a pseudorandom one To make this idea work, we need: to prove that a pseudorandom graph is low-congesting with positive probability to show that the seed this graph is generated from may be found in polynomial space
  • 42. Why a pseudorandom graph fits We use the Nisan pseudorandom generator with polynomial seed length and exponential output.
  • 43. Why a pseudorandom graph fits We use the Nisan pseudorandom generator with polynomial seed length and exponential output. It is well-known that this generator fools any circuit from AC0
  • 44. Why a pseudorandom graph fits We use the Nisan pseudorandom generator with polynomial seed length and exponential output. It is well-known that this generator fools any circuit from AC0 The size of a fooled circuit may be exponential since the size of output is exponential.
  • 45. Why a pseudorandom graph fits We use the Nisan pseudorandom generator with polynomial seed length and exponential output. It is well-known that this generator fools any circuit from AC0 The size of a fooled circuit may be exponential since the size of output is exponential. We cannot check the low-congesting property literally, but using circuits for approximate counting we build a circuit C such that:
  • 46. Why a pseudorandom graph fits We use the Nisan pseudorandom generator with polynomial seed length and exponential output. It is well-known that this generator fools any circuit from AC0 The size of a fooled circuit may be exponential since the size of output is exponential. We cannot check the low-congesting property literally, but using circuits for approximate counting we build a circuit C such that: If G is (2, 2 )-low-congesting then C (G ) = 1;
  • 47. Why a pseudorandom graph fits We use the Nisan pseudorandom generator with polynomial seed length and exponential output. It is well-known that this generator fools any circuit from AC0 The size of a fooled circuit may be exponential since the size of output is exponential. We cannot check the low-congesting property literally, but using circuits for approximate counting we build a circuit C such that: If G is (2, 2 )-low-congesting then C (G ) = 1; If C (G ) = 1 then G is (2.01, 2.01 )-low-congesting.
  • 48. Why a pseudorandom graph fits We use the Nisan pseudorandom generator with polynomial seed length and exponential output. It is well-known that this generator fools any circuit from AC0 The size of a fooled circuit may be exponential since the size of output is exponential. We cannot check the low-congesting property literally, but using circuits for approximate counting we build a circuit C such that: If G is (2, 2 )-low-congesting then C (G ) = 1; If C (G ) = 1 then G is (2.01, 2.01 )-low-congesting. This circuit accepts a random graph with sufficient probability, hence it does the same with a pseudorandom one.
  • 49. The circuit S h1 (x1 ) h2 (x1 ) ··· hD (x1 ) h1 (x2 ) ··· hD (x2 ) ··· ≡ ··· ≡ ≡ ··· ≡ ··· ≡ ··· Counting circuit Counting circuit 1, if Σinputs > 2.01D 1, if Σinputs > 2.01D ··· 0, if Σinputs < 2D 0, if Σinputs < 2D ∧ ··· Counting circuit 1, if Σinputs < 2ϵK 0, if Σinputs > 2.01ϵK ∧S
  • 50. How to get Muchnik’s theorem Firstly, we search for a good seed for the generator and fix it. This search needs only polynomial space.
  • 51. How to get Muchnik’s theorem Firstly, we search for a good seed for the generator and fix it. This search needs only polynomial space. If a is not congested in {x|C s (x|b) < k} then it has a neighbor p outside the clot. This p satisfies all requirements.
  • 52. How to get Muchnik’s theorem S = {x: C s (x|b) ≤ k} p {0, 1}n , n = |a| {0, 1}k , k = C s (a|b) a
  • 53. How to get Muchnik’s theorem Firstly, we search for a good seed for the generator and fix it. This search needs only polynomial space. If a is not congested in {x|C s (x|b) < k} then it has a neighbor p outside the clot. This p satisfies all requirements. If a is congested then we repeat the whole construction replacing the relevant sets by the sets of congested vertices in relevant sets.
  • 54. How to get Muchnik’s theorem Firstly, we search for a good seed for the generator and fix it. This search needs only polynomial space. If a is not congested in {x|C s (x|b) < k} then it has a neighbor p outside the clot. This p satisfies all requirements. If a is congested then we repeat the whole construction replacing the relevant sets by the sets of congested vertices in relevant sets. There may be several iterations but since the upper bound on the size of a relevant set decreases exponentially there is at most linear number of steps, hence all polynomial bounds remain.
  • 55. The final formulation For any a and b of length n and for any s there exists p of length C s (a|b) + O(log log s + log n) such that: p(b) = a; the computation of p(b) performs in space O(s) + poly(n) and C O(s)+poly(n) (p|a) = O(log log s + log n)
  • 56. Summary of the technology Take some theorem about Kolmogorov complexity relying on the existence of some combinatorial object
  • 57. Summary of the technology Take some theorem about Kolmogorov complexity relying on the existence of some combinatorial object Build a constant-depth circuit recognizing this object
  • 58. Summary of the technology Take some theorem about Kolmogorov complexity relying on the existence of some combinatorial object Build a constant-depth circuit recognizing this object Replace a random object by a pseudorandom one
  • 59. Summary of the technology Take some theorem about Kolmogorov complexity relying on the existence of some combinatorial object Build a constant-depth circuit recognizing this object Replace a random object by a pseudorandom one Obtain a space-bounded version of the theorem
  • 60. Summary of the technology Take some theorem about Kolmogorov complexity relying on the existence of some combinatorial object Build a constant-depth circuit recognizing this object Replace a random object by a pseudorandom one Obtain a space-bounded version of the theorem ??????? PROFIT
  • 61. Thank you! mailto:musatych@gmail.com http://musatych.livejournal.com