SlideShare uma empresa Scribd logo
1 de 37
Survey on Polynomial Identity Testing Amir Shpilka Technion and MSR NE June 18, 2011 PIT Survey – CSR  1
Exam n=1. Is the following polynomial identically 0? June 18, 2011 2 Prove it! Will do so later.
Goal of talk Survey known results Explain some proof techniques Give an interesting set of `accessible’ open questions June 18, 2011 3
Talk outline Definition of the problem Connection to lower bounds (hardness) Survey of positive results Some proofs Connection to polynomial factorization June 18, 2011 4
Playground: Arithmetic Circuits Field:   Variables:  X1,...,Xn Gates: ,  Every gate in the circuit computes a polynomial in [X1,...,Xn] Example:(X1 X2)  (X2 + 1) Size = number of wires Depth = length of longest input-output path Degree = max degree of internal gates June 18, 2011 5
Arithmetic Formulas Same, except underlying graph is a tree June 18, 2011 6
Bounded depth circuits  circuits: depth-2 circuits with + at the top and  at the bottom. Size s circuits compute s-sparse polynomials.  circuits: depth-3 circuits with + at the top,  at the middle and + at the bottom. Compute sums of products of linear functions. I.e. a sparse polynomial composed with a linear transformation.  circuits: depth-4 circuits. Compute sums of products of sparse polynomials. June 18, 2011 7
Why Arithmetic Circuits? Most natural model for computing polynomials For many problems (e.g. Matrix Multiplication, Det) best algorithm is an arithmetic circuit Great algorithmic achievements: Fourier Transform Matrix Multiplication Polynomial Factorization Structured model (compared to Boolean circuits) P vs. NP may be easier June 18, 2011 8
Polynomial Identity Testing Input:Arithmetic circuit computing f Problem: Is f0? f(x1,...,xn) C x1 x2 xn Randomized algorithm [Schwartz, Zippel, DeMillo-Lipton]: evaluate f at a random point Goal: A proof. I.e., a deterministic algorithm June 18, 2011 9
Black Box PIT Explicit Hitting Set Input: A Black-Box circuit computing f. Problem:Is f=0 ? f(x1,...,xn) (x1,...,xn) C Goal: deterministic algorithm (a.k.a. Hitting Set) S,Z,DM-L:  small Hitting Set (not explicit) June 18, 2011 10
Motivation Natural and fundamental problem Strong connection to circuit lower bounds Algorithmic importance: Primality testing [Agrawal-Kayal-Saxena] Parallel algorithms for finding matching [Karp-Upfal-Wigderson, Mulmuley-Vazirani-Vazirani] May help you solve exams! June 18, 2011 11
Polynomial Identity Testing ,[object Object],Connection to lower bounds (hardness) Survey of positive results Some proofs Connection to polynomial factorization June 18, 2011 12
Hardness: PIT  lower bounds [Kabanets-Impagliazzo]:  2(n) lower bound for Permanent PIT in npolylog(n)time PIT  P  super-polynomial lower bounds: Boolean for NEXP or arithmetic for Permanent [Dvir-S-Yehudayoff]:(almost) same as K-I for bounded depth circuits [Heintz-Schnorr,Agrawal]: Polynomial time Black-Box PIT  Exponential lower bounds for arithmetic circuits Lesson: Derandomizing PIT essentially equivalent to proving lower bounds for arithmetic circuits  June 18, 2011 13
Black-Box PIT  Lower Bounds [Heintz-Schnorr,Agrawal]: BB PIT for size s circuits in time poly(s) (i.e. poly(s) size hitting set)  exp. lower bounds for arithmetic circuits. Proof: Given ={pi}, find non-zero polynomial f inlog(||)variablse, such that f(pi)=0 for all i.   f does not have size s circuits			 Gives lower bounds for f in EXP (PSPACE) Conjecture[Agrawal]:  	={(y1,…, yn) : yi=yki mod r, k,r < s20} is a hitting set for size s circuits June 18, 2011 14
Lower Bounds  Black-Box PIT [Kabanets-Impagliazzo]: arithmetic version of N-W generator: Combinatorial design:  S1,…, Sn [m]s.t. |Si| = k and |Si Sj| < log n Assumef is a k-variate polynomial of arithmetic circuit complexity 2(k) For every ymgeneratewnas wi = f(y|Si) I.e. = {(f(y|S1),…, f(y|Sn) : ym} Proof Idea: C0 iff (roughly) for some i, xi – f(y|Si) is a factor of C. Gives circuit for f. June 18, 2011 15
Importance of  circuits [Agrawal-Vinay,Raz]: Exponential lower bounds for   circuitsimply exponential lower bounds for general circuits. Proof: 1. Depth reduction a-la P=NC2[Valiant-Skyum-Berkowitz-Rackoff] 2. Break the circuit in the middle and interpolate each part using  circuits. Cor[Agrawal-Vinay]: Polynomial time PIT of  circuits gives quasi-polynomial time PIT for general circuits. Proof: By [Heintz-Schnorr,Agrawal] polynomial time PIT  exponential lower bounds for  circuits. By [Agrawal-Vinay, Raz] exponential lower bounds for general circuits. Now use [K-I]. June 18, 2011 16
Polynomial Identity Testing ,[object Object]
Connection to lower bounds (hardness)Survey of positive results Some proofs Connection to polynomial factorization June 18, 2011 17
Deterministic algorithms for PIT  circuits (a.k.a.,sparse polys) [BenOr-Tiwari, Grigoriev-Karpinski, Klivans-Spielman,…] Black-Box in polynomial time Non-commutative formulas [Raz-S] White-Box in polynomial time (k) circuits [Dvir-S,Kayal-Saxena,Karnin-S,Kayal-Saraf,Saxena-Seshadri]  Black-Box in time nO(k) Read-k multilinear formulas [S-Volkovich, Anderson-van Melkebeek-Volkovich] White-Box in time nkO(k) Black-Box in nO(log(n)+kO(k)) Multilinear (k)[Karnin-Mukhopadhyay-S-Volkovich, Saraf-Volkovich]  Black-Box in time npoly(k)  June 18, 2011 18
Why study restricted models [Agrawal-Vinay] PIT for  circuits implies PIT for general depth. Gaining insight into more general questions:  Intuitively:lower bounds imply PIT Multilinear formulas: super polynomial bounds [Raz,Raz-Yehudayoff] but no PIT algorithms Not even for Depth-3 multilinear formulas! Read-k, depth-3,4 multilinear formulas relaxations of the more general problem Interesting results: Structural theorems for (k) and (k) circuits. June 18, 2011 19
Polynomial Identity Testing ,[object Object]
Connection to lower bounds (hardness)
Survey of positive resultsSome proofs: Depth-3 circuits Depth-4 circuits Connection to polynomial factorization June 18, 2011 20
Proofs – tailored for the model Proofs usually use `weakness’ inherent in model Depth 2: few monomials. Substituting yai to xiwe can control `collapses’ of different monomials. Non Commutative formulas: Polynomial has few linearly independent partial derivatives [Nisan]. Keep track of a basis for derivatives to do PIT. (k): setting a linear function to zero reduces top fan-in. If k=2 then multiplication gates must be the same. Calls for induction. Multilinear(k): in some sense `combination’ of sparse polynomials and multilnear(k). Read-k-Formulas: subformulas of root contain ½ of variables and are (roughly) read-(k-1). June 18, 2011 21
Solution to Exam n=1. Is the following polynomial identically 0? June 18, 2011 22 Prove it! Will do so later now
Idea: change of basis A = X +eY B = X +eZ C = eX-Y + Z  Identity becomes June 18, 2011 23 ,[object Object],[object Object]
Depth 3 identities C = M1+ … + MkMi = j=1...diLi,j Rank: dimension of space spanned by {Li,j} In the exam: Rank=3 Turns out: this is (almost) the general case! Theorem [Dvir S]: If C  0 is a basic identity then dim(C) ≤ Rank(k,d) = (log(d))k White-Box Algorithm: find partition to sub-circuits of low dimension (after removal of g.c.d.) and brute force verify that they vanish. Improved nO(k) algorithm by [Kayal-Saxena]. June 18, 2011 25
Black-Box PIT Black-Box Algorithm[KarninS]:Intuitively, if we project the inputs to a `low’ dimensional space in a way that does not collapse the dimension below Rank(k,d) then the circuit should not become zero. Theorem [GabizonRaz]:  "small" explicit set of D-dimensional subspaces V1,...,Vm  such that       space of linear functions :dim(|Vi) = min(dim(),D)for most i June 18, 2011 26 In other words: the linear functions in  remain as independent as possible on Vi
Black-Box PIT If C’ has the same rank as C’|V, then C’ and C’|V are isomorphic. Hence, C’|V  0 C  0 Corollary: i, C|Vihas low "rank“ Chas low "rank" Corollary: if i, C|Vi 0 then Chas structure (i.e. Cis sum of circuits of low "rank")  Theorem: if i, C|Vi 0 then C  0. Algorithm: For every i, brute force compute C|Vi Time: poly(n)ddim(Vi) = dO(Rank(k,d)) If Chas high rank then by Gabizon-Raz, for some i,C|Vi has high rank. If Cis not a sum of low rank circuits then for some i, C|Viis not a sum of low rank circuits. This contradicts the structural theorem. Cis sum of low rank subcircuitsVis.t. rank of subcircuits remain the same.  C|Viis zero each subcircuit vanishes on Vi.  subcircuitscompute the zero polynomial. 27
Depth 3 identities Lesson 1: depth 3 identities arevery structured! Lesson 2: Rank is an important invariant to study. Improvements [Kayal-Saraf,Saxena-Seshadri]: finite,   klog(d) < Rank(k,d) < k3log(d) over ,   k < Rank(k,d) < k2log(k) Improves [Dvir-S] + [Karnin-S] (plug and play) NEW: [Saxena-Seshadri] BB-PIT in time nO(k) June 18, 2011 28
Bounding the rank Basic observation: Consider C = M1 + M2 M1 = M2= Fact: linear functions are irreducible polynomial. Corollary: C  0 then M1, M2 have same factors. Corollary: matching i (i) s.t. Li ~ L'(i)
Bounding the rank ,[object Object],June 18, 2011 30 Sketch: cover all linear functions in log(d) steps, where at m’th step:  ,[object Object]
(2m)functions in span0
Black-Box PIT for multilinear (k) C = T1+ … + Tk        Ti = j=1...diPi,j where Ti are multilinear and Pi,j are sparse Rank: sparsity of Ti Theorem [Saraf-Volkovich]: If C  0 is a basic identity then #monom(C) ≤ spoly(k) White-Box Algorithm: find partition to sub-circuits of low dimension (after removal of g.c.d.) and brute force verify that they vanish. Black-Box Algorithm: If circuit not sparse can fix many variables and get sparse but not too sparse circuit. Use interpolation for  circuits. June 18, 2011 31
Polynomial Identity Testing ,[object Object]
Connection to lower bounds (hardness)
Survey of positive results

Mais conteúdo relacionado

Mais procurados

Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsMartijn Grooten
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyAdri Jovin
 
CS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questio
CS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questioCS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questio
CS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questioKarthik Venkatachalam
 
QUESTION BANK FOR ANNA UNNIVERISTY SYLLABUS
QUESTION BANK FOR ANNA UNNIVERISTY SYLLABUSQUESTION BANK FOR ANNA UNNIVERISTY SYLLABUS
QUESTION BANK FOR ANNA UNNIVERISTY SYLLABUSJAMBIKA
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of AlgorithmsArvind Krishnaa
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 
Cs6402 design and analysis of algorithms impartant part b questions appasami
Cs6402 design and analysis of algorithms  impartant part b questions appasamiCs6402 design and analysis of algorithms  impartant part b questions appasami
Cs6402 design and analysis of algorithms impartant part b questions appasamiappasami
 
Data mining with differential privacy
Data mining with differential privacy Data mining with differential privacy
Data mining with differential privacy Wei-Yuan Chang
 
Randomized algorithms all pairs shortest path
Randomized algorithms  all pairs shortest pathRandomized algorithms  all pairs shortest path
Randomized algorithms all pairs shortest pathMohammad Akbarizadeh
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...atanuanwesha
 
Skiena algorithm 2007 lecture16 introduction to dynamic programming
Skiena algorithm 2007 lecture16 introduction to dynamic programmingSkiena algorithm 2007 lecture16 introduction to dynamic programming
Skiena algorithm 2007 lecture16 introduction to dynamic programmingzukun
 
Graph Traversal Algorithms - Depth First Search Traversal
Graph Traversal Algorithms - Depth First Search TraversalGraph Traversal Algorithms - Depth First Search Traversal
Graph Traversal Algorithms - Depth First Search TraversalAmrinder Arora
 
Computability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable FunctionComputability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable FunctionReggie Niccolo Santos
 

Mais procurados (20)

Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of maths
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Muchtadi
MuchtadiMuchtadi
Muchtadi
 
CS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questio
CS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questioCS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questio
CS 6402 – DESIGN AND ANALYSIS OF ALGORITHMS questio
 
QUESTION BANK FOR ANNA UNNIVERISTY SYLLABUS
QUESTION BANK FOR ANNA UNNIVERISTY SYLLABUSQUESTION BANK FOR ANNA UNNIVERISTY SYLLABUS
QUESTION BANK FOR ANNA UNNIVERISTY SYLLABUS
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Design and Analysis of Algorithms
Design and Analysis of AlgorithmsDesign and Analysis of Algorithms
Design and Analysis of Algorithms
 
Backtracking
BacktrackingBacktracking
Backtracking
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Cs6402 design and analysis of algorithms impartant part b questions appasami
Cs6402 design and analysis of algorithms  impartant part b questions appasamiCs6402 design and analysis of algorithms  impartant part b questions appasami
Cs6402 design and analysis of algorithms impartant part b questions appasami
 
Unit 4
Unit 4Unit 4
Unit 4
 
Data mining with differential privacy
Data mining with differential privacy Data mining with differential privacy
Data mining with differential privacy
 
Randomized algorithms all pairs shortest path
Randomized algorithms  all pairs shortest pathRandomized algorithms  all pairs shortest path
Randomized algorithms all pairs shortest path
 
Unit 5 jwfiles
Unit 5 jwfilesUnit 5 jwfiles
Unit 5 jwfiles
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...
 
Skiena algorithm 2007 lecture16 introduction to dynamic programming
Skiena algorithm 2007 lecture16 introduction to dynamic programmingSkiena algorithm 2007 lecture16 introduction to dynamic programming
Skiena algorithm 2007 lecture16 introduction to dynamic programming
 
Graph Traversal Algorithms - Depth First Search Traversal
Graph Traversal Algorithms - Depth First Search TraversalGraph Traversal Algorithms - Depth First Search Traversal
Graph Traversal Algorithms - Depth First Search Traversal
 
Computability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable FunctionComputability - Tractable, Intractable and Non-computable Function
Computability - Tractable, Intractable and Non-computable Function
 
Unit 2
Unit 2Unit 2
Unit 2
 

Destaque

Csr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolovCsr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolovCSR2011
 
Csr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCsr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCSR2011
 
Csr2011 june15 11_00_sima
Csr2011 june15 11_00_simaCsr2011 june15 11_00_sima
Csr2011 june15 11_00_simaCSR2011
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCSR2011
 
Csr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCsr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 

Destaque (8)

Scriptie nc vijlbrief
Scriptie nc vijlbriefScriptie nc vijlbrief
Scriptie nc vijlbrief
 
Csr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolovCsr2011 june15 11_30_sokolov
Csr2011 june15 11_30_sokolov
 
Csr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawalCsr2011 june14 14_00_agrawal
Csr2011 june14 14_00_agrawal
 
Csr2011 june15 11_00_sima
Csr2011 june15 11_00_simaCsr2011 june15 11_00_sima
Csr2011 june15 11_00_sima
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanov
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 
Csr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenkoCsr2011 june14 15_15_romashchenko
Csr2011 june14 15_15_romashchenko
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 

Semelhante a Survey on Polynomial Identity Testing Reveals Important Connections Between Circuit Lower Bounds and PIT Algorithms

013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_CompressibilityHa Phuong
 
Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4Fabian Pedregosa
 
Efficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representationsEfficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representationsNAVER Engineering
 
Dynamic Programming.pptx
Dynamic Programming.pptxDynamic Programming.pptx
Dynamic Programming.pptxThanga Ramya S
 
Dimension Reduction Introduction & PCA.pptx
Dimension Reduction Introduction & PCA.pptxDimension Reduction Introduction & PCA.pptx
Dimension Reduction Introduction & PCA.pptxRohanBorgalli
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...Alex Pruden
 
Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...Frank Nielsen
 
Output Units and Cost Function in FNN
Output Units and Cost Function in FNNOutput Units and Cost Function in FNN
Output Units and Cost Function in FNNLin JiaMing
 
LMI BMI UFO Presentation 2013
LMI BMI UFO Presentation 2013LMI BMI UFO Presentation 2013
LMI BMI UFO Presentation 2013mikhailkonnik
 
Mit15 082 jf10_lec01
Mit15 082 jf10_lec01Mit15 082 jf10_lec01
Mit15 082 jf10_lec01Saad Liaqat
 
A Tutorial on Computational Geometry
A Tutorial on Computational GeometryA Tutorial on Computational Geometry
A Tutorial on Computational GeometryMinh-Tri Pham
 
Accelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationAccelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationFeynman Liang
 
Matrix Computations in Machine Learning
Matrix Computations in Machine LearningMatrix Computations in Machine Learning
Matrix Computations in Machine Learningbutest
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Ha Phuong
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCSR2011
 
Information-theoretic clustering with applications
Information-theoretic clustering  with applicationsInformation-theoretic clustering  with applications
Information-theoretic clustering with applicationsFrank Nielsen
 
Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)Jialin LIU
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemAleksandr Yampolskiy
 

Semelhante a Survey on Polynomial Identity Testing Reveals Important Connections Between Circuit Lower Bounds and PIT Algorithms (20)

Unit 3
Unit 3Unit 3
Unit 3
 
Unit 3
Unit 3Unit 3
Unit 3
 
013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility013_20160328_Topological_Measurement_Of_Protein_Compressibility
013_20160328_Topological_Measurement_Of_Protein_Compressibility
 
Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4Random Matrix Theory and Machine Learning - Part 4
Random Matrix Theory and Machine Learning - Part 4
 
Efficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representationsEfficient end-to-end learning for quantizable representations
Efficient end-to-end learning for quantizable representations
 
Dynamic Programming.pptx
Dynamic Programming.pptxDynamic Programming.pptx
Dynamic Programming.pptx
 
Dimension Reduction Introduction & PCA.pptx
Dimension Reduction Introduction & PCA.pptxDimension Reduction Introduction & PCA.pptx
Dimension Reduction Introduction & PCA.pptx
 
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
zkStudyClub: PLONKUP & Reinforced Concrete [Luke Pearson, Joshua Fitzgerald, ...
 
Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...Pattern learning and recognition on statistical manifolds: An information-geo...
Pattern learning and recognition on statistical manifolds: An information-geo...
 
Output Units and Cost Function in FNN
Output Units and Cost Function in FNNOutput Units and Cost Function in FNN
Output Units and Cost Function in FNN
 
LMI BMI UFO Presentation 2013
LMI BMI UFO Presentation 2013LMI BMI UFO Presentation 2013
LMI BMI UFO Presentation 2013
 
Mit15 082 jf10_lec01
Mit15 082 jf10_lec01Mit15 082 jf10_lec01
Mit15 082 jf10_lec01
 
A Tutorial on Computational Geometry
A Tutorial on Computational GeometryA Tutorial on Computational Geometry
A Tutorial on Computational Geometry
 
Accelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationAccelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference Compilation
 
Matrix Computations in Machine Learning
Matrix Computations in Machine LearningMatrix Computations in Machine Learning
Matrix Computations in Machine Learning
 
Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)Tutorial of topological_data_analysis_part_1(basic)
Tutorial of topological_data_analysis_part_1(basic)
 
Csr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudanCsr2011 june18 14_00_sudan
Csr2011 june18 14_00_sudan
 
Information-theoretic clustering with applications
Information-theoretic clustering  with applicationsInformation-theoretic clustering  with applications
Information-theoretic clustering with applications
 
Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)
 
Spreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape ProblemSpreading Rumors Quietly and the Subgroup Escape Problem
Spreading Rumors Quietly and the Subgroup Escape Problem
 

Mais de CSR2011

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCSR2011
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCSR2011
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCSR2011
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCSR2011
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCSR2011
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCSR2011
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCSR2011
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCSR2011
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCSR2011
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCSR2011
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCSR2011
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCSR2011
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCSR2011
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCSR2011
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCSR2011
 
Csr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohreyCsr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohreyCSR2011
 

Mais de CSR2011 (20)

Csr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigorievCsr2011 june14 09_30_grigoriev
Csr2011 june14 09_30_grigoriev
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoffCsr2011 june18 15_15_bomhoff
Csr2011 june18 15_15_bomhoff
 
Csr2011 june18 15_45_avron
Csr2011 june18 15_45_avronCsr2011 june18 15_45_avron
Csr2011 june18 15_45_avron
 
Csr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyenCsr2011 june18 12_00_nguyen
Csr2011 june18 12_00_nguyen
 
Csr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskinCsr2011 june18 11_00_tiskin
Csr2011 june18 11_00_tiskin
 
Csr2011 june18 11_30_remila
Csr2011 june18 11_30_remilaCsr2011 june18 11_30_remila
Csr2011 june18 11_30_remila
 
Csr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanovCsr2011 june17 17_00_likhomanov
Csr2011 june17 17_00_likhomanov
 
Csr2011 june17 16_30_blin
Csr2011 june17 16_30_blinCsr2011 june17 16_30_blin
Csr2011 june17 16_30_blin
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june17 12_00_morin
Csr2011 june17 12_00_morinCsr2011 june17 12_00_morin
Csr2011 june17 12_00_morin
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonati
 
Csr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminskiCsr2011 june17 15_15_kaminski
Csr2011 june17 15_15_kaminski
 
Csr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatovCsr2011 june17 14_00_bulatov
Csr2011 june17 14_00_bulatov
 
Csr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyiCsr2011 june17 11_30_vyalyi
Csr2011 june17 11_30_vyalyi
 
Csr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonatiCsr2011 june17 11_00_lonati
Csr2011 june17 11_00_lonati
 
Csr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhaninCsr2011 june17 09_30_yekhanin
Csr2011 june17 09_30_yekhanin
 
Csr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohreyCsr2011 june16 17_00_lohrey
Csr2011 june16 17_00_lohrey
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Survey on Polynomial Identity Testing Reveals Important Connections Between Circuit Lower Bounds and PIT Algorithms

  • 1. Survey on Polynomial Identity Testing Amir Shpilka Technion and MSR NE June 18, 2011 PIT Survey – CSR 1
  • 2. Exam n=1. Is the following polynomial identically 0? June 18, 2011 2 Prove it! Will do so later.
  • 3. Goal of talk Survey known results Explain some proof techniques Give an interesting set of `accessible’ open questions June 18, 2011 3
  • 4. Talk outline Definition of the problem Connection to lower bounds (hardness) Survey of positive results Some proofs Connection to polynomial factorization June 18, 2011 4
  • 5. Playground: Arithmetic Circuits Field:  Variables: X1,...,Xn Gates: ,  Every gate in the circuit computes a polynomial in [X1,...,Xn] Example:(X1 X2)  (X2 + 1) Size = number of wires Depth = length of longest input-output path Degree = max degree of internal gates June 18, 2011 5
  • 6. Arithmetic Formulas Same, except underlying graph is a tree June 18, 2011 6
  • 7. Bounded depth circuits  circuits: depth-2 circuits with + at the top and  at the bottom. Size s circuits compute s-sparse polynomials.  circuits: depth-3 circuits with + at the top,  at the middle and + at the bottom. Compute sums of products of linear functions. I.e. a sparse polynomial composed with a linear transformation.  circuits: depth-4 circuits. Compute sums of products of sparse polynomials. June 18, 2011 7
  • 8. Why Arithmetic Circuits? Most natural model for computing polynomials For many problems (e.g. Matrix Multiplication, Det) best algorithm is an arithmetic circuit Great algorithmic achievements: Fourier Transform Matrix Multiplication Polynomial Factorization Structured model (compared to Boolean circuits) P vs. NP may be easier June 18, 2011 8
  • 9. Polynomial Identity Testing Input:Arithmetic circuit computing f Problem: Is f0? f(x1,...,xn) C x1 x2 xn Randomized algorithm [Schwartz, Zippel, DeMillo-Lipton]: evaluate f at a random point Goal: A proof. I.e., a deterministic algorithm June 18, 2011 9
  • 10. Black Box PIT Explicit Hitting Set Input: A Black-Box circuit computing f. Problem:Is f=0 ? f(x1,...,xn) (x1,...,xn) C Goal: deterministic algorithm (a.k.a. Hitting Set) S,Z,DM-L:  small Hitting Set (not explicit) June 18, 2011 10
  • 11. Motivation Natural and fundamental problem Strong connection to circuit lower bounds Algorithmic importance: Primality testing [Agrawal-Kayal-Saxena] Parallel algorithms for finding matching [Karp-Upfal-Wigderson, Mulmuley-Vazirani-Vazirani] May help you solve exams! June 18, 2011 11
  • 12.
  • 13. Hardness: PIT  lower bounds [Kabanets-Impagliazzo]: 2(n) lower bound for Permanent PIT in npolylog(n)time PIT  P  super-polynomial lower bounds: Boolean for NEXP or arithmetic for Permanent [Dvir-S-Yehudayoff]:(almost) same as K-I for bounded depth circuits [Heintz-Schnorr,Agrawal]: Polynomial time Black-Box PIT  Exponential lower bounds for arithmetic circuits Lesson: Derandomizing PIT essentially equivalent to proving lower bounds for arithmetic circuits June 18, 2011 13
  • 14. Black-Box PIT  Lower Bounds [Heintz-Schnorr,Agrawal]: BB PIT for size s circuits in time poly(s) (i.e. poly(s) size hitting set)  exp. lower bounds for arithmetic circuits. Proof: Given ={pi}, find non-zero polynomial f inlog(||)variablse, such that f(pi)=0 for all i.  f does not have size s circuits  Gives lower bounds for f in EXP (PSPACE) Conjecture[Agrawal]: ={(y1,…, yn) : yi=yki mod r, k,r < s20} is a hitting set for size s circuits June 18, 2011 14
  • 15. Lower Bounds  Black-Box PIT [Kabanets-Impagliazzo]: arithmetic version of N-W generator: Combinatorial design: S1,…, Sn [m]s.t. |Si| = k and |Si Sj| < log n Assumef is a k-variate polynomial of arithmetic circuit complexity 2(k) For every ymgeneratewnas wi = f(y|Si) I.e. = {(f(y|S1),…, f(y|Sn) : ym} Proof Idea: C0 iff (roughly) for some i, xi – f(y|Si) is a factor of C. Gives circuit for f. June 18, 2011 15
  • 16. Importance of  circuits [Agrawal-Vinay,Raz]: Exponential lower bounds for  circuitsimply exponential lower bounds for general circuits. Proof: 1. Depth reduction a-la P=NC2[Valiant-Skyum-Berkowitz-Rackoff] 2. Break the circuit in the middle and interpolate each part using  circuits. Cor[Agrawal-Vinay]: Polynomial time PIT of  circuits gives quasi-polynomial time PIT for general circuits. Proof: By [Heintz-Schnorr,Agrawal] polynomial time PIT  exponential lower bounds for  circuits. By [Agrawal-Vinay, Raz] exponential lower bounds for general circuits. Now use [K-I]. June 18, 2011 16
  • 17.
  • 18. Connection to lower bounds (hardness)Survey of positive results Some proofs Connection to polynomial factorization June 18, 2011 17
  • 19. Deterministic algorithms for PIT  circuits (a.k.a.,sparse polys) [BenOr-Tiwari, Grigoriev-Karpinski, Klivans-Spielman,…] Black-Box in polynomial time Non-commutative formulas [Raz-S] White-Box in polynomial time (k) circuits [Dvir-S,Kayal-Saxena,Karnin-S,Kayal-Saraf,Saxena-Seshadri] Black-Box in time nO(k) Read-k multilinear formulas [S-Volkovich, Anderson-van Melkebeek-Volkovich] White-Box in time nkO(k) Black-Box in nO(log(n)+kO(k)) Multilinear (k)[Karnin-Mukhopadhyay-S-Volkovich, Saraf-Volkovich] Black-Box in time npoly(k) June 18, 2011 18
  • 20. Why study restricted models [Agrawal-Vinay] PIT for  circuits implies PIT for general depth. Gaining insight into more general questions: Intuitively:lower bounds imply PIT Multilinear formulas: super polynomial bounds [Raz,Raz-Yehudayoff] but no PIT algorithms Not even for Depth-3 multilinear formulas! Read-k, depth-3,4 multilinear formulas relaxations of the more general problem Interesting results: Structural theorems for (k) and (k) circuits. June 18, 2011 19
  • 21.
  • 22. Connection to lower bounds (hardness)
  • 23. Survey of positive resultsSome proofs: Depth-3 circuits Depth-4 circuits Connection to polynomial factorization June 18, 2011 20
  • 24. Proofs – tailored for the model Proofs usually use `weakness’ inherent in model Depth 2: few monomials. Substituting yai to xiwe can control `collapses’ of different monomials. Non Commutative formulas: Polynomial has few linearly independent partial derivatives [Nisan]. Keep track of a basis for derivatives to do PIT. (k): setting a linear function to zero reduces top fan-in. If k=2 then multiplication gates must be the same. Calls for induction. Multilinear(k): in some sense `combination’ of sparse polynomials and multilnear(k). Read-k-Formulas: subformulas of root contain ½ of variables and are (roughly) read-(k-1). June 18, 2011 21
  • 25. Solution to Exam n=1. Is the following polynomial identically 0? June 18, 2011 22 Prove it! Will do so later now
  • 26.
  • 27. Depth 3 identities C = M1+ … + MkMi = j=1...diLi,j Rank: dimension of space spanned by {Li,j} In the exam: Rank=3 Turns out: this is (almost) the general case! Theorem [Dvir S]: If C  0 is a basic identity then dim(C) ≤ Rank(k,d) = (log(d))k White-Box Algorithm: find partition to sub-circuits of low dimension (after removal of g.c.d.) and brute force verify that they vanish. Improved nO(k) algorithm by [Kayal-Saxena]. June 18, 2011 25
  • 28. Black-Box PIT Black-Box Algorithm[KarninS]:Intuitively, if we project the inputs to a `low’ dimensional space in a way that does not collapse the dimension below Rank(k,d) then the circuit should not become zero. Theorem [GabizonRaz]:  "small" explicit set of D-dimensional subspaces V1,...,Vm such that space of linear functions :dim(|Vi) = min(dim(),D)for most i June 18, 2011 26 In other words: the linear functions in  remain as independent as possible on Vi
  • 29. Black-Box PIT If C’ has the same rank as C’|V, then C’ and C’|V are isomorphic. Hence, C’|V  0 C  0 Corollary: i, C|Vihas low "rank“ Chas low "rank" Corollary: if i, C|Vi 0 then Chas structure (i.e. Cis sum of circuits of low "rank") Theorem: if i, C|Vi 0 then C  0. Algorithm: For every i, brute force compute C|Vi Time: poly(n)ddim(Vi) = dO(Rank(k,d)) If Chas high rank then by Gabizon-Raz, for some i,C|Vi has high rank. If Cis not a sum of low rank circuits then for some i, C|Viis not a sum of low rank circuits. This contradicts the structural theorem. Cis sum of low rank subcircuitsVis.t. rank of subcircuits remain the same. C|Viis zero each subcircuit vanishes on Vi.  subcircuitscompute the zero polynomial. 27
  • 30. Depth 3 identities Lesson 1: depth 3 identities arevery structured! Lesson 2: Rank is an important invariant to study. Improvements [Kayal-Saraf,Saxena-Seshadri]: finite, klog(d) < Rank(k,d) < k3log(d) over , k < Rank(k,d) < k2log(k) Improves [Dvir-S] + [Karnin-S] (plug and play) NEW: [Saxena-Seshadri] BB-PIT in time nO(k) June 18, 2011 28
  • 31. Bounding the rank Basic observation: Consider C = M1 + M2 M1 = M2= Fact: linear functions are irreducible polynomial. Corollary: C  0 then M1, M2 have same factors. Corollary: matching i (i) s.t. Li ~ L'(i)
  • 32.
  • 34. Black-Box PIT for multilinear (k) C = T1+ … + Tk Ti = j=1...diPi,j where Ti are multilinear and Pi,j are sparse Rank: sparsity of Ti Theorem [Saraf-Volkovich]: If C  0 is a basic identity then #monom(C) ≤ spoly(k) White-Box Algorithm: find partition to sub-circuits of low dimension (after removal of g.c.d.) and brute force verify that they vanish. Black-Box Algorithm: If circuit not sparse can fix many variables and get sparse but not too sparse circuit. Use interpolation for  circuits. June 18, 2011 31
  • 35.
  • 36. Connection to lower bounds (hardness)
  • 40. Depth-4 circuitsConnection to polynomial factorization June 18, 2011 32
  • 41. PIT and Factoring f is composed if f(X) = g(X|S)h(X|T) where S and T are disjoint [S-Volkovich]: PIT is equivalent to factoring to decomposable factors. : f  0 ifff+yz has two decomposable factors. : Claim: If we have a PIT for all circuits of the form C1 + C2C3, whereCi  Mthen given C  Mwe can deterministically output all decomposable factors of C. June 18, 2011 33
  • 42. PIT and Factoring Deterministic decomposable factoring is equivalent to lower bounds: Deterministic factoring implies NEXP does not have small arithmetic circuits Lower bounds imply Deterministic decomposable factoring PIT  factoring formultilinear polynomials Deterministic decomposable factoring for depth-2, (k), sum of read-once… Open problem: is PIT equivalent to general factorization? June 18, 2011 34
  • 43.
  • 44. Connection to lower bounds (hardness)
  • 49. Connection to polynomial factorizationJune 18, 2011 35
  • 50. Some `accessible’ open problems Give a Black-Box PIT algorithm for non-commutative formulas Solve PIT for depth-3 circuits Solve PIT for multilinear depth-3 circuits Black-Box PIT for set-multilinear depth-3 circuits (degree d tensors) Polynomial time BB-PIT for read-k formulas PIT for (non-multilinear) depth-4 with restricted fan-in Is PIT equivalent to general factorization? June 18, 2011 36
  • 51. Thank You! June 18, 2011 37