1 Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.

Slides:



Advertisements
Similar presentations
NP-Hard Nattee Niparnan.
Advertisements

Theory of Computing Lecture 18 MAS 714 Hartmut Klauck.
1 NP-completeness Lecture 2: Jan P The class of problems that can be solved in polynomial time. e.g. gcd, shortest path, prime, etc. There are many.
NP-Completeness: Reductions
CSCI 256 Data Structures and Algorithm Analysis Lecture 22 Some slides by Kevin Wayne copyright 2005, Pearson Addison Wesley all rights reserved, and some.
The Theory of NP-Completeness
INHERENT LIMITATIONS OF COMPUTER PROGRAMS CSci 4011.
COMP 482: Design and Analysis of Algorithms
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
NP-COMPLETENESS. 2 Classify Problems According to Computational Requirements Q. Which problems will we be able to solve in practice? A working definition.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 21 Instructor: Paul Beame.
NP-Complete Problems Reading Material: Chapter 10 Sections 1, 2, 3, and 4 only.
The Theory of NP-Completeness
Polynomial-Time Reductions
1 Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 23 Instructor: Paul Beame.
NP-Completeness (2) NP-Completeness Graphs 4/17/2017 6:25 AM x x x x x
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 24 Instructor: Paul Beame.
CSE 421 Algorithms Richard Anderson Lecture 27 NP Completeness.
Clique Cover Cook’s Theorem 3SAT and Independent Set
1 Algorithm Design Patterns and Anti-Patterns Algorithm design patterns.Ex. n Greed.O(n log n) interval scheduling. n Divide-and-conquer. O(n log n) FFT.
1 Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
Piyush Kumar (Lecture 7: Reductions)
1 The Theory of NP-Completeness 2012/11/6 P: the class of problems which can be solved by a deterministic polynomial algorithm. NP : the class of decision.
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 27.
Lecture 22 More NPC problems
CSEP 521 Applied Algorithms Richard Anderson Lecture 10 NP Completeness.
INHERENT LIMITATIONS OF COMPUTER PROGRAMS CSci 4011.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 33.
CSE 024: Design & Analysis of Algorithms Chapter 9: NP Completeness Sedgewick Chp:40 David Luebke’s Course Notes / University of Virginia, Computer Science.
1 Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
Sailesh Prabhu Prof. Swarat Chaudhuri COMP 482: Design and Analysis of Algorithms Spring 2013.
1 The Theory of NP-Completeness 2 Cook ’ s Theorem (1971) Prof. Cook Toronto U. Receiving Turing Award (1982) Discussing difficult problems: worst case.
Unit 9: Coping with NP-Completeness
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
CS 3343: Analysis of Algorithms Lecture 25: P and NP Some slides courtesy of Carola Wenk.
CSE 589 Part V One of the symptoms of an approaching nervous breakdown is the belief that one’s work is terribly important. Bertrand Russell.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 29.
28.
Chapter 11 Introduction to Computational Complexity Copyright © 2011 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.
NPC.
CSCI 2670 Introduction to Theory of Computing December 2, 2004.
CSE 421 Algorithms Richard Anderson Lecture 27 NP-Completeness Proofs.
NP Hard Problems Instructor Neelima Gupta Presentation Edited by Sapna Grover.
1 The Theory of NP-Completeness 2 Review: Finding lower bound by problem transformation Problem X reduces to problem Y (X  Y ) iff X can be solved by.
CSE 332: NP Completeness, Part II Richard Anderson Spring 2016.
ICS 353: Design and Analysis of Algorithms NP-Complete Problems King Fahd University of Petroleum & Minerals Information & Computer Science Department.
NP-Completeness (2) NP-Completeness Graphs 4/13/2018 5:22 AM x x x x x
Chapter 10 NP-Complete Problems.
Richard Anderson Lectures NP-Completeness
Richard Anderson Lecture 26 NP-Completeness
Polynomial-Time Reduction
NP-Completeness (2) NP-Completeness Graphs 7/23/ :02 PM x x x x
NP-Completeness (2) NP-Completeness Graphs 7/23/ :02 PM x x x x
NP-Completeness Proofs
Richard Anderson Lecture 26 NP-Completeness
NP-Completeness Yin Tat Lee
Intro to Theory of Computation
Intro to Theory of Computation
ICS 353: Design and Analysis of Algorithms
NP-Completeness (2) NP-Completeness Graphs 11/23/2018 2:12 PM x x x x
Richard Anderson Lecture 25 NP-Completeness
Richard Anderson Lecture 28 NP-Completeness
Chapter 8 NP and Computational Intractability
Richard Anderson Lecture 28 NP Completeness
NP-Completeness Yin Tat Lee
CSE 6408 Advanced Algorithms.
Instructor: Aaron Roth
NP-Completeness (2) NP-Completeness Graphs 7/9/2019 6:12 AM x x x x x
Presentation transcript:

1 Chapter 8 NP and Computational Intractability Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.

2 Algorithm Design Patterns and Anti-Patterns Algorithm design patterns.Ex. n Greedy.O(n log n) interval scheduling. n Divide-and-conquer. O(n log n) FFT. n Dynamic programming.O(n 2 ) edit distance. n Duality.O(n 3 ) bipartite matching. n Reductions. n Local search. n Randomization. Algorithm design anti-patterns. n NP-completeness.O(n k ) algorithm unlikely. n PSPACE-completeness.O(n k ) certification algorithm unlikely. n Undecidability.No algorithm possible.

8.1 Polynomial-Time Reductions

4 Classify Problems According to Computational Requirements Q. Which problems will we be able to solve in practice? A working definition. [von Neumann 1953, Godel 1956, Cobham 1964, Edmonds 1965, Rabin 1966] Those with polynomial-time algorithms. Yes Probably no Shortest pathLongest path Min cutMax cut 2-SAT3-SAT Matching3D-matching Primality testingFactoring Planar 4-colorPlanar 3-color Bipartite vertex coverVertex cover

5 Classify Problems Desiderata. Classify problems according to those that can be solved in polynomial-time and those that cannot. Provably requires exponential-time. n Given a Turing machine, does it halt in at most k steps? n Given a board position in an n-by-n generalization of chess, can black guarantee a win? Frustrating news. Huge number of fundamental problems have defied classification for decades. This chapter. Show that these fundamental problems are "computationally equivalent" and appear to be different manifestations of one really hard problem.

6 Polynomial-Time Reduction Desiderata'. Suppose we could solve X in polynomial-time. What else could we solve in polynomial time? Reduction. Problem X polynomial reduces to problem Y if arbitrary instances of problem X can be solved using: n Polynomial number of standard computational steps, plus n Polynomial number of calls to a black box that solves problem Y. Notation. X  P Y. X is polynomial-time reducible to Y Y is at least as hard as X (with respect to polynomial time). X is no more harder to solve than solving problem Y. don't confuse with reduces from

7 Polynomial-Time Reduction Purpose. Classify problems according to relative difficulty. Design algorithms. If X  P Y and Y can be solved in polynomial-time, then X can also be solved in polynomial time. Establish intractability. If X  P Y and X cannot be solved in polynomial-time, then Y cannot be solved in polynomial time. Establish equivalence. If X  P Y and Y  P X, we use notation X  P Y.

Reduction By Simple Equivalence Basic reduction strategies.  Reduction by simple equivalence.  Reduction from special case to general case.  Reduction by encoding with gadgets.

9 Independent Set INDEPENDENT SET : Given a graph G = (V, E) and an integer k, is there a subset of vertices S  V such that |S|  k, and for each edge at most one of its endpoints is in S? i.e., no two nodes in Set S connect with each other Ex. Is there an independent set of size  6? Yes. Ex. Is there an independent set of size  7? No. independent set

10 Vertex Cover VERTEX COVER : Given a graph G = (V, E) and an integer k, is there a subset of vertices S  V such that |S|  k, and for each edge, at least one of its endpoints is in S? Ex. Is there a vertex cover of size  4? Yes. Ex. Is there a vertex cover of size  3? No. vertex cover

11 Vertex Cover and Independent Set Claim. VERTEX-COVER  P INDEPENDENT-SET. Pf. We show S is an independent set iff V  S is a vertex cover. vertex cover independent set

12 Vertex Cover and Independent Set Claim. VERTEX-COVER  P INDEPENDENT-SET. Pf. We show S is an independent set iff V  S is a vertex cover.  n Let S be any independent set. n Consider an arbitrary edge (u, v). n S independent  u  S or v  S  u  V  S or v  V  S. n Thus, V  S covers (u, v).  n Let V  S be any vertex cover. n Consider two nodes u  S and v  S. n Observe that (u, v)  E since V  S is a vertex cover. n Thus, no two nodes in S are joined by an edge  S independent set. ▪

Reduction from Special Case to General Case Basic reduction strategies.  Reduction by simple equivalence.  Reduction from special case to general case.  Reduction by encoding with gadgets.

14 Set Cover SET COVER : Given a set U of elements, a collection S 1, S 2,..., S m of subsets of U, and an integer k, does there exist a collection of  k of these sets whose union is equal to U? Sample application. n m available pieces of software. n Set U of n capabilities that we would like our system to have. n The ith piece of software provides the set S i  U of capabilities. n Goal: achieve all n capabilities using fewest pieces of software. Ex: U = { 1, 2, 3, 4, 5, 6, 7 } k = 2 S 1 = {3, 7}S 4 = {2, 4} S 2 = {3, 4, 5, 6}S 5 = {5} S 3 = {1}S 6 = {1, 2, 6, 7}

15 SET COVER U = { 1, 2, 3, 4, 5, 6, 7 } k = 2 S a = {3, 7}S b = {2, 4} S c = {3, 4, 5, 6}S d = {5} S e = {1}S f = {1, 2, 6, 7} Vertex Cover Reduces to Set Cover Claim. VERTEX-COVER  P SET-COVER. Pf. Given a VERTEX-COVER instance G = (V, E), k, we construct a set cover instance whose size equals the size of the vertex cover instance. Construction. n Create SET-COVER instance: – k = k, U = E, S v = {e  E : e incident to v } n Set-cover of size  k iff vertex cover of size  k. ▪ a d b e fc VERTEX COVER k = 2 e1e1 e2e2 e3e3 e5e5 e4e4 e6e6 e7e7

16 Polynomial-Time Reduction Basic strategies. n Reduction by simple equivalence. n Reduction from special case to general case. n Reduction by encoding with gadgets.

8.2 Reductions via "Gadgets" Basic reduction strategies.  Reduction by simple equivalence.  Reduction from special case to general case.  Reduction via "gadgets."

18 Ex: Yes: x 1 = true, x 2 = true x 3 = false. Literal:A Boolean variable or its negation. Clause:A disjunction of literals. Conjunctive normal form (CNF): A propositional formula  that is the conjunction of clauses. SAT : Given CNF formula , does it have a satisfying truth assignment? 3-SAT : SAT where each clause contains exactly 3 literals. Satisfiability each corresponds to a different variable

19 3 Satisfiability Reduces to Independent Set Claim. 3-SAT  P INDEPENDENT-SET. Pf. Given an instance  of 3-SAT, we construct an instance (G, k) of INDEPENDENT-SET that has an independent set of size k iff  is satisfiable. Construction. n G contains 3 vertices for each clause, one for each literal. n Connect 3 literals in a clause in a triangle. n Connect literal to each of its negations. k = 3 G

20 3 Satisfiability Reduces to Independent Set Claim. G contains independent set of size k = |  | iff  is satisfiable. Pf.  Let S be independent set of size k. n S must contain exactly one vertex in each triangle. n Set these literals to true. n Truth assignment is consistent and all clauses are satisfied. Pf  Given satisfying assignment, select one true literal from each triangle. This is an independent set of size k. ▪ k = 3 G and any other variables in a consistent way

21 Review Basic reduction strategies. n Simple equivalence: INDEPENDENT-SET  P VERTEX-COVER. n Special case to general case: VERTEX-COVER  P SET-COVER. n Encoding with gadgets: 3-SAT  P INDEPENDENT-SET. Transitivity. If X  P Y and Y  P Z, then X  P Z. Pf idea. Compose the two algorithms. Ex: 3-SAT  P INDEPENDENT-SET  P VERTEX-COVER  P SET-COVER.