Undirected ST-Connectivity 2 DL Omer Reingold, STOC 2005: 376-385 Presented by: Fenghui Zhang 3. 24. 2006 CPSC 637 – paper presentation.

Slides:



Advertisements
Similar presentations
Walk the Walk: On Pseudorandomness, Expansion, and Connectivity Omer Reingold Weizmann Institute Based on join works with Michael Capalbo, Kai-Min Chung,
Advertisements

Pseudorandom Walks: Looking Random in The Long Run or All The Way? Omer Reingold Weizmann Institute.
Undirected ST-Connectivity in Log-Space Omer Reingold Weizmann Institute.
Reductions Complexity ©D.Moshkovitz.
Algorithms (and Datastructures) Lecture 3 MAS 714 part 2 Hartmut Klauck.
1 Nondeterministic Space is Closed Under Complement Presented by Jing Zhang and Yingbo Wang Theory of Computation II Professor: Geoffrey Smith.
Depth-First Search1 Part-H2 Depth-First Search DB A C E.
Department of Computer Science & Engineering
NP-complete and NP-hard problems Transitivity of polynomial-time many-one reductions Concept of Completeness and hardness for a complexity class Definition.
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
STCON in Directed Unique-Path Graphs Sampath Kannan Sanjeev Khanna Sudeepa Roy University of Pennsylvania 1.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
 Graph Graph  Types of Graphs Types of Graphs  Data Structures to Store Graphs Data Structures to Store Graphs  Graph Definitions Graph Definitions.
Complexity 12-1 Complexity Andrei Bulatov Non-Deterministic Space.
1 Representing Graphs. 2 Adjacency Matrix Suppose we have a graph G with n nodes. The adjacency matrix is the n x n matrix A=[a ij ] with: a ij = 1 if.
Complexity 13-1 Complexity Andrei Bulatov Hierarchy Theorem.
(Omer Reingold, 2005) Speaker: Roii Werner TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A AA A A A A AA A.
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
All Pairs Shortest Paths and Floyd-Warshall Algorithm CLRS 25.2
Computability and Complexity 19-1 Computability and Complexity Andrei Bulatov Non-Deterministic Space.
Undirected ST-Connectivity in Log-Space Author: Omer Reingold Presented by: Yang Liu.
On the Hardness of Graph Isomorphism Jacobo Tor á n SIAM J. Comput. Vol 33, p , Presenter: Qingwu Yang April, 2006.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Computability and Complexity 20-1 Computability and Complexity Andrei Bulatov Class NL.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
CSE 780 Algorithms Advanced Algorithms Graph Algorithms Representations BFS.
Undirected ST-Connectivity in Log-Space By Omer Reingold (Weizmann Institute) Year 2004 Presented by Maor Mishkin.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
Zig-Zag Expanders Seminar in Theory and Algorithmic Research Sashka Davis UCSD, April 2005 “ Entropy Waves, the Zig-Zag Graph Product, and New Constant-
Expanders Eliyahu Kiperwasser. What is it? Expanders are graphs with no small cuts. The later gives several unique traits to such graph, such as: – High.
Undirected ST-Connectivity In Log Space
Undirected ST-Connectivity In Log Space Omer Reingold Slides by Sharon Bruckner.
1 Entropy Waves, The Zigzag Graph Product, and New Constant-Degree Expanders Omer Reingold Salil Vadhan Avi Wigderson Lecturer: Oded Levy.
Theory of Computing Lecture 10 MAS 714 Hartmut Klauck.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
GRAPHS CSE, POSTECH. Chapter 16 covers the following topics Graph terminology: vertex, edge, adjacent, incident, degree, cycle, path, connected component,
Theory of Computing Lecture 17 MAS 714 Hartmut Klauck.
15-853:Algorithms in the Real World
Data Structures & Algorithms Graphs
NP-COMPLETE PROBLEMS. Admin  Two more assignments…  No office hours on tomorrow.
Chapter 10 Graph Theory Eulerian Cycle and the property of graph theory 10.3 The important property of graph theory and its representation 10.4.
NP-Complete problems.
2 Office hours: MWR 4:20-5:30 inside or just outside Elliott 162- tell me in class that you would like to attend. For those of you who cannot stay: MWR:
Artur Czumaj DIMAP DIMAP (Centre for Discrete Maths and it Applications) Computer Science & Department of Computer Science University of Warwick Testing.
Data Structures & Algorithms Graphs Richard Newman based on book by R. Sedgewick and slides by S. Sahni.
GRAPHS. Graph Graph terminology: vertex, edge, adjacent, incident, degree, cycle, path, connected component, spanning tree Types of graphs: undirected,
The Classes L and NL Section 8.4 Giorgi Japaridze Theory of Computability.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
Date: 2005/4/25 Advisor: Sy-Yen Kuo Speaker: Szu-Chi Wang.
NPC.
Presented by Alon Levin
Sketching complexity of graph cuts Alexandr Andoni joint work with: Robi Krauthgamer, David Woodruff.
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
1 Entropy Waves, The Zigzag Graph Product, and New Constant-Degree Expanders Omer Reingold Salil Vadhan Avi Wigderson Lecturer: Oded Levy.
Space Complexity Guy Feigenblat Based on lecture by Dr. Ely Porat Complexity course Computer science department, Bar-Ilan university December 2008.
Expanders and Ramanujan Graphs Mike Krebs, Cal State LA For slideshow: click “Research and Talks” from
Graphs ORD SFO LAX DFW Graphs 1 Graphs Graphs
Lectures on Network Flows
MST in Log-Star Rounds of Congested Clique
Complexity of Expander-Based Reasoning and the Power of Monotone Proofs Sam Buss (UCSD), Valentine Kabanets (SFU), Antonina Kolokolova.
CSE 421: Introduction to Algorithms
Lectures on Graph Algorithms: searching, testing and sorting
On the effect of randomness on planted 3-coloring models
Undirected ST-Connectivity In Log Space
Trevor Brown DC 2338, Office hour M3-4pm
For Friday Read chapter 9, sections 2-3 No homework
INTRODUCTION A graph G=(V,E) consists of a finite non empty set of vertices V , and a finite set of edges E which connect pairs of vertices .
Presentation transcript:

Undirected ST-Connectivity 2 DL Omer Reingold, STOC 2005: Presented by: Fenghui Zhang CPSC 637 – paper presentation

Motivation  We have learned that DL µ NL µ D(log 2 n), a big question remains if DL=NL or not  S-T connectivity on directed graph is NL complete, is it in DL?  Undirected S-T connectivity A special case of directed connectivity Characterizes a new type of TM

Previous work  We know that it can be solved in deterministic log 2 (n) space  D(log 3/2 n) – M. Saks and S. Zhou, 1995  D(log 4/3 n) – R. Armoni, A. Ta-Shama, A. Wigderson and S. Zhou, 2000

Symmetric TM and SL  Symmetric TM A Nondeterministic Turing machine such that for any two configurations c i and c j, if there is a path from c i to c j, there will also be a path from c j to c i.  SL The classes of languages that are accepted by a Symmetric TM in log-space  DL µ SL µ RL µ NL  Undirected S-T connectivity is SL complete.

Undirect S-T connectivity  USTCON - Given a undirected graph G and two vertices s and t, is there a path in G from s to t? In SL µ RL µ NL µ P Complete for symmetric, non-deterministic log space (SL)  Is it in DL? (main contribution of this paper) Yes, thus SL=DL

Why is it important?  USTCON is the representative for SL, hence SL has another definition: SL contains all the languages that are log-space reducible to USTCON  The space complexity is thought critical for some networking problems Wireless network routing  We suspect that More space ~ routing overhead = extra energy consuming

Preliminary - Presentation of graphs  Adjacency matrices  Adjacency lists  Rotation map We order the edges incident to v somehow Rot(v,i)=(w,j) if the ith edge of v is the jth edge of j  We assume that the input graph is given by its adjacency matrix and use the rotation map to ``record” the intermittent graphs

How about some simpler cases?  Bounded degree  Expander Graph ``A well connected sparse graph” The vertex expansion can be measured by the spectral gap (1- ) of the normalized adjacency matrix of the graph  The largest eigenvalue is 1  The smaller the second largest eigenvalue is the better the graph is ``connected”

D-regular expander graph  Has diameter O(log n)  S-T connectivity on D-regular expander graphs can be checked in log space with a deterministic TM How?  If we can reduce our graph G to such a special graph using only log-space, then we are done.

Increase the connectivity of G  For each connected component of G, the second eigenvalue is less than 1  G t is a graph with second eigenvalue t  Problems Degrees increase also (we want constant degree) Space …

Reduce the degree  Goal – reduce the degree Without hurting the expansion too much Space…  Zig-zag graph product of G, H Roughly speaking, the resulting graph inherits the size of G, degree of H and expansion properties from both If H has low degrees and good expansion properties, the resulting graph will also be nice

Zig-zag graph product - definition  Given G, H, the vertex in the resulting graph GH will be (v, a) where v 2 G, a 2 H, edges are a subset of [N] £ [D] where |V(G)|=N and |V(H)|=D An edge (v, a)’s (i, j) is formed like  In H v, (a, i) → (a’, i’)  In GH, (v, a’) → (w, b’)  In H w, (b’, j) → (b, j’)

Zig-zag graph product - example

Zig-zag graph product - in the algorithm  If G is a D-regular graph and H is a d-regular graph of D vertices  The resulting graph Has degree d 2  Reduced a lot, given that d << D Of size N £ D Has spectral gap smaller than that of G by a factor that only depends on (H)  Not hurt too much

The basic algorithm  Produce a D e -regular graph H of size D e 16 and spectral gap 1/2  Transform G into a D e 16 -regular graph G’ Replace each vertex v by a cycle of size N, if the ith of v is the jth edge of w, we connect (v, i) to (w, j);If some vertices have degree less than D e 16, we add self-loops to make it so.  Turn G’ into an expander G exp Denote G §H the zig-zag product of G’ and H G i+1 =(G i §H) 8, until spectral gap is less than  Solve the st-connectivity in G exp, s’=(s,1), t’=(t,1)

How about the space?  We are talking about log-space, surely we can not really store any new graph  Fortunately we do not have to store them Like Dr. Chen did in the class for many times… Whenever some connection information is needed, we compute it from the original input Running time could be increased a lot but still polynomial

Correctness and running time  Intuitively, the connectivity of two vertices will be preserved during the transformations of the graphs  We omit the details here

Discussions  The techniques are not all new, yet it looks very complicated  The results are very important (DL=SL)  Further questions Is RL=DL?

Discussions – cont.  Still hard to apply it directly to localized routing algorithms The running time will be a high degree polynomial of N Localized algorithm has shortcomings comparing to log-space TM  We will not be able to reach the ``next node” in the localized algorithm unless a spanning tree has already been found and labeled nicely

Homework  Let B be the set of all bipartite graphs, i.e. for any graph G 2 B, we can partition its vertices into two parts: L and R, such that all edges of G are between vertices in L and in R. Prove that B can be accepted by a non- deterministic TM in log-space.  Due: 3/31(Friday) My office: 315D

The end Questions? Thank you very much!